{
  "type": "URL",
  "indicator": "https://code.jquery.com/jquery",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://code.jquery.com/jquery",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "akamai",
        "message": "Akamai rank: #689",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain jquery.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain jquery.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 3113655096,
      "indicator": "https://code.jquery.com/jquery",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 13,
      "pulses": [
        {
          "id": "69519fa81048ad057eb9beaa",
          "name": "Cart.Guru Malware Hosting - Malware Packed _Pegasus Espionage Detected (Positive)",
          "description": "I really love using this tool (LevelBlue -OTX) In all reality this information would have been sent to the government. CISA , NSA, Homeland Security, Citizens Lab, Canada based international organization would have been involved years ago. | \nWhere does this information goes. Citizens Lab would has been attempting to track 1000\u2019s of affected Pegasus targets. OTX detected and tagged Pegasus. I suspected it. This is from a Palantir Malware Hosting Honey Pot. \n\nWhen Pegasus was discovered in the wild , credited to those who found what the real team (T8) found, Citizens Lab then conducted tests in 2021\non the cell phone of Jamal Khashoggi, a Saudi dissident journalist. Pegasus is a kill list. \n\nVictims need help. There are a few people even on this platform that are on this list. Unless it\u2019s the US government who has ordered these actions, I don\u2019t know what is going on. The targets are not only innocent, some are crime victims, some are going mad. AT&T corporate easily confirms LevelBlue is legitimate.",
          "modified": "2026-01-27T21:02:45.343000",
          "created": "2025-12-28T21:22:48.595000",
          "tags": [
            "united",
            "servers",
            "moved",
            "ip address",
            "record value",
            "encrypt",
            "present jul",
            "present jun",
            "trojandropper",
            "passive dns",
            "ipv4 add",
            "urls",
            "files",
            "virtool",
            "united states",
            "dynamicloader",
            "directui",
            "element",
            "classinfobase",
            "write c",
            "medium",
            "yara rule",
            "msvisualbasic60",
            "high",
            "hwndelement",
            "explorer",
            "write",
            "movie",
            "insert",
            "program",
            "python",
            "http traffic",
            "trojan generic",
            "search",
            "cnc activity",
            "delphi",
            "win32",
            "launcher",
            "pony",
            "fareit",
            "malware",
            "push",
            "msie",
            "windows nt",
            "generic",
            "checkin",
            "post",
            "yara detections",
            "rxr",
            "inject",
            "memcommit",
            "cryptexportkey",
            "invalid pointer",
            "regsetvalueexa",
            "solutions ltd",
            "read c",
            "regdword",
            "mozilla",
            "persistence",
            "execution",
            "android",
            "unknown",
            "learn",
            "suspicious",
            "informative",
            "adversaries",
            "ck id",
            "name tactics",
            "command",
            "initial access",
            "defense evasion",
            "spawns",
            "t1590 gather",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "pattern match",
            "mitre att",
            "ck matrix",
            "href",
            "ascii text",
            "starfield",
            "hybrid",
            "general",
            "local",
            "path",
            "iframe",
            "palantir",
            "present nov",
            "present oct",
            "status",
            "present apr",
            "present dec",
            "cryp",
            "date",
            "trojan",
            "title",
            "name servers",
            "windows",
            "t1060",
            "disables proxy",
            "dock",
            "pegasus",
            "rootkit",
            "backdoor",
            "susp",
            "win32qqpass feb",
            "worm",
            "msr win32",
            "win64",
            "process32nextw",
            "findwindowa",
            "file execution",
            "writeconsolea",
            "procexpl",
            "file v2",
            "document",
            "document file",
            "v2 document",
            "lost",
            "tools",
            "pecompact",
            "media",
            "autorun",
            "service",
            "post http",
            "delete",
            "alerts",
            "emotet",
            "rkt",
            "autorun",
            "worm",
            "plugins",
            "title error",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "domain",
            "expiration date",
            "hostname add",
            "pulse pulses",
            "contacted hosts",
            "sha1",
            "sha256",
            "show technique",
            "strings",
            "t1480 execution",
            "signing defense",
            "script urls",
            "a domains",
            "unknown ns",
            "texas flyover",
            "script domains",
            "script script",
            "meta",
            "window",
            "process details",
            "contacted"
          ],
          "references": [
            "Cart.Guru",
            "Yara Detections: Delphi",
            "Chekin -Fareit/Pony Downloader Checkin 2 \u2022 Generic - POST To gate.php with no referer",
            "MSIL/Injector.RXR Variant CnC Activity Trojanr Generic - POST To gate.php with no referer",
            "HTTP traffic on port 443 (POST)",
            "IDS Detections Observed Suspicious UA (NSIS_Inetc (Mozilla)) Observed DNS Query",
            "Alerts: crime_win_cutwail_stage2  infostealer_browser infostealer_cookies recon_programs",
            "Alerts: banker_zeus_url procmem_yara suricata_alert infostealer_ftp dynamic_function_loading reads_self network_cnc_http",
            "Alerts: network_icmp persistence_autorun deletes_executed_files modifies_certificates",
            "Alerts: ransomware_dropped_files dumped_buffer network_cnc_http network_http",
            "Alerts: network_http_post allocates_rwx antisandbox_sleep antivm_disk_size creates_exe",
            "Alerts: exe_appdata antivm_network_adapters network_downloader_exe privilege_luid_check",
            "Alerts: checks_debugger generates_crypto_key modifies_proxy_wpad",
            "Yara Detections:  Nullsoft_NSIS    ...",
            "Win32:Evo-gen\\ [Susp] http://downwingbuttons.site/7/huge.dat",
            "Small: Win32:Malware-gen (Small) Yara Detections stack_string \u2022 Domains Contacted: amazon.com",
            "Small_Yara:   IP\u2019s Contacted  176.32.103.205  205.251.242.103",
            "Small_Alerts: persistence_autorun disables_proxy removes_zoneid_ads allocates_rwx",
            "Small _Alerts: antisandbox_foregroundwindows suspicious_process stealth_window packer_entropy",
            "Emotet IDS Detections: Win32/Emotet CnC Checkin Response",
            "Emotet Yara: Yara Detections ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users"
          ],
          "public": 1,
          "adversary": "Palantir Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RXR",
              "display_name": "RXR",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "Trojan:Win32/Bagsu!rfn",
              "display_name": "Trojan:Win32/Bagsu!rfn",
              "target": "/malware/Trojan:Win32/Bagsu!rfn"
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "#Lowfi:Win32/SandboxProductId",
              "display_name": "#Lowfi:Win32/SandboxProductId",
              "target": "/malware/#Lowfi:Win32/SandboxProductId"
            },
            {
              "id": "Win32:Backdoor",
              "display_name": "Win32:Backdoor",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "ALF:Trojan:MSIL/BlackFus.C",
              "display_name": "ALF:Trojan:MSIL/BlackFus.C",
              "target": null
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "TrojanProxy:Win32/Ceutv.A",
              "display_name": "TrojanProxy:Win32/Ceutv.A",
              "target": "/malware/TrojanProxy:Win32/Ceutv.A"
            },
            {
              "id": "VirTool:Win32/Obfuscator.AHU",
              "display_name": "VirTool:Win32/Obfuscator.AHU",
              "target": "/malware/VirTool:Win32/Obfuscator.AHU"
            },
            {
              "id": "ShellCode",
              "display_name": "ShellCode",
              "target": null
            },
            {
              "id": "Win32:Rootkit",
              "display_name": "Win32:Rootkit",
              "target": null
            },
            {
              "id": "VB Flash",
              "display_name": "VB Flash",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Win.Packed.Razy-6847895-0",
              "display_name": "Win.Packed.Razy-6847895-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!",
              "display_name": "Backdoor:Win32/Plugx.N!",
              "target": "/malware/Backdoor:Win32/Plugx.N!"
            },
            {
              "id": "Win.Dropper.QQpass-7194329-0",
              "display_name": "Win.Dropper.QQpass-7194329-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "Win32:Agent",
              "display_name": "Win32:Agent",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-7545664-0",
              "display_name": "Win.Trojan.Emotet-7545664-0",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1054",
              "name": "Indicator Blocking",
              "display_name": "T1054 - Indicator Blocking"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2362,
            "domain": 449,
            "hostname": 710,
            "email": 6,
            "FileHash-MD5": 260,
            "FileHash-SHA1": 201,
            "FileHash-SHA256": 333,
            "SSLCertFingerprint": 27
          },
          "indicator_count": 4348,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "82 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69519fa818f84531ce6becc9",
          "name": "Cart.Guru Malware Hosting - Malware Packed _Pegasus Espionage Detected (Positive)",
          "description": "I really love using this tool (LevelBlue -OTX) In all reality this information would have been sent to the government. CISA , NSA, Homeland Security, Citizens Lab, Canada based international organization would have been involved years ago. Where does this information goes. Citizens Lab would has been attempting to track 1000\u2019s of affected Pegasus targets. OTX detected and tagged Pegasus. I suspected it. This is from a Palantir Malware Hosting Honey Pot. \n\nWhen Pegasus was discovered in the wild , credited to those who found what the real team (T8) found, Citizens Lab then conducted tests in 2021\non the cell phone of Jamal Khashoggi, a Saudi dissident journalist. Pegasus is a kill list. \n\nVictims need help. There are a few people even on this platform that are on this list. Unless it\u2019s the US government who has ordered these actions, I don\u2019t know what is going on. The targets are not only innocent, some are crime victims, some are going mad. AT&T corporate easily confirms LevelBlue is legitimate.",
          "modified": "2026-01-27T21:02:45.343000",
          "created": "2025-12-28T21:22:48.383000",
          "tags": [
            "united",
            "servers",
            "moved",
            "ip address",
            "record value",
            "encrypt",
            "present jul",
            "present jun",
            "trojandropper",
            "passive dns",
            "ipv4 add",
            "urls",
            "files",
            "virtool",
            "united states",
            "dynamicloader",
            "directui",
            "element",
            "classinfobase",
            "write c",
            "medium",
            "yara rule",
            "msvisualbasic60",
            "high",
            "hwndelement",
            "explorer",
            "write",
            "movie",
            "insert",
            "program",
            "python",
            "http traffic",
            "trojan generic",
            "search",
            "cnc activity",
            "delphi",
            "win32",
            "launcher",
            "pony",
            "fareit",
            "malware",
            "push",
            "msie",
            "windows nt",
            "generic",
            "checkin",
            "post",
            "yara detections",
            "rxr",
            "inject",
            "memcommit",
            "cryptexportkey",
            "invalid pointer",
            "regsetvalueexa",
            "solutions ltd",
            "read c",
            "regdword",
            "mozilla",
            "persistence",
            "execution",
            "android",
            "unknown",
            "learn",
            "suspicious",
            "informative",
            "adversaries",
            "ck id",
            "name tactics",
            "command",
            "initial access",
            "defense evasion",
            "spawns",
            "t1590 gather",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "pattern match",
            "mitre att",
            "ck matrix",
            "href",
            "ascii text",
            "starfield",
            "hybrid",
            "general",
            "local",
            "path",
            "iframe",
            "palantir",
            "present nov",
            "present oct",
            "status",
            "present apr",
            "present dec",
            "cryp",
            "date",
            "trojan",
            "title",
            "name servers",
            "windows",
            "t1060",
            "disables proxy",
            "dock",
            "pegasus",
            "rootkit",
            "backdoor",
            "susp",
            "win32qqpass feb",
            "worm",
            "msr win32",
            "win64",
            "process32nextw",
            "findwindowa",
            "file execution",
            "writeconsolea",
            "procexpl",
            "file v2",
            "document",
            "document file",
            "v2 document",
            "lost",
            "tools",
            "pecompact",
            "media",
            "autorun",
            "service",
            "post http",
            "delete",
            "alerts",
            "emotet",
            "rkt",
            "autorun",
            "worm",
            "plugins",
            "title error",
            "body doctype",
            "html public",
            "w3cdtd html",
            "html head",
            "domain",
            "expiration date",
            "hostname add",
            "pulse pulses",
            "contacted hosts",
            "sha1",
            "sha256",
            "show technique",
            "strings",
            "t1480 execution",
            "signing defense",
            "script urls",
            "a domains",
            "unknown ns",
            "texas flyover",
            "script domains",
            "script script",
            "meta",
            "window",
            "process details",
            "contacted"
          ],
          "references": [
            "Cart.Guru",
            "Yara Detections: Delphi",
            "Chekin -Fareit/Pony Downloader Checkin 2 \u2022 Generic - POST To gate.php with no referer",
            "MSIL/Injector.RXR Variant CnC Activity Trojanr Generic - POST To gate.php with no referer",
            "HTTP traffic on port 443 (POST)",
            "IDS Detections Observed Suspicious UA (NSIS_Inetc (Mozilla)) Observed DNS Query",
            "Alerts: crime_win_cutwail_stage2  infostealer_browser infostealer_cookies recon_programs",
            "Alerts: banker_zeus_url procmem_yara suricata_alert infostealer_ftp dynamic_function_loading reads_self network_cnc_http",
            "Alerts: network_icmp persistence_autorun deletes_executed_files modifies_certificates",
            "Alerts: ransomware_dropped_files dumped_buffer network_cnc_http network_http",
            "Alerts: network_http_post allocates_rwx antisandbox_sleep antivm_disk_size creates_exe",
            "Alerts: exe_appdata antivm_network_adapters network_downloader_exe privilege_luid_check",
            "Alerts: checks_debugger generates_crypto_key modifies_proxy_wpad",
            "Yara Detections:  Nullsoft_NSIS    ...",
            "Win32:Evo-gen\\ [Susp] http://downwingbuttons.site/7/huge.dat",
            "Small: Win32:Malware-gen (Small) Yara Detections stack_string \u2022 Domains Contacted: amazon.com",
            "Small_Yara:   IP\u2019s Contacted  176.32.103.205  205.251.242.103",
            "Small_Alerts: persistence_autorun disables_proxy removes_zoneid_ads allocates_rwx",
            "Small _Alerts: antisandbox_foregroundwindows suspicious_process stealth_window packer_entropy",
            "Emotet IDS Detections: Win32/Emotet CnC Checkin Response",
            "Emotet Yara: Yara Detections ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users"
          ],
          "public": 1,
          "adversary": "Palantir Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RXR",
              "display_name": "RXR",
              "target": null
            },
            {
              "id": "Pony",
              "display_name": "Pony",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "Trojan:Win32/Bagsu!rfn",
              "display_name": "Trojan:Win32/Bagsu!rfn",
              "target": "/malware/Trojan:Win32/Bagsu!rfn"
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "#Lowfi:Win32/SandboxProductId",
              "display_name": "#Lowfi:Win32/SandboxProductId",
              "target": "/malware/#Lowfi:Win32/SandboxProductId"
            },
            {
              "id": "Win32:Backdoor",
              "display_name": "Win32:Backdoor",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "ALF:Trojan:MSIL/BlackFus.C",
              "display_name": "ALF:Trojan:MSIL/BlackFus.C",
              "target": null
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "TrojanProxy:Win32/Ceutv.A",
              "display_name": "TrojanProxy:Win32/Ceutv.A",
              "target": "/malware/TrojanProxy:Win32/Ceutv.A"
            },
            {
              "id": "VirTool:Win32/Obfuscator.AHU",
              "display_name": "VirTool:Win32/Obfuscator.AHU",
              "target": "/malware/VirTool:Win32/Obfuscator.AHU"
            },
            {
              "id": "ShellCode",
              "display_name": "ShellCode",
              "target": null
            },
            {
              "id": "Win32:Rootkit",
              "display_name": "Win32:Rootkit",
              "target": null
            },
            {
              "id": "VB Flash",
              "display_name": "VB Flash",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Win.Packed.Razy-6847895-0",
              "display_name": "Win.Packed.Razy-6847895-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!",
              "display_name": "Backdoor:Win32/Plugx.N!",
              "target": "/malware/Backdoor:Win32/Plugx.N!"
            },
            {
              "id": "Win.Dropper.QQpass-7194329-0",
              "display_name": "Win.Dropper.QQpass-7194329-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "Win32:Agent",
              "display_name": "Win32:Agent",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-7545664-0",
              "display_name": "Win.Trojan.Emotet-7545664-0",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1054",
              "name": "Indicator Blocking",
              "display_name": "T1054 - Indicator Blocking"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2362,
            "domain": 449,
            "hostname": 710,
            "email": 6,
            "FileHash-MD5": 260,
            "FileHash-SHA1": 201,
            "FileHash-SHA256": 333,
            "SSLCertFingerprint": 27
          },
          "indicator_count": 4348,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "82 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f3ef3b05672ba47b903e3",
          "name": "Create Amazing Password Forms - Project Cicada",
          "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
          "modified": "2026-01-13T22:02:50.260000",
          "created": "2025-12-14T22:49:23.114000",
          "tags": [
            "cicada",
            "project cicada",
            "united states",
            "quasi government",
            "asnone country",
            "united",
            "moved",
            "agent",
            "meta",
            "title error",
            "reverse dns",
            "servers",
            "urls",
            "url analysis",
            "aaaa",
            "present dec",
            "ip address",
            "america flag",
            "unknown",
            "Christopher P. \u2018Buzz\u2019 Ahmann",
            "brian sabey.",
            "State of Colorado",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results mar",
            "avast avg",
            "qualified immunity",
            "address google",
            "freeman",
            "mathis",
            "special forces",
            "tailored access",
            "tao",
            "hacker force",
            "infiltrate",
            "manipulate",
            "sabotage",
            "tools",
            "show",
            "results nov",
            "9b",
            "tao operations",
            "root9b",
            "hunt operations",
            "error mar",
            "over watch",
            "overkill",
            "read c",
            "memcommit",
            "high",
            "checks",
            "windows",
            "delete",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "next",
            "local",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "suspicious_write_exe",
            "network_icmp",
            "antisandbox_restart",
            "creates_largekey",
            "infostealer_keylogger",
            "proess_martian",
            "injection_resumethread",
            "allocates_rwx",
            "targeted intelligence",
            "js_eval",
            "network_http",
            "name servers",
            "value domain",
            "domain name",
            "expiration date",
            "safe browsing",
            "unknown ns",
            "record value",
            "vercel",
            "certificate",
            "domain add",
            "refresh",
            "encrypt",
            "x vercel",
            "k jun",
            "mtb jul",
            "next http",
            "scans record",
            "value",
            "deployment not",
            "ransom",
            "trojan",
            "a domains",
            "safari",
            "android",
            "webkit",
            "animation",
            "click",
            "title",
            "passive dns",
            "gmt content",
            "arial helvetica",
            "ipv4 add",
            "status",
            "search",
            "emails",
            "as15169 google",
            "virtool",
            "cryp",
            "as396982",
            "win32",
            "error",
            "code",
            "domain",
            "showing",
            "query",
            "hostile",
            "observed dns",
            "et dns",
            "et info",
            "dns query",
            "malware",
            "push",
            "gmt cache",
            "sameorigin",
            "files",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "as44273 host",
            "hostname add",
            "unknown aaaa",
            "win32upatre dec",
            "mtb dec",
            "trojandropper",
            "hstr",
            "next associated",
            "backdoor",
            "entity",
            "tempe",
            "present sep",
            "hostname",
            "verdict",
            "lowfi",
            "usesscrrun",
            "ipv4",
            "element",
            "password",
            "developers",
            "create",
            "forms web",
            "group",
            "make sure",
            "autocomplete",
            "currentpassword",
            "make",
            "extraction",
            "data upload",
            "search otx",
            "ider data",
            "asn na",
            "ag da",
            "source level",
            "url text",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "asn16509",
            "amazon02",
            "resource",
            "hash",
            "as16509",
            "us note",
            "route",
            "redacted for",
            "script urls",
            "japan unknown",
            "present apr",
            "present mar",
            "accept",
            "cookie",
            "path",
            "sectigo https",
            "encrypt https",
            "log id",
            "trustasia https",
            "amazon",
            "search criteria",
            "22965417271",
            "summary leaf",
            "timestamp entry",
            "log operator",
            "https",
            "script script",
            "cname",
            "present jun",
            "coup",
            "files ip",
            "address",
            "location united",
            "asn as16509",
            "color value",
            "item tile",
            "gmt max",
            "primary text",
            "text color",
            "play button",
            "search bar",
            "dasher",
            "flag",
            "bad traffic",
            "tls handshake",
            "failure",
            "analysis tip",
            "windir",
            "openurl c",
            "ascii text",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "network traffic",
            "beginstring",
            "show process",
            "null",
            "span",
            "general",
            "strings",
            "look",
            "verify",
            "restart",
            "dynamicloader",
            "ee fc",
            "yara rule",
            "ff d5",
            "c1 e0",
            "f0 ff",
            "ff ff",
            "eb e2",
            "ed b8",
            "fe ff",
            "june",
            "polymorphic",
            "network cnc",
            "cnc",
            "dead connect",
            "present nov",
            "france unknown",
            "generic http",
            "exe upload",
            "uploading exe",
            "intel",
            "ms windows",
            "medium",
            "http traffic",
            "monitored target",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "learn",
            "command",
            "suspicious",
            "informative",
            "name tactics",
            "spawns",
            "t1480 execution",
            "file defense",
            "file discovery",
            "t1071",
            "t1057",
            "segoe ui",
            "script",
            "html",
            "body",
            "twitter",
            "formbook cnc",
            "checkin",
            "pegasus",
            "get updates",
            "p2p zeus",
            "downloader",
            "mpress",
            "win32upatre sep",
            "win32upatre oct",
            "win32upatre nov",
            "india unknown",
            "r61afin",
            "common upatre",
            "write c",
            "cts exe",
            "ids detections",
            "open",
            "present aug",
            "singapore",
            "date",
            "creation date",
            "pentest people",
            "tesla hackers",
            "vietnam unknown",
            "viet nam",
            "company limited",
            "pulse pulses"
          ],
          "references": [
            "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
            "dev-app.project-cicada.com \u2022 project-cicada.com",
            "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
            "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
            "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
            "api.acumatica.flex.redteam.com",
            "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
            "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
            "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
            "https://goo.gl/9p2vKq",
            "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
            "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
            "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
            "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
            "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
            "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
            "IDS Detections Gh0stCringe CnC Activity M2",
            "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
            "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
            "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
            "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
            "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
            "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
          ],
          "public": 1,
          "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Doc.Downloader.EmotetRed02220-9938909-0",
              "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/VB.IL",
              "display_name": "TrojanDropper:Win32/VB.IL",
              "target": "/malware/TrojanDropper:Win32/VB.IL"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Cymt",
              "display_name": "Cymt",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.AA",
              "display_name": "TrojanDownloader:Win32/Upatre.AA",
              "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
            },
            {
              "id": "Win.Trojan.Gh0stRAT-9955419-1",
              "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
              "target": null
            },
            {
              "id": "Win32:MalOb-BX",
              "display_name": "Win32:MalOb-BX",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.K",
              "display_name": "VirTool:Win32/Obfuscator.K",
              "target": "/malware/VirTool:Win32/Obfuscator.K"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11102,
            "hostname": 4142,
            "domain": 4251,
            "email": 15,
            "FileHash-SHA256": 3108,
            "FileHash-MD5": 624,
            "FileHash-SHA1": 490,
            "CIDR": 1,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 23736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "96 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68eff833ed84ceaf611521d2",
          "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
          "description": "",
          "modified": "2025-10-15T19:38:27.739000",
          "created": "2025-10-15T19:38:27.739000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": "68c73fbd85dfbb4d41006ad1",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "186 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c73fbd85dfbb4d41006ad1",
          "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
          "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
          "modified": "2025-10-14T22:26:18.109000",
          "created": "2025-09-14T22:20:45.617000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66fc29a49b5ac693c8d75122",
          "name": "Medical Campus - Aurora, Co | Recheck",
          "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
          "modified": "2024-10-31T16:03:52.240000",
          "created": "2024-10-01T16:56:04.004000",
          "tags": [
            "united",
            "as397240",
            "search",
            "showing",
            "as54113",
            "as397241",
            "unknown",
            "moved",
            "creation date",
            "record value",
            "next",
            "date",
            "body",
            "a domains",
            "passive dns",
            "formbook cnc",
            "checkin",
            "entries",
            "github pages",
            "sea x",
            "accept",
            "status",
            "name servers",
            "certificate",
            "urls",
            "aaaa",
            "cname",
            "meta",
            "whitelisted ip",
            "address",
            "location united",
            "asn as36459",
            "github",
            "less whois",
            "registrar",
            "markmonitor",
            "related tags",
            "as36459",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "ninite",
            "expiration date",
            "domain",
            "hostname",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "document file",
            "v2 document",
            "utf8",
            "crlf line",
            "beginstring",
            "size",
            "null",
            "hybrid",
            "refresh",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "url https",
            "tulach type",
            "role title",
            "added active",
            "pulses url",
            "url http",
            "nextc type",
            "type indicator",
            "related pulses",
            "filehashsha256",
            "copyright",
            "ipv6",
            "germany",
            "italy",
            "trojan",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "linux x8664",
            "khtml",
            "gecko",
            "veryhigh",
            "redirect",
            "httpsupgrades",
            "collisionbox",
            "runner",
            "gameoverpanel",
            "trex",
            "orgtechhandle",
            "orgtechref",
            "director",
            "university",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "orgid",
            "east",
            "report spam",
            "as8075",
            "servers",
            "secure server",
            "error all",
            "typeof",
            "error f",
            "crazy doll",
            "created",
            "filehashmd5",
            "types of",
            "russia",
            "emotet type",
            "mirai type",
            "mirai",
            "mtb description",
            "win32 type",
            "as31034 aruba",
            "italy unknown",
            "as19527 google",
            "encrypt",
            "health type",
            "miori hackers",
            "brute force",
            "backdoor",
            "aurora",
            "ip address",
            "path",
            "unis",
            "dotcisoffer",
            "bladabindi",
            "artro",
            "script urls",
            "as46606",
            "brazil unknown",
            "as11284",
            "as10906",
            "apache",
            "lanc type",
            "telper",
            "win32",
            "win64",
            "pulses email",
            "as9009 m247",
            "as7296 alchemy",
            "as14061",
            "as16276",
            "trojandropper",
            "ransom",
            "mtb sep",
            "msie",
            "chrome",
            "ip check",
            "gmt content",
            "pulse submit",
            "url analysis",
            "files ip",
            "aaaa nxdomain",
            "nxdomain",
            "a nxdomain",
            "as22612",
            "dnssec",
            "meta http",
            "accept encoding",
            "request id",
            "united kingdom",
            "div div",
            "arial helvetica",
            "emails",
            "as15169 google",
            "cryp",
            "gmt cache",
            "sameorigin",
            "domain name",
            "code",
            "false",
            "command type",
            "roleselfservice",
            "mcig sep",
            "all search",
            "author avatar",
            "days ago",
            "http",
            "related nids",
            "files location",
            "as30081",
            "gmt contenttype",
            "mozilla",
            "as15133 verizon",
            "whitelisted",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "softcnapp",
            "overview ip",
            "flag united",
            "files related",
            "as62597 nsone",
            "as31898 oracle",
            "mtb aug",
            "class",
            "twitter",
            "april",
            "secure",
            "httponly",
            "expiresthu",
            "pragma",
            "as13414 twitter",
            "smoke loader",
            "reverse dns",
            "asnone united",
            "idlogin sep",
            "uid38009",
            "expiration",
            "hack type",
            "porn type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Aruba"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3850,
            "FileHash-MD5": 6012,
            "FileHash-SHA1": 5906,
            "domain": 3329,
            "email": 33,
            "hostname": 4231,
            "CVE": 2,
            "FileHash-SHA256": 8407,
            "CIDR": 2,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 31779,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "535 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c235b05007103d3e3e7038",
          "name": "HCA -  Win32:RansomX-gen affecting HCA (HealthOneCares) + Miscellaneous Attacks",
          "description": "HCA (Health One Cares) affected by a RansomX and various serious attacks. It's linked back to a neurosurgeon who is likely not responsible for attack of course. It has been the same,e group of attackers using Samuel Tulach engineered malware. I'm unsure if there is collusion between Brian Sabey (consistent attacker) and Samuel Tulach. I just know it relates back to the same threat actors that have been hacking healthcare facilities, government offices, telecommunications, technology at health centers abusing webcams and patients records modification, and distribution. PHI PII issues.",
          "modified": "2024-09-17T17:01:24.349000",
          "created": "2024-08-18T17:56:00.485000",
          "tags": [
            "blacklist http",
            "safe site",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "alexa top",
            "united",
            "million",
            "mail spammer",
            "malicious site",
            "phishing site",
            "team phishing",
            "tofsee",
            "malware",
            "bank",
            "unsafe",
            "azorult",
            "cobalt strike",
            "service",
            "runescape",
            "facebook",
            "download",
            "zbot",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cl0p",
            "inmortal",
            "domains",
            "referrer",
            "historical ssl",
            "apple stuff",
            "combined",
            "hr rtd",
            "network",
            "collection",
            "vt graph",
            "round",
            "metro",
            "execution",
            "emotet",
            "startpage",
            "maltiverse top",
            "paypal",
            "blacklist",
            "passive dns",
            "related nids",
            "urls",
            "flag united",
            "accept",
            "acceptencoding",
            "hit age",
            "ip asn",
            "malware site",
            "adware",
            "fakealert",
            "opencandy",
            "exploit",
            "raccoon",
            "metastealer",
            "redline stealer",
            "anonymizer",
            "heur",
            "outlook",
            "phishing airbnb",
            "engineering",
            "phishing",
            "filerepmalware",
            "maltiverse",
            "div div",
            "c span",
            "div section",
            "span div",
            "search",
            "showing",
            "unknown",
            "as397240",
            "moved",
            "date",
            "body",
            "as54113",
            "github pages",
            "a domains",
            "entries",
            "mtb jul",
            "class",
            "sea x",
            "scan endpoints",
            "all scoreblue",
            "alf features",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "date hash",
            "next",
            "worm",
            "dynamicloader",
            "yara rule",
            "high",
            "windows",
            "grum",
            "medium",
            "installs",
            "windows startup",
            "application",
            "stream",
            "as22612",
            "ipv4",
            "pulse pulses",
            "files",
            "switch dns",
            "query",
            "data",
            "noname057",
            "password",
            "cybercrime",
            "malicious url",
            "kuaizip",
            "team",
            "downloader",
            "generic",
            "crack",
            "presenoker",
            "dapato",
            "riskware",
            "genkryptik",
            "fuery",
            "agent",
            "wacatac",
            "union",
            "shellexecuteexw",
            "hash",
            "writeconsolew",
            "registry",
            "t1031",
            "trojan",
            "copy",
            "dock",
            "write",
            "win32",
            "file execution",
            "explorer",
            "alerts",
            "checks",
            "bios",
            "system restore",
            "anne",
            "training",
            "strings http",
            "basic telephone",
            "xsl stylesheets",
            "apache fop",
            "createdate",
            "modifydate",
            "producer apache",
            "format",
            "core",
            "nxscspu",
            "zsextbzusbrvsk",
            "pxnzj",
            "jwxkrhdlrivprs",
            "default",
            "qxrfnjuodik",
            "mncau",
            "csqvrkwsqka",
            "testpath path",
            "else",
            "null",
            "suspicious",
            "win64",
            "hotkey",
            "ransom",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "push"
          ],
          "references": [
            "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
            "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
            "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
            "https://work.a-poster.info",
            "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
            "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
            "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
            "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
            "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
            "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
            "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
            "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
            "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
            "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
            "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.YL",
              "display_name": "Trojan:Win32/Emotet.YL",
              "target": "/malware/Trojan:Win32/Emotet.YL"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "display_name": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [
            "Civilian Society",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 891,
            "FileHash-MD5": 2368,
            "FileHash-SHA1": 1873,
            "FileHash-SHA256": 5092,
            "domain": 648,
            "hostname": 557,
            "CVE": 8,
            "email": 2
          },
          "indicator_count": 11439,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "579 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666271a86acba18eb98ce7f3",
          "name": "Unix.Trojan.Mirai-6981158-0 | Win32/1ms0rry CoinMiner Botnet affects android user",
          "description": "Found an IP address in block: http://100.116.0.0/?\nFound on android device user. Target is being tracked.  Uses .ru but tracks back to US based on other studies. Command 'redirect blame' found in association. Active, moved.",
          "modified": "2024-07-07T01:06:11.854000",
          "created": "2024-06-07T02:34:16.108000",
          "tags": [
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "general",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "win32 exe",
            "win32 dll",
            "wextract",
            "type name",
            "pink ribbon",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "address domain",
            "ip related",
            "referrer",
            "doublepulsar",
            "historical ssl",
            "darkpulsar",
            "ru sketchup",
            "flawedammyy",
            "date",
            "hostname",
            "pulse submit",
            "url analysis",
            "verdict",
            "next",
            "a nxdomain",
            "ip address",
            "url http",
            "http",
            "related nids",
            "files location",
            "as9123 timeweb",
            "russia unknown",
            "ipv4",
            "reverse dns",
            "russia",
            "united kingdom",
            "aaaa",
            "as198947 jsc",
            "as29470 jsc",
            "moved",
            "search",
            "nxdomain",
            "files domain",
            "files related",
            "unknown",
            "as63949 linode",
            "germany unknown",
            "main",
            "as59552 vhg",
            "title",
            "div div",
            "gmt content",
            "accept",
            "chegg",
            "regis",
            "special use IP",
            "tracking",
            "locate",
            "pe resource",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "count blacklist",
            "xiaav",
            "windowsxp",
            "script domains",
            "script urls",
            "body doctype",
            "ok server",
            "encrypt",
            "cookie",
            "p div",
            "script script",
            "div section",
            "as21342",
            "js core",
            "a domains",
            "link",
            "as43561",
            "location sofia",
            "telnet",
            "belemet.id",
            "100.116.0.0/?",
            "a li",
            "p td",
            "td tr",
            "a br",
            "meta",
            "as24940 hetzner",
            "grab",
            "this",
            "entries",
            "trojan",
            "ransom",
            "msil",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "malicious site",
            "malicious url",
            "hostnames",
            "blacklist",
            "trickbot",
            "usa",
            "showing",
            "creation date",
            "record value",
            "dnssec",
            "memcommit",
            "win321ms0rry",
            "coinminer",
            "etpro trojan",
            "botnet cnc",
            "checkin",
            "activity",
            "medium",
            "t1055",
            "lowfi",
            "malware",
            "copy"
          ],
          "references": [
            "IP Block: 100.116.0.0/ Details: https://www.virustotal.com/gui/ip-address/100.116.0.0/details",
            "bElement.id",
            "Unix.Mirai IP: https://otx.alienvault.com/indicator/ip/93.170.6.43",
            "https://otx.alienvault.com/indicator/file/a108ff340f5256cc17c1e8345aacc3cf6c91987a1884957ea75df6d23281480b",
            "Yara Detections: is__elf",
            "IDS Detections: TELNET login failed root login Bad Login Generic Ping Keep-Alive Inbound M3",
            "Alerts: network_icmp suricata_alert network_multiple_direct_ip_connections Medium Priority Related Pulses OTX User-Created Pulses (2) Related Tags 10 Related Tags manipulation ,  discovery ,  dhta3eru4egasjn ,  abuse elevation ,  setgid More File Type ELF - ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Size 55 KB (56653 bytes) MD5",
            "IDS Detections MSIL/CoinMiner.ACM CnC Activity Win32/1ms0rry CoinMiner Botnet CnC Checkin",
            "b0t.fun: https://otx.alienvault.com/indicator/domain/b0t.fun",
            "IDS Detections: Win32/1ms0rry CoinMiner Botnet CnC Checkin MSIL/CoinMiner.ACM CnC Activity High Priority",
            "Alerts: nids_malware_alert injection_runpe network_icmp allocates_execute_remote_process antivm_queries_computername",
            "Alerts: persistence_autorun injection_ntsetcontextthread injection_resumethread dumped_buffer network_http raises_exception",
            "Alerts: antivm_network_adapters privilege_luid_check suspicious_tld allocates_rwx moves_self checks_debugger antivm_memory_available",
            "https://www.virustotal.com/gui/ip-address/100.116.0.0/summary"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Russian Federation"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Dark Pulsar",
              "display_name": "Dark Pulsar",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981158-0",
              "display_name": "Unix.Trojan.Mirai-6981158-0",
              "target": null
            },
            {
              "id": "TrickBot",
              "display_name": "TrickBot",
              "target": null
            },
            {
              "id": "Packer.Native",
              "display_name": "Packer.Native",
              "target": null
            },
            {
              "id": "Win.Packed.Lynx",
              "display_name": "Win.Packed.Lynx",
              "target": null
            },
            {
              "id": "Sodinokibi.AB",
              "display_name": "Sodinokibi.AB",
              "target": null
            },
            {
              "id": "CoinMiner.ACM",
              "display_name": "CoinMiner.ACM",
              "target": null
            },
            {
              "id": "CoinMiner.WE",
              "display_name": "CoinMiner.WE",
              "target": null
            },
            {
              "id": "CoinMiner.WM",
              "display_name": "CoinMiner.WM",
              "target": null
            },
            {
              "id": "Win32/1ms0rry",
              "display_name": "Win32/1ms0rry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1078",
              "name": "Valid Accounts",
              "display_name": "T1078 - Valid Accounts"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1195,
            "FileHash-SHA1": 745,
            "FileHash-SHA256": 1212,
            "URL": 2436,
            "domain": 1264,
            "hostname": 1148,
            "email": 1
          },
          "indicator_count": 8001,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "652 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708090c5fea4fa6aff5dd2",
          "name": "https://unisynvoting.com/wp-includes/js/jquery/jquery.min.js",
          "description": "",
          "modified": "2023-12-06T14:09:20.755000",
          "created": "2023-12-06T14:09:20.755000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 175,
            "hostname": 27,
            "URL": 76,
            "domain": 7
          },
          "indicator_count": 285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708082129429d47f027632",
          "name": "broadband.harriscountytx.gov",
          "description": "",
          "modified": "2023-12-06T14:09:06.756000",
          "created": "2023-12-06T14:09:06.756000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 169,
            "hostname": 17,
            "URL": 62,
            "domain": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 253,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653b1969d08c989c50dc0365",
          "name": "ANDROID X",
          "description": "The full text of the full report on Androidx.com.org has been published on the website, following a series of tweets and webcrawls by the author, author and researcher.",
          "modified": "2023-11-26T02:00:38.092000",
          "created": "2023-10-27T01:59:05.401000",
          "tags": [
            "united",
            "moved",
            "script domains",
            "script urls",
            "passive dns",
            "encrypt",
            "body",
            "ubuntu date",
            "gmt content",
            "scan endpoints",
            "tech"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 243,
            "FileHash-SHA1": 873,
            "domain": 172,
            "hostname": 365,
            "FileHash-SHA256": 5529,
            "FileHash-MD5": 890,
            "SSLCertFingerprint": 5,
            "email": 4,
            "CVE": 2
          },
          "indicator_count": 8083,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 82,
          "modified_text": "876 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "622283a32ccdc77b5179b26a",
          "name": "https://unisynvoting.com/wp-includes/js/jquery/jquery.min.js",
          "description": "",
          "modified": "2022-03-04T21:24:51.907000",
          "created": "2022-03-04T21:24:51.907000",
          "tags": [
            "script urls",
            "unisyn voting",
            "script",
            "a domains",
            "script domains",
            "page",
            "server response",
            "response code",
            "gmt contenttype",
            "expires",
            "meta"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 175,
            "URL": 76,
            "hostname": 27,
            "domain": 7
          },
          "indicator_count": 285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1507 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "622273cd5d37f7dce4f5fd4f",
          "name": "broadband.harriscountytx.gov",
          "description": "",
          "modified": "2022-03-04T20:17:17.274000",
          "created": "2022-03-04T20:17:17.274000",
          "tags": [
            "script script",
            "link",
            "a domains",
            "i span",
            "script",
            "httponly",
            "office",
            "input",
            "div div",
            "a li",
            "virustotal",
            "body",
            "cookie",
            "date",
            "form"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 62,
            "FileHash-SHA256": 169,
            "hostname": 17,
            "domain": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 253,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1507 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts: exe_appdata antivm_network_adapters network_downloader_exe privilege_luid_check",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Small _Alerts: antisandbox_foregroundwindows suspicious_process stealth_window packer_entropy",
        "Alerts: checks_debugger generates_crypto_key modifies_proxy_wpad",
        "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
        "Win32:Evo-gen\\ [Susp] http://downwingbuttons.site/7/huge.dat",
        "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
        "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
        "Emotet Yara: Yara Detections ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users",
        "Alerts: network_icmp persistence_autorun deletes_executed_files modifies_certificates",
        "Unix.Mirai IP: https://otx.alienvault.com/indicator/ip/93.170.6.43",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "HTTP traffic on port 443 (POST)",
        "IP Block: 100.116.0.0/ Details: https://www.virustotal.com/gui/ip-address/100.116.0.0/details",
        "IDS Detections: TELNET login failed root login Bad Login Generic Ping Keep-Alive Inbound M3",
        "Alerts: network_icmp suricata_alert network_multiple_direct_ip_connections Medium Priority Related Pulses OTX User-Created Pulses (2) Related Tags 10 Related Tags manipulation ,  discovery ,  dhta3eru4egasjn ,  abuse elevation ,  setgid More File Type ELF - ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Size 55 KB (56653 bytes) MD5",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://otx.alienvault.com/indicator/file/a108ff340f5256cc17c1e8345aacc3cf6c91987a1884957ea75df6d23281480b",
        "Alerts: nids_malware_alert injection_runpe network_icmp allocates_execute_remote_process antivm_queries_computername",
        "Alerts: crime_win_cutwail_stage2  infostealer_browser infostealer_cookies recon_programs",
        "MSIL/Injector.RXR Variant CnC Activity Trojanr Generic - POST To gate.php with no referer",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
        "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
        "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
        "Small_Alerts: persistence_autorun disables_proxy removes_zoneid_ads allocates_rwx",
        "Alerts: banker_zeus_url procmem_yara suricata_alert infostealer_ftp dynamic_function_loading reads_self network_cnc_http",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "IDS Detections MSIL/CoinMiner.ACM CnC Activity Win32/1ms0rry CoinMiner Botnet CnC Checkin",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
        "Small: Win32:Malware-gen (Small) Yara Detections stack_string \u2022 Domains Contacted: amazon.com",
        "Yara Detections: is__elf",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "IDS Detections Observed Suspicious UA (NSIS_Inetc (Mozilla)) Observed DNS Query",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "b0t.fun: https://otx.alienvault.com/indicator/domain/b0t.fun",
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "Small_Yara:   IP\u2019s Contacted  176.32.103.205  205.251.242.103",
        "IDS Detections: Win32/1ms0rry CoinMiner Botnet CnC Checkin MSIL/CoinMiner.ACM CnC Activity High Priority",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
        "Cart.Guru",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "https://www.virustotal.com/gui/ip-address/100.116.0.0/summary",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Yara Detections: Delphi",
        "Emotet IDS Detections: Win32/Emotet CnC Checkin Response",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "Alerts: network_http_post allocates_rwx antisandbox_sleep antivm_disk_size creates_exe",
        "Alerts: persistence_autorun injection_ntsetcontextthread injection_resumethread dumped_buffer network_http raises_exception",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg",
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "api.acumatica.flex.redteam.com",
        "Alerts: ransomware_dropped_files dumped_buffer network_cnc_http network_http",
        "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
        "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "https://goo.gl/9p2vKq",
        "Alerts: antivm_network_adapters privilege_luid_check suspicious_tld allocates_rwx moves_self checks_debugger antivm_memory_available",
        "Chekin -Fareit/Pony Downloader Checkin 2 \u2022 Generic - POST To gate.php with no referer",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "https://work.a-poster.info",
        "Yara Detections:  Nullsoft_NSIS    ...",
        "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
        "bElement.id",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
            "Palantir Pegasus"
          ],
          "malware_families": [
            "Trojandownloader:win32/cutwail.bs",
            "Win32:trojan",
            "Win32/1ms0rry",
            "Win.trojan.agent",
            "Sodinokibi.ab",
            "Mirai",
            "Win32:evo",
            "Doc.downloader.emotetred02220-9938909-0",
            "Virtool:win32/obfuscator.k",
            "Bancos",
            "Win32:backdoor",
            "Artro",
            "Pony",
            "Win32:agent",
            "Win32:malob-bx\\ [cryp]",
            "Alf:heraklezeval:worm:win32/mimail!rfn",
            "Trojan:win32/qbot.r!mtb",
            "Ransom:win32/crowti.a",
            "Trojandownloader:win32/cutwail",
            "Win32:evo-gen\\ [susp]",
            "Dark pulsar",
            "Win32:malwarex",
            "Trojan:win32/vflooder!rfn",
            "Trojan:win32/emotet.yl",
            "Inmortal",
            "Virtool:win32/obfuscator.ahu",
            "Trojan:win32/bagsu!rfn",
            "Rxr",
            "Trojandownloader:win32/upatre.a",
            "Domains",
            "Tofsee",
            "Hematite",
            "Win.trojan.gh0strat-9955419-1",
            "Malware + code overlap",
            "Trojandownloader:win32/upatre.aa",
            "Win.trojan.emotet-7545664-0",
            "Cymt",
            "Trojandownloader:win32/upatre",
            "Win.malware.jaik-9968280-0",
            "Coinminer.acm",
            "Trojandropper:win32/vb.il",
            "Win32:malob-bx",
            "Win32:dropper",
            "Trojanspy:win32/banker.ly",
            "Ymacco",
            "Upatre",
            "Vb flash",
            "Tulach malware",
            "Trickbot",
            "Backdoor:win32/plugx.n!dha",
            "Win.dropper.qqpass-7194329-0",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Virtool:win32/obfuscator",
            "Trojan:bat/musecador",
            "Backdoor:win32/plugx.n!",
            "Et",
            "Win32:malware",
            "Trojanproxy:win32/ceutv.a",
            "Coinminer.we",
            "Win32:ransomx-gen\\ [ransom]",
            "Shellcode",
            "Pegasus",
            "Pegasus - mob-s0005",
            "Packer.native",
            "#lowfienabledtcontinueafterunpacking",
            "Asacky",
            "#lowfi:win32/sandboxproductid",
            "Worm:win32/lightmoon.h",
            "Virtool:win32/ceeinject.akz!bit",
            "Worm:win32/autorun",
            "Win32:trojanx-gen\\ [trj]",
            "Alf:trojandownloader:powershell/ploprolo.db",
            "Win.packed.razy-6847895-0",
            "Win32:cleaman-k\\ [trj]",
            "Unix.trojan.mirai-6981158-0",
            "Malwarex",
            "Trojan:win32/qqpass",
            "Win.packed.lynx",
            "Cl0p",
            "Trojandropper:win32/bcryptinject.b!msr",
            "Alf:trojan:win32/cassini_f28c33a2",
            "Coinminer.wm",
            "Alf:trojan:msil/blackfus.c",
            "Win32:rootkit"
          ],
          "industries": [
            "Telecommunications",
            "Healthcare",
            "Civilian society",
            "Media",
            "Technology"
          ],
          "unique_indicators": 99303
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/jquery.com",
    "whois": "http://whois.domaintools.com/jquery.com",
    "domain": "jquery.com",
    "hostname": "code.jquery.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 13,
  "pulses": [
    {
      "id": "69519fa81048ad057eb9beaa",
      "name": "Cart.Guru Malware Hosting - Malware Packed _Pegasus Espionage Detected (Positive)",
      "description": "I really love using this tool (LevelBlue -OTX) In all reality this information would have been sent to the government. CISA , NSA, Homeland Security, Citizens Lab, Canada based international organization would have been involved years ago. | \nWhere does this information goes. Citizens Lab would has been attempting to track 1000\u2019s of affected Pegasus targets. OTX detected and tagged Pegasus. I suspected it. This is from a Palantir Malware Hosting Honey Pot. \n\nWhen Pegasus was discovered in the wild , credited to those who found what the real team (T8) found, Citizens Lab then conducted tests in 2021\non the cell phone of Jamal Khashoggi, a Saudi dissident journalist. Pegasus is a kill list. \n\nVictims need help. There are a few people even on this platform that are on this list. Unless it\u2019s the US government who has ordered these actions, I don\u2019t know what is going on. The targets are not only innocent, some are crime victims, some are going mad. AT&T corporate easily confirms LevelBlue is legitimate.",
      "modified": "2026-01-27T21:02:45.343000",
      "created": "2025-12-28T21:22:48.595000",
      "tags": [
        "united",
        "servers",
        "moved",
        "ip address",
        "record value",
        "encrypt",
        "present jul",
        "present jun",
        "trojandropper",
        "passive dns",
        "ipv4 add",
        "urls",
        "files",
        "virtool",
        "united states",
        "dynamicloader",
        "directui",
        "element",
        "classinfobase",
        "write c",
        "medium",
        "yara rule",
        "msvisualbasic60",
        "high",
        "hwndelement",
        "explorer",
        "write",
        "movie",
        "insert",
        "program",
        "python",
        "http traffic",
        "trojan generic",
        "search",
        "cnc activity",
        "delphi",
        "win32",
        "launcher",
        "pony",
        "fareit",
        "malware",
        "push",
        "msie",
        "windows nt",
        "generic",
        "checkin",
        "post",
        "yara detections",
        "rxr",
        "inject",
        "memcommit",
        "cryptexportkey",
        "invalid pointer",
        "regsetvalueexa",
        "solutions ltd",
        "read c",
        "regdword",
        "mozilla",
        "persistence",
        "execution",
        "android",
        "unknown",
        "learn",
        "suspicious",
        "informative",
        "adversaries",
        "ck id",
        "name tactics",
        "command",
        "initial access",
        "defense evasion",
        "spawns",
        "t1590 gather",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "pattern match",
        "mitre att",
        "ck matrix",
        "href",
        "ascii text",
        "starfield",
        "hybrid",
        "general",
        "local",
        "path",
        "iframe",
        "palantir",
        "present nov",
        "present oct",
        "status",
        "present apr",
        "present dec",
        "cryp",
        "date",
        "trojan",
        "title",
        "name servers",
        "windows",
        "t1060",
        "disables proxy",
        "dock",
        "pegasus",
        "rootkit",
        "backdoor",
        "susp",
        "win32qqpass feb",
        "worm",
        "msr win32",
        "win64",
        "process32nextw",
        "findwindowa",
        "file execution",
        "writeconsolea",
        "procexpl",
        "file v2",
        "document",
        "document file",
        "v2 document",
        "lost",
        "tools",
        "pecompact",
        "media",
        "autorun",
        "service",
        "post http",
        "delete",
        "alerts",
        "emotet",
        "rkt",
        "autorun",
        "worm",
        "plugins",
        "title error",
        "body doctype",
        "html public",
        "w3cdtd html",
        "html head",
        "domain",
        "expiration date",
        "hostname add",
        "pulse pulses",
        "contacted hosts",
        "sha1",
        "sha256",
        "show technique",
        "strings",
        "t1480 execution",
        "signing defense",
        "script urls",
        "a domains",
        "unknown ns",
        "texas flyover",
        "script domains",
        "script script",
        "meta",
        "window",
        "process details",
        "contacted"
      ],
      "references": [
        "Cart.Guru",
        "Yara Detections: Delphi",
        "Chekin -Fareit/Pony Downloader Checkin 2 \u2022 Generic - POST To gate.php with no referer",
        "MSIL/Injector.RXR Variant CnC Activity Trojanr Generic - POST To gate.php with no referer",
        "HTTP traffic on port 443 (POST)",
        "IDS Detections Observed Suspicious UA (NSIS_Inetc (Mozilla)) Observed DNS Query",
        "Alerts: crime_win_cutwail_stage2  infostealer_browser infostealer_cookies recon_programs",
        "Alerts: banker_zeus_url procmem_yara suricata_alert infostealer_ftp dynamic_function_loading reads_self network_cnc_http",
        "Alerts: network_icmp persistence_autorun deletes_executed_files modifies_certificates",
        "Alerts: ransomware_dropped_files dumped_buffer network_cnc_http network_http",
        "Alerts: network_http_post allocates_rwx antisandbox_sleep antivm_disk_size creates_exe",
        "Alerts: exe_appdata antivm_network_adapters network_downloader_exe privilege_luid_check",
        "Alerts: checks_debugger generates_crypto_key modifies_proxy_wpad",
        "Yara Detections:  Nullsoft_NSIS    ...",
        "Win32:Evo-gen\\ [Susp] http://downwingbuttons.site/7/huge.dat",
        "Small: Win32:Malware-gen (Small) Yara Detections stack_string \u2022 Domains Contacted: amazon.com",
        "Small_Yara:   IP\u2019s Contacted  176.32.103.205  205.251.242.103",
        "Small_Alerts: persistence_autorun disables_proxy removes_zoneid_ads allocates_rwx",
        "Small _Alerts: antisandbox_foregroundwindows suspicious_process stealth_window packer_entropy",
        "Emotet IDS Detections: Win32/Emotet CnC Checkin Response",
        "Emotet Yara: Yara Detections ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users"
      ],
      "public": 1,
      "adversary": "Palantir Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "RXR",
          "display_name": "RXR",
          "target": null
        },
        {
          "id": "Pony",
          "display_name": "Pony",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "Trojan:Win32/Bagsu!rfn",
          "display_name": "Trojan:Win32/Bagsu!rfn",
          "target": "/malware/Trojan:Win32/Bagsu!rfn"
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "#Lowfi:Win32/SandboxProductId",
          "display_name": "#Lowfi:Win32/SandboxProductId",
          "target": "/malware/#Lowfi:Win32/SandboxProductId"
        },
        {
          "id": "Win32:Backdoor",
          "display_name": "Win32:Backdoor",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "ALF:Trojan:MSIL/BlackFus.C",
          "display_name": "ALF:Trojan:MSIL/BlackFus.C",
          "target": null
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "TrojanProxy:Win32/Ceutv.A",
          "display_name": "TrojanProxy:Win32/Ceutv.A",
          "target": "/malware/TrojanProxy:Win32/Ceutv.A"
        },
        {
          "id": "VirTool:Win32/Obfuscator.AHU",
          "display_name": "VirTool:Win32/Obfuscator.AHU",
          "target": "/malware/VirTool:Win32/Obfuscator.AHU"
        },
        {
          "id": "ShellCode",
          "display_name": "ShellCode",
          "target": null
        },
        {
          "id": "Win32:Rootkit",
          "display_name": "Win32:Rootkit",
          "target": null
        },
        {
          "id": "VB Flash",
          "display_name": "VB Flash",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "Win.Packed.Razy-6847895-0",
          "display_name": "Win.Packed.Razy-6847895-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!",
          "display_name": "Backdoor:Win32/Plugx.N!",
          "target": "/malware/Backdoor:Win32/Plugx.N!"
        },
        {
          "id": "Win.Dropper.QQpass-7194329-0",
          "display_name": "Win.Dropper.QQpass-7194329-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "Win32:Agent",
          "display_name": "Win32:Agent",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-7545664-0",
          "display_name": "Win.Trojan.Emotet-7545664-0",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1054",
          "name": "Indicator Blocking",
          "display_name": "T1054 - Indicator Blocking"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2362,
        "domain": 449,
        "hostname": 710,
        "email": 6,
        "FileHash-MD5": 260,
        "FileHash-SHA1": 201,
        "FileHash-SHA256": 333,
        "SSLCertFingerprint": 27
      },
      "indicator_count": 4348,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "82 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69519fa818f84531ce6becc9",
      "name": "Cart.Guru Malware Hosting - Malware Packed _Pegasus Espionage Detected (Positive)",
      "description": "I really love using this tool (LevelBlue -OTX) In all reality this information would have been sent to the government. CISA , NSA, Homeland Security, Citizens Lab, Canada based international organization would have been involved years ago. Where does this information goes. Citizens Lab would has been attempting to track 1000\u2019s of affected Pegasus targets. OTX detected and tagged Pegasus. I suspected it. This is from a Palantir Malware Hosting Honey Pot. \n\nWhen Pegasus was discovered in the wild , credited to those who found what the real team (T8) found, Citizens Lab then conducted tests in 2021\non the cell phone of Jamal Khashoggi, a Saudi dissident journalist. Pegasus is a kill list. \n\nVictims need help. There are a few people even on this platform that are on this list. Unless it\u2019s the US government who has ordered these actions, I don\u2019t know what is going on. The targets are not only innocent, some are crime victims, some are going mad. AT&T corporate easily confirms LevelBlue is legitimate.",
      "modified": "2026-01-27T21:02:45.343000",
      "created": "2025-12-28T21:22:48.383000",
      "tags": [
        "united",
        "servers",
        "moved",
        "ip address",
        "record value",
        "encrypt",
        "present jul",
        "present jun",
        "trojandropper",
        "passive dns",
        "ipv4 add",
        "urls",
        "files",
        "virtool",
        "united states",
        "dynamicloader",
        "directui",
        "element",
        "classinfobase",
        "write c",
        "medium",
        "yara rule",
        "msvisualbasic60",
        "high",
        "hwndelement",
        "explorer",
        "write",
        "movie",
        "insert",
        "program",
        "python",
        "http traffic",
        "trojan generic",
        "search",
        "cnc activity",
        "delphi",
        "win32",
        "launcher",
        "pony",
        "fareit",
        "malware",
        "push",
        "msie",
        "windows nt",
        "generic",
        "checkin",
        "post",
        "yara detections",
        "rxr",
        "inject",
        "memcommit",
        "cryptexportkey",
        "invalid pointer",
        "regsetvalueexa",
        "solutions ltd",
        "read c",
        "regdword",
        "mozilla",
        "persistence",
        "execution",
        "android",
        "unknown",
        "learn",
        "suspicious",
        "informative",
        "adversaries",
        "ck id",
        "name tactics",
        "command",
        "initial access",
        "defense evasion",
        "spawns",
        "t1590 gather",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "pattern match",
        "mitre att",
        "ck matrix",
        "href",
        "ascii text",
        "starfield",
        "hybrid",
        "general",
        "local",
        "path",
        "iframe",
        "palantir",
        "present nov",
        "present oct",
        "status",
        "present apr",
        "present dec",
        "cryp",
        "date",
        "trojan",
        "title",
        "name servers",
        "windows",
        "t1060",
        "disables proxy",
        "dock",
        "pegasus",
        "rootkit",
        "backdoor",
        "susp",
        "win32qqpass feb",
        "worm",
        "msr win32",
        "win64",
        "process32nextw",
        "findwindowa",
        "file execution",
        "writeconsolea",
        "procexpl",
        "file v2",
        "document",
        "document file",
        "v2 document",
        "lost",
        "tools",
        "pecompact",
        "media",
        "autorun",
        "service",
        "post http",
        "delete",
        "alerts",
        "emotet",
        "rkt",
        "autorun",
        "worm",
        "plugins",
        "title error",
        "body doctype",
        "html public",
        "w3cdtd html",
        "html head",
        "domain",
        "expiration date",
        "hostname add",
        "pulse pulses",
        "contacted hosts",
        "sha1",
        "sha256",
        "show technique",
        "strings",
        "t1480 execution",
        "signing defense",
        "script urls",
        "a domains",
        "unknown ns",
        "texas flyover",
        "script domains",
        "script script",
        "meta",
        "window",
        "process details",
        "contacted"
      ],
      "references": [
        "Cart.Guru",
        "Yara Detections: Delphi",
        "Chekin -Fareit/Pony Downloader Checkin 2 \u2022 Generic - POST To gate.php with no referer",
        "MSIL/Injector.RXR Variant CnC Activity Trojanr Generic - POST To gate.php with no referer",
        "HTTP traffic on port 443 (POST)",
        "IDS Detections Observed Suspicious UA (NSIS_Inetc (Mozilla)) Observed DNS Query",
        "Alerts: crime_win_cutwail_stage2  infostealer_browser infostealer_cookies recon_programs",
        "Alerts: banker_zeus_url procmem_yara suricata_alert infostealer_ftp dynamic_function_loading reads_self network_cnc_http",
        "Alerts: network_icmp persistence_autorun deletes_executed_files modifies_certificates",
        "Alerts: ransomware_dropped_files dumped_buffer network_cnc_http network_http",
        "Alerts: network_http_post allocates_rwx antisandbox_sleep antivm_disk_size creates_exe",
        "Alerts: exe_appdata antivm_network_adapters network_downloader_exe privilege_luid_check",
        "Alerts: checks_debugger generates_crypto_key modifies_proxy_wpad",
        "Yara Detections:  Nullsoft_NSIS    ...",
        "Win32:Evo-gen\\ [Susp] http://downwingbuttons.site/7/huge.dat",
        "Small: Win32:Malware-gen (Small) Yara Detections stack_string \u2022 Domains Contacted: amazon.com",
        "Small_Yara:   IP\u2019s Contacted  176.32.103.205  205.251.242.103",
        "Small_Alerts: persistence_autorun disables_proxy removes_zoneid_ads allocates_rwx",
        "Small _Alerts: antisandbox_foregroundwindows suspicious_process stealth_window packer_entropy",
        "Emotet IDS Detections: Win32/Emotet CnC Checkin Response",
        "Emotet Yara: Yara Detections ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users"
      ],
      "public": 1,
      "adversary": "Palantir Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "RXR",
          "display_name": "RXR",
          "target": null
        },
        {
          "id": "Pony",
          "display_name": "Pony",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "Trojan:Win32/Bagsu!rfn",
          "display_name": "Trojan:Win32/Bagsu!rfn",
          "target": "/malware/Trojan:Win32/Bagsu!rfn"
        },
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "#Lowfi:Win32/SandboxProductId",
          "display_name": "#Lowfi:Win32/SandboxProductId",
          "target": "/malware/#Lowfi:Win32/SandboxProductId"
        },
        {
          "id": "Win32:Backdoor",
          "display_name": "Win32:Backdoor",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "ALF:Trojan:MSIL/BlackFus.C",
          "display_name": "ALF:Trojan:MSIL/BlackFus.C",
          "target": null
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "TrojanProxy:Win32/Ceutv.A",
          "display_name": "TrojanProxy:Win32/Ceutv.A",
          "target": "/malware/TrojanProxy:Win32/Ceutv.A"
        },
        {
          "id": "VirTool:Win32/Obfuscator.AHU",
          "display_name": "VirTool:Win32/Obfuscator.AHU",
          "target": "/malware/VirTool:Win32/Obfuscator.AHU"
        },
        {
          "id": "ShellCode",
          "display_name": "ShellCode",
          "target": null
        },
        {
          "id": "Win32:Rootkit",
          "display_name": "Win32:Rootkit",
          "target": null
        },
        {
          "id": "VB Flash",
          "display_name": "VB Flash",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "Win.Packed.Razy-6847895-0",
          "display_name": "Win.Packed.Razy-6847895-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!",
          "display_name": "Backdoor:Win32/Plugx.N!",
          "target": "/malware/Backdoor:Win32/Plugx.N!"
        },
        {
          "id": "Win.Dropper.QQpass-7194329-0",
          "display_name": "Win.Dropper.QQpass-7194329-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "Win32:Agent",
          "display_name": "Win32:Agent",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-7545664-0",
          "display_name": "Win.Trojan.Emotet-7545664-0",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1054",
          "name": "Indicator Blocking",
          "display_name": "T1054 - Indicator Blocking"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2362,
        "domain": 449,
        "hostname": 710,
        "email": 6,
        "FileHash-MD5": 260,
        "FileHash-SHA1": 201,
        "FileHash-SHA256": 333,
        "SSLCertFingerprint": 27
      },
      "indicator_count": 4348,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "82 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f3ef3b05672ba47b903e3",
      "name": "Create Amazing Password Forms - Project Cicada",
      "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
      "modified": "2026-01-13T22:02:50.260000",
      "created": "2025-12-14T22:49:23.114000",
      "tags": [
        "cicada",
        "project cicada",
        "united states",
        "quasi government",
        "asnone country",
        "united",
        "moved",
        "agent",
        "meta",
        "title error",
        "reverse dns",
        "servers",
        "urls",
        "url analysis",
        "aaaa",
        "present dec",
        "ip address",
        "america flag",
        "unknown",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "brian sabey.",
        "State of Colorado",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results mar",
        "avast avg",
        "qualified immunity",
        "address google",
        "freeman",
        "mathis",
        "special forces",
        "tailored access",
        "tao",
        "hacker force",
        "infiltrate",
        "manipulate",
        "sabotage",
        "tools",
        "show",
        "results nov",
        "9b",
        "tao operations",
        "root9b",
        "hunt operations",
        "error mar",
        "over watch",
        "overkill",
        "read c",
        "memcommit",
        "high",
        "checks",
        "windows",
        "delete",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "next",
        "local",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "suspicious_write_exe",
        "network_icmp",
        "antisandbox_restart",
        "creates_largekey",
        "infostealer_keylogger",
        "proess_martian",
        "injection_resumethread",
        "allocates_rwx",
        "targeted intelligence",
        "js_eval",
        "network_http",
        "name servers",
        "value domain",
        "domain name",
        "expiration date",
        "safe browsing",
        "unknown ns",
        "record value",
        "vercel",
        "certificate",
        "domain add",
        "refresh",
        "encrypt",
        "x vercel",
        "k jun",
        "mtb jul",
        "next http",
        "scans record",
        "value",
        "deployment not",
        "ransom",
        "trojan",
        "a domains",
        "safari",
        "android",
        "webkit",
        "animation",
        "click",
        "title",
        "passive dns",
        "gmt content",
        "arial helvetica",
        "ipv4 add",
        "status",
        "search",
        "emails",
        "as15169 google",
        "virtool",
        "cryp",
        "as396982",
        "win32",
        "error",
        "code",
        "domain",
        "showing",
        "query",
        "hostile",
        "observed dns",
        "et dns",
        "et info",
        "dns query",
        "malware",
        "push",
        "gmt cache",
        "sameorigin",
        "files",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "as44273 host",
        "hostname add",
        "unknown aaaa",
        "win32upatre dec",
        "mtb dec",
        "trojandropper",
        "hstr",
        "next associated",
        "backdoor",
        "entity",
        "tempe",
        "present sep",
        "hostname",
        "verdict",
        "lowfi",
        "usesscrrun",
        "ipv4",
        "element",
        "password",
        "developers",
        "create",
        "forms web",
        "group",
        "make sure",
        "autocomplete",
        "currentpassword",
        "make",
        "extraction",
        "data upload",
        "search otx",
        "ider data",
        "asn na",
        "ag da",
        "source level",
        "url text",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "asn16509",
        "amazon02",
        "resource",
        "hash",
        "as16509",
        "us note",
        "route",
        "redacted for",
        "script urls",
        "japan unknown",
        "present apr",
        "present mar",
        "accept",
        "cookie",
        "path",
        "sectigo https",
        "encrypt https",
        "log id",
        "trustasia https",
        "amazon",
        "search criteria",
        "22965417271",
        "summary leaf",
        "timestamp entry",
        "log operator",
        "https",
        "script script",
        "cname",
        "present jun",
        "coup",
        "files ip",
        "address",
        "location united",
        "asn as16509",
        "color value",
        "item tile",
        "gmt max",
        "primary text",
        "text color",
        "play button",
        "search bar",
        "dasher",
        "flag",
        "bad traffic",
        "tls handshake",
        "failure",
        "analysis tip",
        "windir",
        "openurl c",
        "ascii text",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "network traffic",
        "beginstring",
        "show process",
        "null",
        "span",
        "general",
        "strings",
        "look",
        "verify",
        "restart",
        "dynamicloader",
        "ee fc",
        "yara rule",
        "ff d5",
        "c1 e0",
        "f0 ff",
        "ff ff",
        "eb e2",
        "ed b8",
        "fe ff",
        "june",
        "polymorphic",
        "network cnc",
        "cnc",
        "dead connect",
        "present nov",
        "france unknown",
        "generic http",
        "exe upload",
        "uploading exe",
        "intel",
        "ms windows",
        "medium",
        "http traffic",
        "monitored target",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "learn",
        "command",
        "suspicious",
        "informative",
        "name tactics",
        "spawns",
        "t1480 execution",
        "file defense",
        "file discovery",
        "t1071",
        "t1057",
        "segoe ui",
        "script",
        "html",
        "body",
        "twitter",
        "formbook cnc",
        "checkin",
        "pegasus",
        "get updates",
        "p2p zeus",
        "downloader",
        "mpress",
        "win32upatre sep",
        "win32upatre oct",
        "win32upatre nov",
        "india unknown",
        "r61afin",
        "common upatre",
        "write c",
        "cts exe",
        "ids detections",
        "open",
        "present aug",
        "singapore",
        "date",
        "creation date",
        "pentest people",
        "tesla hackers",
        "vietnam unknown",
        "viet nam",
        "company limited",
        "pulse pulses"
      ],
      "references": [
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "api.acumatica.flex.redteam.com",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "https://goo.gl/9p2vKq",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
      ],
      "public": 1,
      "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Doc.Downloader.EmotetRed02220-9938909-0",
          "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/VB.IL",
          "display_name": "TrojanDropper:Win32/VB.IL",
          "target": "/malware/TrojanDropper:Win32/VB.IL"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Cymt",
          "display_name": "Cymt",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.AA",
          "display_name": "TrojanDownloader:Win32/Upatre.AA",
          "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
        },
        {
          "id": "Win.Trojan.Gh0stRAT-9955419-1",
          "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
          "target": null
        },
        {
          "id": "Win32:MalOb-BX",
          "display_name": "Win32:MalOb-BX",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.K",
          "display_name": "VirTool:Win32/Obfuscator.K",
          "target": "/malware/VirTool:Win32/Obfuscator.K"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11102,
        "hostname": 4142,
        "domain": 4251,
        "email": 15,
        "FileHash-SHA256": 3108,
        "FileHash-MD5": 624,
        "FileHash-SHA1": 490,
        "CIDR": 1,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 23736,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "96 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68eff833ed84ceaf611521d2",
      "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
      "description": "",
      "modified": "2025-10-15T19:38:27.739000",
      "created": "2025-10-15T19:38:27.739000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": "68c73fbd85dfbb4d41006ad1",
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "186 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c73fbd85dfbb4d41006ad1",
      "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
      "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
      "modified": "2025-10-14T22:26:18.109000",
      "created": "2025-09-14T22:20:45.617000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "187 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66fc29a49b5ac693c8d75122",
      "name": "Medical Campus - Aurora, Co | Recheck",
      "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
      "modified": "2024-10-31T16:03:52.240000",
      "created": "2024-10-01T16:56:04.004000",
      "tags": [
        "united",
        "as397240",
        "search",
        "showing",
        "as54113",
        "as397241",
        "unknown",
        "moved",
        "creation date",
        "record value",
        "next",
        "date",
        "body",
        "a domains",
        "passive dns",
        "formbook cnc",
        "checkin",
        "entries",
        "github pages",
        "sea x",
        "accept",
        "status",
        "name servers",
        "certificate",
        "urls",
        "aaaa",
        "cname",
        "meta",
        "whitelisted ip",
        "address",
        "location united",
        "asn as36459",
        "github",
        "less whois",
        "registrar",
        "markmonitor",
        "related tags",
        "as36459",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "files",
        "ninite",
        "expiration date",
        "domain",
        "hostname",
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "document file",
        "v2 document",
        "utf8",
        "crlf line",
        "beginstring",
        "size",
        "null",
        "hybrid",
        "refresh",
        "span",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "url https",
        "tulach type",
        "role title",
        "added active",
        "pulses url",
        "url http",
        "nextc type",
        "type indicator",
        "related pulses",
        "filehashsha256",
        "copyright",
        "ipv6",
        "germany",
        "italy",
        "trojan",
        "trojanspy",
        "worm",
        "trojanclicker",
        "virtool",
        "service",
        "linux x8664",
        "khtml",
        "gecko",
        "veryhigh",
        "redirect",
        "httpsupgrades",
        "collisionbox",
        "runner",
        "gameoverpanel",
        "trex",
        "orgtechhandle",
        "orgtechref",
        "director",
        "university",
        "nethandle",
        "net168",
        "net1680000",
        "ucha",
        "orgid",
        "east",
        "report spam",
        "as8075",
        "servers",
        "secure server",
        "error all",
        "typeof",
        "error f",
        "crazy doll",
        "created",
        "filehashmd5",
        "types of",
        "russia",
        "emotet type",
        "mirai type",
        "mirai",
        "mtb description",
        "win32 type",
        "as31034 aruba",
        "italy unknown",
        "as19527 google",
        "encrypt",
        "health type",
        "miori hackers",
        "brute force",
        "backdoor",
        "aurora",
        "ip address",
        "path",
        "unis",
        "dotcisoffer",
        "bladabindi",
        "artro",
        "script urls",
        "as46606",
        "brazil unknown",
        "as11284",
        "as10906",
        "apache",
        "lanc type",
        "telper",
        "win32",
        "win64",
        "pulses email",
        "as9009 m247",
        "as7296 alchemy",
        "as14061",
        "as16276",
        "trojandropper",
        "ransom",
        "mtb sep",
        "msie",
        "chrome",
        "ip check",
        "gmt content",
        "pulse submit",
        "url analysis",
        "files ip",
        "aaaa nxdomain",
        "nxdomain",
        "a nxdomain",
        "as22612",
        "dnssec",
        "meta http",
        "accept encoding",
        "request id",
        "united kingdom",
        "div div",
        "arial helvetica",
        "emails",
        "as15169 google",
        "cryp",
        "gmt cache",
        "sameorigin",
        "domain name",
        "code",
        "false",
        "command type",
        "roleselfservice",
        "mcig sep",
        "all search",
        "author avatar",
        "days ago",
        "http",
        "related nids",
        "files location",
        "as30081",
        "gmt contenttype",
        "mozilla",
        "as15133 verizon",
        "whitelisted",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "softcnapp",
        "overview ip",
        "flag united",
        "files related",
        "as62597 nsone",
        "as31898 oracle",
        "mtb aug",
        "class",
        "twitter",
        "april",
        "secure",
        "httponly",
        "expiresthu",
        "pragma",
        "as13414 twitter",
        "smoke loader",
        "reverse dns",
        "asnone united",
        "idlogin sep",
        "uid38009",
        "expiration",
        "hack type",
        "porn type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Aruba"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3850,
        "FileHash-MD5": 6012,
        "FileHash-SHA1": 5906,
        "domain": 3329,
        "email": 33,
        "hostname": 4231,
        "CVE": 2,
        "FileHash-SHA256": 8407,
        "CIDR": 2,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 31779,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "535 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66c235b05007103d3e3e7038",
      "name": "HCA -  Win32:RansomX-gen affecting HCA (HealthOneCares) + Miscellaneous Attacks",
      "description": "HCA (Health One Cares) affected by a RansomX and various serious attacks. It's linked back to a neurosurgeon who is likely not responsible for attack of course. It has been the same,e group of attackers using Samuel Tulach engineered malware. I'm unsure if there is collusion between Brian Sabey (consistent attacker) and Samuel Tulach. I just know it relates back to the same threat actors that have been hacking healthcare facilities, government offices, telecommunications, technology at health centers abusing webcams and patients records modification, and distribution. PHI PII issues.",
      "modified": "2024-09-17T17:01:24.349000",
      "created": "2024-08-18T17:56:00.485000",
      "tags": [
        "blacklist http",
        "safe site",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "cisco umbrella",
        "site",
        "alexa top",
        "united",
        "million",
        "mail spammer",
        "malicious site",
        "phishing site",
        "team phishing",
        "tofsee",
        "malware",
        "bank",
        "unsafe",
        "azorult",
        "cobalt strike",
        "service",
        "runescape",
        "facebook",
        "download",
        "zbot",
        "installcore",
        "nymaim",
        "suppobox",
        "malicious",
        "cl0p",
        "inmortal",
        "domains",
        "referrer",
        "historical ssl",
        "apple stuff",
        "combined",
        "hr rtd",
        "network",
        "collection",
        "vt graph",
        "round",
        "metro",
        "execution",
        "emotet",
        "startpage",
        "maltiverse top",
        "paypal",
        "blacklist",
        "passive dns",
        "related nids",
        "urls",
        "flag united",
        "accept",
        "acceptencoding",
        "hit age",
        "ip asn",
        "malware site",
        "adware",
        "fakealert",
        "opencandy",
        "exploit",
        "raccoon",
        "metastealer",
        "redline stealer",
        "anonymizer",
        "heur",
        "outlook",
        "phishing airbnb",
        "engineering",
        "phishing",
        "filerepmalware",
        "maltiverse",
        "div div",
        "c span",
        "div section",
        "span div",
        "search",
        "showing",
        "unknown",
        "as397240",
        "moved",
        "date",
        "body",
        "as54113",
        "github pages",
        "a domains",
        "entries",
        "mtb jul",
        "class",
        "sea x",
        "scan endpoints",
        "all scoreblue",
        "alf features",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "date hash",
        "next",
        "worm",
        "dynamicloader",
        "yara rule",
        "high",
        "windows",
        "grum",
        "medium",
        "installs",
        "windows startup",
        "application",
        "stream",
        "as22612",
        "ipv4",
        "pulse pulses",
        "files",
        "switch dns",
        "query",
        "data",
        "noname057",
        "password",
        "cybercrime",
        "malicious url",
        "kuaizip",
        "team",
        "downloader",
        "generic",
        "crack",
        "presenoker",
        "dapato",
        "riskware",
        "genkryptik",
        "fuery",
        "agent",
        "wacatac",
        "union",
        "shellexecuteexw",
        "hash",
        "writeconsolew",
        "registry",
        "t1031",
        "trojan",
        "copy",
        "dock",
        "write",
        "win32",
        "file execution",
        "explorer",
        "alerts",
        "checks",
        "bios",
        "system restore",
        "anne",
        "training",
        "strings http",
        "basic telephone",
        "xsl stylesheets",
        "apache fop",
        "createdate",
        "modifydate",
        "producer apache",
        "format",
        "core",
        "nxscspu",
        "zsextbzusbrvsk",
        "pxnzj",
        "jwxkrhdlrivprs",
        "default",
        "qxrfnjuodik",
        "mncau",
        "csqvrkwsqka",
        "testpath path",
        "else",
        "null",
        "suspicious",
        "win64",
        "hotkey",
        "ransom",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "push"
      ],
      "references": [
        "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
        "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
        "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
        "https://work.a-poster.info",
        "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
        "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
        "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
        "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
        "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
        "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
        "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
        "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
        "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
        "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
        "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_f28c33a2",
          "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
          "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.YL",
          "display_name": "Trojan:Win32/Emotet.YL",
          "target": "/malware/Trojan:Win32/Emotet.YL"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
          "display_name": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [
        "Civilian Society",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Media"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 50,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 891,
        "FileHash-MD5": 2368,
        "FileHash-SHA1": 1873,
        "FileHash-SHA256": 5092,
        "domain": 648,
        "hostname": 557,
        "CVE": 8,
        "email": 2
      },
      "indicator_count": 11439,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "579 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "666271a86acba18eb98ce7f3",
      "name": "Unix.Trojan.Mirai-6981158-0 | Win32/1ms0rry CoinMiner Botnet affects android user",
      "description": "Found an IP address in block: http://100.116.0.0/?\nFound on android device user. Target is being tracked.  Uses .ru but tracks back to US based on other studies. Command 'redirect blame' found in association. Active, moved.",
      "modified": "2024-07-07T01:06:11.854000",
      "created": "2024-06-07T02:34:16.108000",
      "tags": [
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "general",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "win32 exe",
        "win32 dll",
        "wextract",
        "type name",
        "pink ribbon",
        "passive dns",
        "urls",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "files",
        "domain",
        "files ip",
        "address domain",
        "ip related",
        "referrer",
        "doublepulsar",
        "historical ssl",
        "darkpulsar",
        "ru sketchup",
        "flawedammyy",
        "date",
        "hostname",
        "pulse submit",
        "url analysis",
        "verdict",
        "next",
        "a nxdomain",
        "ip address",
        "url http",
        "http",
        "related nids",
        "files location",
        "as9123 timeweb",
        "russia unknown",
        "ipv4",
        "reverse dns",
        "russia",
        "united kingdom",
        "aaaa",
        "as198947 jsc",
        "as29470 jsc",
        "moved",
        "search",
        "nxdomain",
        "files domain",
        "files related",
        "unknown",
        "as63949 linode",
        "germany unknown",
        "main",
        "as59552 vhg",
        "title",
        "div div",
        "gmt content",
        "accept",
        "chegg",
        "regis",
        "special use IP",
        "tracking",
        "locate",
        "pe resource",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "count blacklist",
        "xiaav",
        "windowsxp",
        "script domains",
        "script urls",
        "body doctype",
        "ok server",
        "encrypt",
        "cookie",
        "p div",
        "script script",
        "div section",
        "as21342",
        "js core",
        "a domains",
        "link",
        "as43561",
        "location sofia",
        "telnet",
        "belemet.id",
        "100.116.0.0/?",
        "a li",
        "p td",
        "td tr",
        "a br",
        "meta",
        "as24940 hetzner",
        "grab",
        "this",
        "entries",
        "trojan",
        "ransom",
        "msil",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "malicious site",
        "malicious url",
        "hostnames",
        "blacklist",
        "trickbot",
        "usa",
        "showing",
        "creation date",
        "record value",
        "dnssec",
        "memcommit",
        "win321ms0rry",
        "coinminer",
        "etpro trojan",
        "botnet cnc",
        "checkin",
        "activity",
        "medium",
        "t1055",
        "lowfi",
        "malware",
        "copy"
      ],
      "references": [
        "IP Block: 100.116.0.0/ Details: https://www.virustotal.com/gui/ip-address/100.116.0.0/details",
        "bElement.id",
        "Unix.Mirai IP: https://otx.alienvault.com/indicator/ip/93.170.6.43",
        "https://otx.alienvault.com/indicator/file/a108ff340f5256cc17c1e8345aacc3cf6c91987a1884957ea75df6d23281480b",
        "Yara Detections: is__elf",
        "IDS Detections: TELNET login failed root login Bad Login Generic Ping Keep-Alive Inbound M3",
        "Alerts: network_icmp suricata_alert network_multiple_direct_ip_connections Medium Priority Related Pulses OTX User-Created Pulses (2) Related Tags 10 Related Tags manipulation ,  discovery ,  dhta3eru4egasjn ,  abuse elevation ,  setgid More File Type ELF - ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Size 55 KB (56653 bytes) MD5",
        "IDS Detections MSIL/CoinMiner.ACM CnC Activity Win32/1ms0rry CoinMiner Botnet CnC Checkin",
        "b0t.fun: https://otx.alienvault.com/indicator/domain/b0t.fun",
        "IDS Detections: Win32/1ms0rry CoinMiner Botnet CnC Checkin MSIL/CoinMiner.ACM CnC Activity High Priority",
        "Alerts: nids_malware_alert injection_runpe network_icmp allocates_execute_remote_process antivm_queries_computername",
        "Alerts: persistence_autorun injection_ntsetcontextthread injection_resumethread dumped_buffer network_http raises_exception",
        "Alerts: antivm_network_adapters privilege_luid_check suspicious_tld allocates_rwx moves_self checks_debugger antivm_memory_available",
        "https://www.virustotal.com/gui/ip-address/100.116.0.0/summary"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "Germany",
        "Russian Federation"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Dark Pulsar",
          "display_name": "Dark Pulsar",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981158-0",
          "display_name": "Unix.Trojan.Mirai-6981158-0",
          "target": null
        },
        {
          "id": "TrickBot",
          "display_name": "TrickBot",
          "target": null
        },
        {
          "id": "Packer.Native",
          "display_name": "Packer.Native",
          "target": null
        },
        {
          "id": "Win.Packed.Lynx",
          "display_name": "Win.Packed.Lynx",
          "target": null
        },
        {
          "id": "Sodinokibi.AB",
          "display_name": "Sodinokibi.AB",
          "target": null
        },
        {
          "id": "CoinMiner.ACM",
          "display_name": "CoinMiner.ACM",
          "target": null
        },
        {
          "id": "CoinMiner.WE",
          "display_name": "CoinMiner.WE",
          "target": null
        },
        {
          "id": "CoinMiner.WM",
          "display_name": "CoinMiner.WM",
          "target": null
        },
        {
          "id": "Win32/1ms0rry",
          "display_name": "Win32/1ms0rry",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1078",
          "name": "Valid Accounts",
          "display_name": "T1078 - Valid Accounts"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        },
        {
          "id": "T1087",
          "name": "Account Discovery",
          "display_name": "T1087 - Account Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1195,
        "FileHash-SHA1": 745,
        "FileHash-SHA256": 1212,
        "URL": 2436,
        "domain": 1264,
        "hostname": 1148,
        "email": 1
      },
      "indicator_count": 8001,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "652 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708090c5fea4fa6aff5dd2",
      "name": "https://unisynvoting.com/wp-includes/js/jquery/jquery.min.js",
      "description": "",
      "modified": "2023-12-06T14:09:20.755000",
      "created": "2023-12-06T14:09:20.755000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 175,
        "hostname": 27,
        "URL": 76,
        "domain": 7
      },
      "indicator_count": 285,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708082129429d47f027632",
      "name": "broadband.harriscountytx.gov",
      "description": "",
      "modified": "2023-12-06T14:09:06.756000",
      "created": "2023-12-06T14:09:06.756000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 169,
        "hostname": 17,
        "URL": 62,
        "domain": 3,
        "FileHash-MD5": 1,
        "FileHash-SHA1": 1
      },
      "indicator_count": 253,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://code.jquery.com/jquery",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://code.jquery.com/jquery",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776662213.2372007
}