{
  "type": "URL",
  "indicator": "https://console.kijijicanada.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://console.kijijicanada.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3784515238,
      "indicator": "https://console.kijijicanada.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 9,
      "pulses": [
        {
          "id": "66c5dcd42da951f32ee24e0f",
          "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashesrs",
          "description": "",
          "modified": "2024-08-21T12:25:56.328000",
          "created": "2024-08-21T12:25:56.328000",
          "tags": [
            "cins active",
            "poor reputation",
            "host",
            "threats et",
            "ip tcp",
            "detection list",
            "ip address",
            "blacklist",
            "macedonia",
            "former yugoslav",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "paypal",
            "team phishing",
            "blacknet rat",
            "loki password",
            "stealer",
            "malicious url",
            "malicious site",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet",
            "site top",
            "million alexa",
            "safe site",
            "malware",
            "genpack",
            "deepscan",
            "cobalt strike",
            "malicious",
            "zbot",
            "memscan",
            "cl0p",
            "cyber threat",
            "heur",
            "engineering",
            "united",
            "covid19",
            "malicious host",
            "team",
            "virut",
            "nymaim",
            "pony",
            "ransomware",
            "bradesco",
            "opencandy",
            "ramnit",
            "adload",
            "simda",
            "zeus",
            "pykspa",
            "riskware",
            "generic",
            "artemis",
            "downldr",
            "binder",
            "sutra",
            "steam",
            "asyncrat",
            "revengerat",
            "downloader",
            "exploit",
            "emailworm",
            "agent",
            "tinba",
            "maltiverse safe",
            "generic malware",
            "phishing site",
            "outbrowse",
            "suppobox",
            "vawtrak",
            "solimba",
            "wacatac",
            "msil",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "dropper",
            "mediaget",
            "crack",
            "blacklist http",
            "ascii text",
            "nysp",
            "appdata",
            "jpeg image",
            "jfif standard",
            "file",
            "0xeae6b5",
            "function",
            "0x308d49",
            "x6a4",
            "push",
            "shift",
            "cookie",
            "slice",
            "path",
            "window",
            "error",
            "false",
            "hybrid",
            "crypto",
            "open",
            "blank",
            "template",
            "target",
            "trim",
            "write",
            "period",
            "touchmove",
            "click",
            "close",
            "body",
            "screen",
            "android",
            "canvas",
            "class",
            "span",
            "trident",
            "accept",
            "general",
            "local",
            "html",
            "unsafe",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "trojanx",
            "webshell",
            "iframe",
            "patcher",
            "driverpack",
            "union",
            "maltiverse",
            "blacklist https",
            "google",
            "noname057",
            "redlinestealer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655d0ec7b7cb12c66cac457d",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 884,
            "hostname": 1809,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 321,
            "FileHash-SHA256": 2079,
            "CVE": 16,
            "URL": 6434
          },
          "indicator_count": 12178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "606 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bca8fcbe62297d71b47c33",
          "name": "Ragnar Locker",
          "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
          "modified": "2024-03-03T08:00:03.432000",
          "created": "2024-02-02T08:34:04.425000",
          "tags": [
            "referrer",
            "contacted",
            "whois record",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "execution",
            "historical ssl",
            "red team",
            "gang breached",
            "agent tesla",
            "redline stealer",
            "metro",
            "android",
            "urls url",
            "files",
            "kgs0",
            "kls0",
            "orgtechhandle",
            "orgtechref",
            "orgabusehandle",
            "orgdnshandle",
            "orgdnsref",
            "whois lookup",
            "netrange",
            "nethandle",
            "net108",
            "net1080000",
            "communicating",
            "urls http",
            "ransomware gang",
            "breached",
            "team",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "psiusa",
            "domain robot",
            "porkbun llc",
            "keysystems gmbh",
            "csc corporate",
            "domains",
            "domain name",
            "network pty",
            "tucows",
            "com laude",
            "dynadot inc"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8354,
            "FileHash-MD5": 104,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 2711,
            "CIDR": 5,
            "CVE": 6,
            "domain": 1489,
            "hostname": 3058,
            "email": 5
          },
          "indicator_count": 15813,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a8720daa2d0263a2b1de88",
          "name": "Linux/Mumblehard introduction via  phone call  Social Engineering",
          "description": "Already deeply compromised individuals more at risk of elaborate phone call interception/redirect/transfer from legitimate services. Many different schemes are used to access and nullify victims identity, involves ssn#, bank account information, email exchange text messaging, PDF exchange, Spam sent to all known accounts, password reset, request for ID upload to verify (steal) identity, extensive holds while trying to 'help' you, unannounced credit check ID theft. Ransomware, Linux attack, Botnetwork behavior.  Active threat. Linux/Mumblehard backdoor/botnet",
          "modified": "2024-02-17T00:01:16.653000",
          "created": "2024-01-18T00:34:21.136000",
          "tags": [
            "ssl certificate",
            "april",
            "resolutions",
            "threat roundup",
            "whois record",
            "historical ssl",
            "vt graph",
            "attack",
            "formbook",
            "subdomains",
            "august",
            "cobalt strike",
            "mumblehard",
            "iframe",
            "djcodychase.com",
            "first",
            "utc submissions",
            "submitters",
            "webico company",
            "limited",
            "summary iocs",
            "graph community",
            "urls",
            "gandi sas",
            "amazonaes",
            "cloudflarenet",
            "computer",
            "company limited",
            "cloud host",
            "pte ltd",
            "singlehopllc",
            "squarespace",
            "amazon02",
            "team internet",
            "google",
            "internapblk4",
            "domains",
            "registrar",
            "dynadot llc",
            "ip detections",
            "country",
            "detections type",
            "name",
            "win32 exe",
            "file size",
            "detections file",
            "kb file",
            "execution",
            "contacted",
            "apple ios",
            "tsara brashears",
            "virus network",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "matches rule",
            "relacionada",
            "hacktool",
            "emotet",
            "critical",
            "copy",
            "installer",
            "banker",
            "keylogger",
            "it's back",
            "name verdict",
            "falcon sandbox",
            "json data",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "file",
            "indicator",
            "mitre att",
            "ck id",
            "win64",
            "path",
            "date",
            "factory",
            "hybrid",
            "cookie",
            "benjamin"
          ],
          "references": [
            "djcodychase.com",
            "https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/mumblehard-botnet-that-targeted-linux-systems-has-been-shut-down Source Trend"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Linux/Mumblehard",
              "display_name": "Backdoor:Linux/Mumblehard",
              "target": "/malware/Backdoor:Linux/Mumblehard"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Win.Dropper.XtremeRAT-7708589-0",
              "display_name": "Win.Dropper.XtremeRAT-7708589-0",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            }
          ],
          "attack_ids": [
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 114,
            "FileHash-SHA1": 106,
            "FileHash-SHA256": 3407,
            "URL": 6246,
            "domain": 2463,
            "hostname": 1693,
            "CVE": 2
          },
          "indicator_count": 14031,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aab9d7a0b4116f622b0aa0",
          "name": "Linux/Mumblehard introduction via phone call Social Engineering",
          "description": "",
          "modified": "2024-02-17T00:01:16.653000",
          "created": "2024-01-19T18:05:11.592000",
          "tags": [
            "ssl certificate",
            "april",
            "resolutions",
            "threat roundup",
            "whois record",
            "historical ssl",
            "vt graph",
            "attack",
            "formbook",
            "subdomains",
            "august",
            "cobalt strike",
            "mumblehard",
            "iframe",
            "djcodychase.com",
            "first",
            "utc submissions",
            "submitters",
            "webico company",
            "limited",
            "summary iocs",
            "graph community",
            "urls",
            "gandi sas",
            "amazonaes",
            "cloudflarenet",
            "computer",
            "company limited",
            "cloud host",
            "pte ltd",
            "singlehopllc",
            "squarespace",
            "amazon02",
            "team internet",
            "google",
            "internapblk4",
            "domains",
            "registrar",
            "dynadot llc",
            "ip detections",
            "country",
            "detections type",
            "name",
            "win32 exe",
            "file size",
            "detections file",
            "kb file",
            "execution",
            "contacted",
            "apple ios",
            "tsara brashears",
            "virus network",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "matches rule",
            "relacionada",
            "hacktool",
            "emotet",
            "critical",
            "copy",
            "installer",
            "banker",
            "keylogger",
            "it's back",
            "name verdict",
            "falcon sandbox",
            "json data",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "file",
            "indicator",
            "mitre att",
            "ck id",
            "win64",
            "path",
            "date",
            "factory",
            "hybrid",
            "cookie",
            "benjamin"
          ],
          "references": [
            "djcodychase.com",
            "https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/mumblehard-botnet-that-targeted-linux-systems-has-been-shut-down Source Trend"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Linux/Mumblehard",
              "display_name": "Backdoor:Linux/Mumblehard",
              "target": "/malware/Backdoor:Linux/Mumblehard"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Win.Dropper.XtremeRAT-7708589-0",
              "display_name": "Win.Dropper.XtremeRAT-7708589-0",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            }
          ],
          "attack_ids": [
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a8720daa2d0263a2b1de88",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 114,
            "FileHash-SHA1": 106,
            "FileHash-SHA256": 3407,
            "URL": 6246,
            "domain": 2463,
            "hostname": 1693,
            "CVE": 2
          },
          "indicator_count": 14031,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "792 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659331580cd1571f730b8de2",
          "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
          "description": "",
          "modified": "2024-01-31T14:03:30.344000",
          "created": "2024-01-01T21:40:40.242000",
          "tags": [
            "maxads0",
            "kld1063",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls http",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "march",
            "communicating",
            "copy",
            "january",
            "collections",
            "execution",
            "malware",
            "startpage",
            "malicious",
            "ransomware",
            "agent tesla",
            "attack",
            "android",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "windir",
            "path",
            "programfiles",
            "pe32",
            "ms windows",
            "getprocaddress",
            "file type",
            "mitre att",
            "ck id",
            "show technique",
            "win64",
            "date",
            "open",
            "hybrid",
            "cookie",
            "tracking",
            "apple",
            "spyware",
            "malware",
            "tablet",
            "superwebbysearch",
            "hallrender",
            "pegasus",
            "briansabey",
            "aig",
            "abuse",
            "tulach"
          ],
          "references": [
            "findbetterresults.com",
            "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
            "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
            "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
            "www2.megawebfind.com                [command_and_control]",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2368,
            "FileHash-SHA256": 4539,
            "hostname": 2892,
            "URL": 9741,
            "FileHash-MD5": 836,
            "FileHash-SHA1": 461,
            "CVE": 1
          },
          "indicator_count": 20838,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "809 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659331589faf01b909c1802d",
          "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
          "description": "",
          "modified": "2024-01-31T14:03:30.344000",
          "created": "2024-01-01T21:40:40.413000",
          "tags": [
            "maxads0",
            "kld1063",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls http",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "historical ssl",
            "march",
            "communicating",
            "copy",
            "january",
            "collections",
            "execution",
            "malware",
            "startpage",
            "malicious",
            "ransomware",
            "agent tesla",
            "attack",
            "android",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "windir",
            "path",
            "programfiles",
            "pe32",
            "ms windows",
            "getprocaddress",
            "file type",
            "mitre att",
            "ck id",
            "show technique",
            "win64",
            "date",
            "open",
            "hybrid",
            "cookie",
            "tracking",
            "apple",
            "spyware",
            "malware",
            "tablet",
            "superwebbysearch",
            "hallrender",
            "pegasus",
            "briansabey",
            "aig",
            "abuse",
            "tulach"
          ],
          "references": [
            "findbetterresults.com",
            "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
            "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
            "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
            "www2.megawebfind.com                [command_and_control]",
            "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2368,
            "FileHash-SHA256": 4539,
            "hostname": 2892,
            "URL": 9741,
            "FileHash-MD5": 836,
            "FileHash-SHA1": 461,
            "CVE": 1
          },
          "indicator_count": 20838,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "809 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655d0ec7b7cb12c66cac457d",
          "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip",
          "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
          "modified": "2023-12-21T19:03:27.243000",
          "created": "2023-11-21T20:10:47.792000",
          "tags": [
            "cins active",
            "poor reputation",
            "host",
            "threats et",
            "ip tcp",
            "detection list",
            "ip address",
            "blacklist",
            "macedonia",
            "former yugoslav",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "paypal",
            "team phishing",
            "blacknet rat",
            "loki password",
            "stealer",
            "malicious url",
            "malicious site",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet",
            "site top",
            "million alexa",
            "safe site",
            "malware",
            "genpack",
            "deepscan",
            "cobalt strike",
            "malicious",
            "zbot",
            "memscan",
            "cl0p",
            "cyber threat",
            "heur",
            "engineering",
            "united",
            "covid19",
            "malicious host",
            "team",
            "virut",
            "nymaim",
            "pony",
            "ransomware",
            "bradesco",
            "opencandy",
            "ramnit",
            "adload",
            "simda",
            "zeus",
            "pykspa",
            "riskware",
            "generic",
            "artemis",
            "downldr",
            "binder",
            "sutra",
            "steam",
            "asyncrat",
            "revengerat",
            "downloader",
            "exploit",
            "emailworm",
            "agent",
            "tinba",
            "maltiverse safe",
            "generic malware",
            "phishing site",
            "outbrowse",
            "suppobox",
            "vawtrak",
            "solimba",
            "wacatac",
            "msil",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "dropper",
            "mediaget",
            "crack",
            "blacklist http",
            "ascii text",
            "nysp",
            "appdata",
            "jpeg image",
            "jfif standard",
            "file",
            "0xeae6b5",
            "function",
            "0x308d49",
            "x6a4",
            "push",
            "shift",
            "cookie",
            "slice",
            "path",
            "window",
            "error",
            "false",
            "hybrid",
            "crypto",
            "open",
            "blank",
            "template",
            "target",
            "trim",
            "write",
            "period",
            "touchmove",
            "click",
            "close",
            "body",
            "screen",
            "android",
            "canvas",
            "class",
            "span",
            "trident",
            "accept",
            "general",
            "local",
            "html",
            "unsafe",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "trojanx",
            "webshell",
            "iframe",
            "patcher",
            "driverpack",
            "union",
            "maltiverse",
            "blacklist https",
            "google",
            "noname057",
            "redlinestealer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 884,
            "hostname": 1809,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 321,
            "FileHash-SHA256": 2079,
            "CVE": 16,
            "URL": 6434
          },
          "indicator_count": 12178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655d0edbb8c22bcb4e5969b8",
          "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip",
          "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
          "modified": "2023-12-21T19:03:27.243000",
          "created": "2023-11-21T20:11:07.064000",
          "tags": [
            "cins active",
            "poor reputation",
            "host",
            "threats et",
            "ip tcp",
            "detection list",
            "ip address",
            "blacklist",
            "macedonia",
            "former yugoslav",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "paypal",
            "team phishing",
            "blacknet rat",
            "loki password",
            "stealer",
            "malicious url",
            "malicious site",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet",
            "site top",
            "million alexa",
            "safe site",
            "malware",
            "genpack",
            "deepscan",
            "cobalt strike",
            "malicious",
            "zbot",
            "memscan",
            "cl0p",
            "cyber threat",
            "heur",
            "engineering",
            "united",
            "covid19",
            "malicious host",
            "team",
            "virut",
            "nymaim",
            "pony",
            "ransomware",
            "bradesco",
            "opencandy",
            "ramnit",
            "adload",
            "simda",
            "zeus",
            "pykspa",
            "riskware",
            "generic",
            "artemis",
            "downldr",
            "binder",
            "sutra",
            "steam",
            "asyncrat",
            "revengerat",
            "downloader",
            "exploit",
            "emailworm",
            "agent",
            "tinba",
            "maltiverse safe",
            "generic malware",
            "phishing site",
            "outbrowse",
            "suppobox",
            "vawtrak",
            "solimba",
            "wacatac",
            "msil",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "dropper",
            "mediaget",
            "crack",
            "blacklist http",
            "ascii text",
            "nysp",
            "appdata",
            "jpeg image",
            "jfif standard",
            "file",
            "0xeae6b5",
            "function",
            "0x308d49",
            "x6a4",
            "push",
            "shift",
            "cookie",
            "slice",
            "path",
            "window",
            "error",
            "false",
            "hybrid",
            "crypto",
            "open",
            "blank",
            "template",
            "target",
            "trim",
            "write",
            "period",
            "touchmove",
            "click",
            "close",
            "body",
            "screen",
            "android",
            "canvas",
            "class",
            "span",
            "trident",
            "accept",
            "general",
            "local",
            "html",
            "unsafe",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "trojanx",
            "webshell",
            "iframe",
            "patcher",
            "driverpack",
            "union",
            "maltiverse",
            "blacklist https",
            "google",
            "noname057",
            "redlinestealer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 68,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 884,
            "hostname": 1809,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 321,
            "FileHash-SHA256": 2079,
            "CVE": 16,
            "URL": 6434
          },
          "indicator_count": 12178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655d0f94ad4d7cdc5e3f0a98",
          "name": "BlackNET",
          "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
          "modified": "2023-12-21T19:03:27.243000",
          "created": "2023-11-21T20:14:12.454000",
          "tags": [
            "cins active",
            "poor reputation",
            "host",
            "threats et",
            "ip tcp",
            "detection list",
            "ip address",
            "blacklist",
            "macedonia",
            "former yugoslav",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "paypal",
            "team phishing",
            "blacknet rat",
            "loki password",
            "stealer",
            "malicious url",
            "malicious site",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet",
            "site top",
            "million alexa",
            "safe site",
            "malware",
            "genpack",
            "deepscan",
            "cobalt strike",
            "malicious",
            "zbot",
            "memscan",
            "cl0p",
            "cyber threat",
            "heur",
            "engineering",
            "united",
            "covid19",
            "malicious host",
            "team",
            "virut",
            "nymaim",
            "pony",
            "ransomware",
            "bradesco",
            "opencandy",
            "ramnit",
            "adload",
            "simda",
            "zeus",
            "pykspa",
            "riskware",
            "generic",
            "artemis",
            "downldr",
            "binder",
            "sutra",
            "steam",
            "asyncrat",
            "revengerat",
            "downloader",
            "exploit",
            "emailworm",
            "agent",
            "tinba",
            "maltiverse safe",
            "generic malware",
            "phishing site",
            "outbrowse",
            "suppobox",
            "vawtrak",
            "solimba",
            "wacatac",
            "msil",
            "outbreak",
            "installcore",
            "acint",
            "conduit",
            "installpack",
            "iobit",
            "dropper",
            "mediaget",
            "crack",
            "blacklist http",
            "ascii text",
            "nysp",
            "appdata",
            "jpeg image",
            "jfif standard",
            "file",
            "0xeae6b5",
            "function",
            "0x308d49",
            "x6a4",
            "push",
            "shift",
            "cookie",
            "slice",
            "path",
            "window",
            "error",
            "false",
            "hybrid",
            "crypto",
            "open",
            "blank",
            "template",
            "target",
            "trim",
            "write",
            "period",
            "touchmove",
            "click",
            "close",
            "body",
            "screen",
            "android",
            "canvas",
            "class",
            "span",
            "trident",
            "accept",
            "general",
            "local",
            "html",
            "unsafe",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "trojanx",
            "webshell",
            "iframe",
            "patcher",
            "driverpack",
            "union",
            "maltiverse",
            "blacklist https",
            "google",
            "noname057",
            "redlinestealer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 73,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 884,
            "hostname": 1809,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 321,
            "FileHash-SHA256": 2079,
            "CVE": 16,
            "URL": 6434
          },
          "indicator_count": 12178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
        "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
        "djcodychase.com",
        "https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/mumblehard-botnet-that-targeted-linux-systems-has-been-shut-down Source Trend",
        "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
        "www2.megawebfind.com                [command_and_control]",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto",
        "findbetterresults.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.dropper.xtremerat-7708589-0",
            "Worm:win32/benjamin",
            "Formbook",
            "Ransomware",
            "Blacknet",
            "Cl0p",
            "Emotet",
            "Agent tesla",
            "Cobalt strike",
            "Hacktool",
            "Backdoor:linux/mumblehard",
            "Maltiverse"
          ],
          "industries": [],
          "unique_indicators": 59362
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/kijijicanada.com",
    "whois": "http://whois.domaintools.com/kijijicanada.com",
    "domain": "kijijicanada.com",
    "hostname": "console.kijijicanada.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 9,
  "pulses": [
    {
      "id": "66c5dcd42da951f32ee24e0f",
      "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashesrs",
      "description": "",
      "modified": "2024-08-21T12:25:56.328000",
      "created": "2024-08-21T12:25:56.328000",
      "tags": [
        "cins active",
        "poor reputation",
        "host",
        "threats et",
        "ip tcp",
        "detection list",
        "ip address",
        "blacklist",
        "macedonia",
        "former yugoslav",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "paypal",
        "team phishing",
        "blacknet rat",
        "loki password",
        "stealer",
        "malicious url",
        "malicious site",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet",
        "site top",
        "million alexa",
        "safe site",
        "malware",
        "genpack",
        "deepscan",
        "cobalt strike",
        "malicious",
        "zbot",
        "memscan",
        "cl0p",
        "cyber threat",
        "heur",
        "engineering",
        "united",
        "covid19",
        "malicious host",
        "team",
        "virut",
        "nymaim",
        "pony",
        "ransomware",
        "bradesco",
        "opencandy",
        "ramnit",
        "adload",
        "simda",
        "zeus",
        "pykspa",
        "riskware",
        "generic",
        "artemis",
        "downldr",
        "binder",
        "sutra",
        "steam",
        "asyncrat",
        "revengerat",
        "downloader",
        "exploit",
        "emailworm",
        "agent",
        "tinba",
        "maltiverse safe",
        "generic malware",
        "phishing site",
        "outbrowse",
        "suppobox",
        "vawtrak",
        "solimba",
        "wacatac",
        "msil",
        "outbreak",
        "installcore",
        "acint",
        "conduit",
        "installpack",
        "iobit",
        "dropper",
        "mediaget",
        "crack",
        "blacklist http",
        "ascii text",
        "nysp",
        "appdata",
        "jpeg image",
        "jfif standard",
        "file",
        "0xeae6b5",
        "function",
        "0x308d49",
        "x6a4",
        "push",
        "shift",
        "cookie",
        "slice",
        "path",
        "window",
        "error",
        "false",
        "hybrid",
        "crypto",
        "open",
        "blank",
        "template",
        "target",
        "trim",
        "write",
        "period",
        "touchmove",
        "click",
        "close",
        "body",
        "screen",
        "android",
        "canvas",
        "class",
        "span",
        "trident",
        "accept",
        "general",
        "local",
        "html",
        "unsafe",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "trojanx",
        "webshell",
        "iframe",
        "patcher",
        "driverpack",
        "union",
        "maltiverse",
        "blacklist https",
        "google",
        "noname057",
        "redlinestealer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655d0ec7b7cb12c66cac457d",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 884,
        "hostname": 1809,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 321,
        "FileHash-SHA256": 2079,
        "CVE": 16,
        "URL": 6434
      },
      "indicator_count": 12178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "606 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bca8fcbe62297d71b47c33",
      "name": "Ragnar Locker",
      "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
      "modified": "2024-03-03T08:00:03.432000",
      "created": "2024-02-02T08:34:04.425000",
      "tags": [
        "referrer",
        "contacted",
        "whois record",
        "ssl certificate",
        "whois whois",
        "contacted urls",
        "execution",
        "historical ssl",
        "red team",
        "gang breached",
        "agent tesla",
        "redline stealer",
        "metro",
        "android",
        "urls url",
        "files",
        "kgs0",
        "kls0",
        "orgtechhandle",
        "orgtechref",
        "orgabusehandle",
        "orgdnshandle",
        "orgdnsref",
        "whois lookup",
        "netrange",
        "nethandle",
        "net108",
        "net1080000",
        "communicating",
        "urls http",
        "ransomware gang",
        "breached",
        "team",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "psiusa",
        "domain robot",
        "porkbun llc",
        "keysystems gmbh",
        "csc corporate",
        "domains",
        "domain name",
        "network pty",
        "tucows",
        "com laude",
        "dynadot inc"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8354,
        "FileHash-MD5": 104,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 2711,
        "CIDR": 5,
        "CVE": 6,
        "domain": 1489,
        "hostname": 3058,
        "email": 5
      },
      "indicator_count": 15813,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a8720daa2d0263a2b1de88",
      "name": "Linux/Mumblehard introduction via  phone call  Social Engineering",
      "description": "Already deeply compromised individuals more at risk of elaborate phone call interception/redirect/transfer from legitimate services. Many different schemes are used to access and nullify victims identity, involves ssn#, bank account information, email exchange text messaging, PDF exchange, Spam sent to all known accounts, password reset, request for ID upload to verify (steal) identity, extensive holds while trying to 'help' you, unannounced credit check ID theft. Ransomware, Linux attack, Botnetwork behavior.  Active threat. Linux/Mumblehard backdoor/botnet",
      "modified": "2024-02-17T00:01:16.653000",
      "created": "2024-01-18T00:34:21.136000",
      "tags": [
        "ssl certificate",
        "april",
        "resolutions",
        "threat roundup",
        "whois record",
        "historical ssl",
        "vt graph",
        "attack",
        "formbook",
        "subdomains",
        "august",
        "cobalt strike",
        "mumblehard",
        "iframe",
        "djcodychase.com",
        "first",
        "utc submissions",
        "submitters",
        "webico company",
        "limited",
        "summary iocs",
        "graph community",
        "urls",
        "gandi sas",
        "amazonaes",
        "cloudflarenet",
        "computer",
        "company limited",
        "cloud host",
        "pte ltd",
        "singlehopllc",
        "squarespace",
        "amazon02",
        "team internet",
        "google",
        "internapblk4",
        "domains",
        "registrar",
        "dynadot llc",
        "ip detections",
        "country",
        "detections type",
        "name",
        "win32 exe",
        "file size",
        "detections file",
        "kb file",
        "execution",
        "contacted",
        "apple ios",
        "tsara brashears",
        "virus network",
        "critical risk",
        "cyberstalking",
        "elf collection",
        "matches rule",
        "relacionada",
        "hacktool",
        "emotet",
        "critical",
        "copy",
        "installer",
        "banker",
        "keylogger",
        "it's back",
        "name verdict",
        "falcon sandbox",
        "json data",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "file",
        "indicator",
        "mitre att",
        "ck id",
        "win64",
        "path",
        "date",
        "factory",
        "hybrid",
        "cookie",
        "benjamin"
      ],
      "references": [
        "djcodychase.com",
        "https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/mumblehard-botnet-that-targeted-linux-systems-has-been-shut-down Source Trend"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Backdoor:Linux/Mumblehard",
          "display_name": "Backdoor:Linux/Mumblehard",
          "target": "/malware/Backdoor:Linux/Mumblehard"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Win.Dropper.XtremeRAT-7708589-0",
          "display_name": "Win.Dropper.XtremeRAT-7708589-0",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        }
      ],
      "attack_ids": [
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 114,
        "FileHash-SHA1": 106,
        "FileHash-SHA256": 3407,
        "URL": 6246,
        "domain": 2463,
        "hostname": 1693,
        "CVE": 2
      },
      "indicator_count": 14031,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aab9d7a0b4116f622b0aa0",
      "name": "Linux/Mumblehard introduction via phone call Social Engineering",
      "description": "",
      "modified": "2024-02-17T00:01:16.653000",
      "created": "2024-01-19T18:05:11.592000",
      "tags": [
        "ssl certificate",
        "april",
        "resolutions",
        "threat roundup",
        "whois record",
        "historical ssl",
        "vt graph",
        "attack",
        "formbook",
        "subdomains",
        "august",
        "cobalt strike",
        "mumblehard",
        "iframe",
        "djcodychase.com",
        "first",
        "utc submissions",
        "submitters",
        "webico company",
        "limited",
        "summary iocs",
        "graph community",
        "urls",
        "gandi sas",
        "amazonaes",
        "cloudflarenet",
        "computer",
        "company limited",
        "cloud host",
        "pte ltd",
        "singlehopllc",
        "squarespace",
        "amazon02",
        "team internet",
        "google",
        "internapblk4",
        "domains",
        "registrar",
        "dynadot llc",
        "ip detections",
        "country",
        "detections type",
        "name",
        "win32 exe",
        "file size",
        "detections file",
        "kb file",
        "execution",
        "contacted",
        "apple ios",
        "tsara brashears",
        "virus network",
        "critical risk",
        "cyberstalking",
        "elf collection",
        "matches rule",
        "relacionada",
        "hacktool",
        "emotet",
        "critical",
        "copy",
        "installer",
        "banker",
        "keylogger",
        "it's back",
        "name verdict",
        "falcon sandbox",
        "json data",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "file",
        "indicator",
        "mitre att",
        "ck id",
        "win64",
        "path",
        "date",
        "factory",
        "hybrid",
        "cookie",
        "benjamin"
      ],
      "references": [
        "djcodychase.com",
        "https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/mumblehard-botnet-that-targeted-linux-systems-has-been-shut-down Source Trend"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Backdoor:Linux/Mumblehard",
          "display_name": "Backdoor:Linux/Mumblehard",
          "target": "/malware/Backdoor:Linux/Mumblehard"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Win.Dropper.XtremeRAT-7708589-0",
          "display_name": "Win.Dropper.XtremeRAT-7708589-0",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        }
      ],
      "attack_ids": [
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65a8720daa2d0263a2b1de88",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 114,
        "FileHash-SHA1": 106,
        "FileHash-SHA256": 3407,
        "URL": 6246,
        "domain": 2463,
        "hostname": 1693,
        "CVE": 2
      },
      "indicator_count": 14031,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "792 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659331580cd1571f730b8de2",
      "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
      "description": "",
      "modified": "2024-01-31T14:03:30.344000",
      "created": "2024-01-01T21:40:40.242000",
      "tags": [
        "maxads0",
        "kld1063",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls http",
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "historical ssl",
        "march",
        "communicating",
        "copy",
        "january",
        "collections",
        "execution",
        "malware",
        "startpage",
        "malicious",
        "ransomware",
        "agent tesla",
        "attack",
        "android",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "windir",
        "path",
        "programfiles",
        "pe32",
        "ms windows",
        "getprocaddress",
        "file type",
        "mitre att",
        "ck id",
        "show technique",
        "win64",
        "date",
        "open",
        "hybrid",
        "cookie",
        "tracking",
        "apple",
        "spyware",
        "malware",
        "tablet",
        "superwebbysearch",
        "hallrender",
        "pegasus",
        "briansabey",
        "aig",
        "abuse",
        "tulach"
      ],
      "references": [
        "findbetterresults.com",
        "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
        "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
        "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
        "www2.megawebfind.com                [command_and_control]",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2368,
        "FileHash-SHA256": 4539,
        "hostname": 2892,
        "URL": 9741,
        "FileHash-MD5": 836,
        "FileHash-SHA1": 461,
        "CVE": 1
      },
      "indicator_count": 20838,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "809 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659331589faf01b909c1802d",
      "name": "Agent Tesla | Spyware | Tracking Android & Apple users | Malware Attack",
      "description": "",
      "modified": "2024-01-31T14:03:30.344000",
      "created": "2024-01-01T21:40:40.413000",
      "tags": [
        "maxads0",
        "kld1063",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls http",
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "historical ssl",
        "march",
        "communicating",
        "copy",
        "january",
        "collections",
        "execution",
        "malware",
        "startpage",
        "malicious",
        "ransomware",
        "agent tesla",
        "attack",
        "android",
        "name verdict",
        "falcon sandbox",
        "reports",
        "falcon",
        "windir",
        "path",
        "programfiles",
        "pe32",
        "ms windows",
        "getprocaddress",
        "file type",
        "mitre att",
        "ck id",
        "show technique",
        "win64",
        "date",
        "open",
        "hybrid",
        "cookie",
        "tracking",
        "apple",
        "spyware",
        "malware",
        "tablet",
        "superwebbysearch",
        "hallrender",
        "pegasus",
        "briansabey",
        "aig",
        "abuse",
        "tulach"
      ],
      "references": [
        "findbetterresults.com",
        "https://hybrid-analysis.com/sample/bba36b3ae7c49d1cffcc5f8e045d81e9307a2e1a86b923f89008e9377d171fb6",
        "https://www.virustotal.com/gui/url/eed406872c2e6ef550b948510fe0b7b4c71f752f58551c2f8e61d31a19d2a153/summary",
        "http://www.applerewards.website/pl/3/index.html?voluumdata=BASE64dmlkLi4wMDAwMDAwMi00NGFiLTQzNDktODAwMC0wMDAwMDAwMDAwMDBfX3ZwaWQuLjJhYWQzMDAwLWJiMzYtMTFlNi04YTYyLTBlYzcxZTllMDMzMV9fY2FpZC4uNjBhMjIwOWUtNWMzNC00OGQ4LWIyNDctYWM5YzVkOTM3MzZhX19ydC4uUl9fbGlkLi4yYTRjOTA4My0zY2RmLTQyNDktOGJmOS0yODMxZWYzNGRhYTlfX29pZDEuLjUwMGE4NDhjLTA2NGEtNDYyZi05MDNmLTgxYzY4ODNmODEwZl9fdmFyMS4uNjA4OTYxX192YXIyLi42NzEwMjhfX3JkLi5vbmNsaWNrYWRzXC5cbmV0X19haWQuLl9fYWIuLl9fc2lkLi4&zoneid=608961&campaignid=671028&visitor_id=4003954",
        "www2.megawebfind.com                [command_and_control]",
        "https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=   [command_and_control]   stolec kradnie krypto"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 29,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2368,
        "FileHash-SHA256": 4539,
        "hostname": 2892,
        "URL": 9741,
        "FileHash-MD5": 836,
        "FileHash-SHA1": 461,
        "CVE": 1
      },
      "indicator_count": 20838,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "809 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655d0ec7b7cb12c66cac457d",
      "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip",
      "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
      "modified": "2023-12-21T19:03:27.243000",
      "created": "2023-11-21T20:10:47.792000",
      "tags": [
        "cins active",
        "poor reputation",
        "host",
        "threats et",
        "ip tcp",
        "detection list",
        "ip address",
        "blacklist",
        "macedonia",
        "former yugoslav",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "paypal",
        "team phishing",
        "blacknet rat",
        "loki password",
        "stealer",
        "malicious url",
        "malicious site",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet",
        "site top",
        "million alexa",
        "safe site",
        "malware",
        "genpack",
        "deepscan",
        "cobalt strike",
        "malicious",
        "zbot",
        "memscan",
        "cl0p",
        "cyber threat",
        "heur",
        "engineering",
        "united",
        "covid19",
        "malicious host",
        "team",
        "virut",
        "nymaim",
        "pony",
        "ransomware",
        "bradesco",
        "opencandy",
        "ramnit",
        "adload",
        "simda",
        "zeus",
        "pykspa",
        "riskware",
        "generic",
        "artemis",
        "downldr",
        "binder",
        "sutra",
        "steam",
        "asyncrat",
        "revengerat",
        "downloader",
        "exploit",
        "emailworm",
        "agent",
        "tinba",
        "maltiverse safe",
        "generic malware",
        "phishing site",
        "outbrowse",
        "suppobox",
        "vawtrak",
        "solimba",
        "wacatac",
        "msil",
        "outbreak",
        "installcore",
        "acint",
        "conduit",
        "installpack",
        "iobit",
        "dropper",
        "mediaget",
        "crack",
        "blacklist http",
        "ascii text",
        "nysp",
        "appdata",
        "jpeg image",
        "jfif standard",
        "file",
        "0xeae6b5",
        "function",
        "0x308d49",
        "x6a4",
        "push",
        "shift",
        "cookie",
        "slice",
        "path",
        "window",
        "error",
        "false",
        "hybrid",
        "crypto",
        "open",
        "blank",
        "template",
        "target",
        "trim",
        "write",
        "period",
        "touchmove",
        "click",
        "close",
        "body",
        "screen",
        "android",
        "canvas",
        "class",
        "span",
        "trident",
        "accept",
        "general",
        "local",
        "html",
        "unsafe",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "trojanx",
        "webshell",
        "iframe",
        "patcher",
        "driverpack",
        "union",
        "maltiverse",
        "blacklist https",
        "google",
        "noname057",
        "redlinestealer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 69,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 884,
        "hostname": 1809,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 321,
        "FileHash-SHA256": 2079,
        "CVE": 16,
        "URL": 6434
      },
      "indicator_count": 12178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655d0edbb8c22bcb4e5969b8",
      "name": "https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip",
      "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
      "modified": "2023-12-21T19:03:27.243000",
      "created": "2023-11-21T20:11:07.064000",
      "tags": [
        "cins active",
        "poor reputation",
        "host",
        "threats et",
        "ip tcp",
        "detection list",
        "ip address",
        "blacklist",
        "macedonia",
        "former yugoslav",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "paypal",
        "team phishing",
        "blacknet rat",
        "loki password",
        "stealer",
        "malicious url",
        "malicious site",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet",
        "site top",
        "million alexa",
        "safe site",
        "malware",
        "genpack",
        "deepscan",
        "cobalt strike",
        "malicious",
        "zbot",
        "memscan",
        "cl0p",
        "cyber threat",
        "heur",
        "engineering",
        "united",
        "covid19",
        "malicious host",
        "team",
        "virut",
        "nymaim",
        "pony",
        "ransomware",
        "bradesco",
        "opencandy",
        "ramnit",
        "adload",
        "simda",
        "zeus",
        "pykspa",
        "riskware",
        "generic",
        "artemis",
        "downldr",
        "binder",
        "sutra",
        "steam",
        "asyncrat",
        "revengerat",
        "downloader",
        "exploit",
        "emailworm",
        "agent",
        "tinba",
        "maltiverse safe",
        "generic malware",
        "phishing site",
        "outbrowse",
        "suppobox",
        "vawtrak",
        "solimba",
        "wacatac",
        "msil",
        "outbreak",
        "installcore",
        "acint",
        "conduit",
        "installpack",
        "iobit",
        "dropper",
        "mediaget",
        "crack",
        "blacklist http",
        "ascii text",
        "nysp",
        "appdata",
        "jpeg image",
        "jfif standard",
        "file",
        "0xeae6b5",
        "function",
        "0x308d49",
        "x6a4",
        "push",
        "shift",
        "cookie",
        "slice",
        "path",
        "window",
        "error",
        "false",
        "hybrid",
        "crypto",
        "open",
        "blank",
        "template",
        "target",
        "trim",
        "write",
        "period",
        "touchmove",
        "click",
        "close",
        "body",
        "screen",
        "android",
        "canvas",
        "class",
        "span",
        "trident",
        "accept",
        "general",
        "local",
        "html",
        "unsafe",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "trojanx",
        "webshell",
        "iframe",
        "patcher",
        "driverpack",
        "union",
        "maltiverse",
        "blacklist https",
        "google",
        "noname057",
        "redlinestealer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 68,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 884,
        "hostname": 1809,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 321,
        "FileHash-SHA256": 2079,
        "CVE": 16,
        "URL": 6434
      },
      "indicator_count": 12178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655d0f94ad4d7cdc5e3f0a98",
      "name": "BlackNET",
      "description": "Exploit\nContains escaped byte string (often part of obfuscated shellcode), Malicious\nhttps://www.profitabledisplaycontent.com/watch.375255570190.js, Malvertizing a true crime, child pornographer.\n\nSource: https://mypornwap.fun/downloads/5/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-gzip\n\nResource: https://www.hybrid-analysis.com/sample/f0233084bd810eb266cd29a879dc58d84c2a85032ba58b4b50d5643e7a41a144/655cf15b9f12303f990942e9",
      "modified": "2023-12-21T19:03:27.243000",
      "created": "2023-11-21T20:14:12.454000",
      "tags": [
        "cins active",
        "poor reputation",
        "host",
        "threats et",
        "ip tcp",
        "detection list",
        "ip address",
        "blacklist",
        "macedonia",
        "former yugoslav",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "alexa",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "paypal",
        "team phishing",
        "blacknet rat",
        "loki password",
        "stealer",
        "malicious url",
        "malicious site",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet",
        "site top",
        "million alexa",
        "safe site",
        "malware",
        "genpack",
        "deepscan",
        "cobalt strike",
        "malicious",
        "zbot",
        "memscan",
        "cl0p",
        "cyber threat",
        "heur",
        "engineering",
        "united",
        "covid19",
        "malicious host",
        "team",
        "virut",
        "nymaim",
        "pony",
        "ransomware",
        "bradesco",
        "opencandy",
        "ramnit",
        "adload",
        "simda",
        "zeus",
        "pykspa",
        "riskware",
        "generic",
        "artemis",
        "downldr",
        "binder",
        "sutra",
        "steam",
        "asyncrat",
        "revengerat",
        "downloader",
        "exploit",
        "emailworm",
        "agent",
        "tinba",
        "maltiverse safe",
        "generic malware",
        "phishing site",
        "outbrowse",
        "suppobox",
        "vawtrak",
        "solimba",
        "wacatac",
        "msil",
        "outbreak",
        "installcore",
        "acint",
        "conduit",
        "installpack",
        "iobit",
        "dropper",
        "mediaget",
        "crack",
        "blacklist http",
        "ascii text",
        "nysp",
        "appdata",
        "jpeg image",
        "jfif standard",
        "file",
        "0xeae6b5",
        "function",
        "0x308d49",
        "x6a4",
        "push",
        "shift",
        "cookie",
        "slice",
        "path",
        "window",
        "error",
        "false",
        "hybrid",
        "crypto",
        "open",
        "blank",
        "template",
        "target",
        "trim",
        "write",
        "period",
        "touchmove",
        "click",
        "close",
        "body",
        "screen",
        "android",
        "canvas",
        "class",
        "span",
        "trident",
        "accept",
        "general",
        "local",
        "html",
        "unsafe",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "trojanx",
        "webshell",
        "iframe",
        "patcher",
        "driverpack",
        "union",
        "maltiverse",
        "blacklist https",
        "google",
        "noname057",
        "redlinestealer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 73,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 884,
        "hostname": 1809,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 321,
        "FileHash-SHA256": 2079,
        "CVE": 16,
        "URL": 6434
      },
      "indicator_count": 12178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://console.kijijicanada.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://console.kijijicanada.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631157.9558356
}