{
  "type": "URL",
  "indicator": "https://cpcontacts.ciassoc.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://cpcontacts.ciassoc.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3806050022,
      "indicator": "https://cpcontacts.ciassoc.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 14,
      "pulses": [
        {
          "id": "69d3532c76eb3bf5edd9609b",
          "name": "clone credit octoseek-Dark Power - Pegasus | https://lawlink.com/ CREATED 2 YEARS AGO MODIFIED 2 YEARS AGO by OctoSeek",
          "description": "",
          "modified": "2026-04-06T06:31:08.181000",
          "created": "2026-04-06T06:31:08.181000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65bbb998c3b7662e5059b6c2",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "13 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d3532a6537880f6e2c68dc",
          "name": "clone credit octoseek-Dark Power - Pegasus | https://lawlink.com/ CREATED 2 YEARS AGO MODIFIED 2 YEARS AGO by OctoSeek",
          "description": "",
          "modified": "2026-04-06T06:31:06.730000",
          "created": "2026-04-06T06:31:06.730000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65bbb998c3b7662e5059b6c2",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "13 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66994bda3e150656cd5ac9dd",
          "name": "Browser Session Hijacking Various MyChart Phishing Scams",
          "description": "Ongoing issues with medical information hijacking. Various medical corporations affected. Tracking, medical, injection process, records retrieval, botnets.",
          "modified": "2024-08-17T16:01:11.866000",
          "created": "2024-07-18T17:07:38.719000",
          "tags": [
            "historical ssl",
            "referrer",
            "domains",
            "august",
            "phishingscams",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "privacy badger",
            "startpage",
            "self",
            "httponly",
            "samesitenone",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "pragma",
            "mychartlocale",
            "urls",
            "ip detections",
            "country",
            "contacted",
            "files",
            "file type",
            "name file",
            "gmbh",
            "cloudflare",
            "tucows",
            "ii llc",
            "alibaba cloud",
            "computing",
            "sample",
            "media t1091",
            "t1497 may",
            "mitre att",
            "access ta0001",
            "replication",
            "ta0004 process",
            "injection t1055",
            "defense evasion",
            "http requests",
            "get http",
            "request",
            "host",
            "dns resolutions",
            "ip traffic",
            "hashes",
            "tsara brashears",
            "red team",
            "hackers",
            "highly targeted",
            "critical risk",
            "cyberstalking",
            "apple",
            "apple ios",
            "logistics",
            "cyber defense",
            "guloader",
            "hacktool",
            "emotet",
            "phishing",
            "facebook",
            "malware",
            "hiddentear",
            "maze",
            "server",
            "domain status",
            "date",
            "algorithm",
            "google llc",
            "registrar abuse",
            "registrar",
            "record type",
            "ttl value",
            "aaaa",
            "whois lookup",
            "admin country",
            "ca creation",
            "dnssec",
            "markmonitor",
            "siblings",
            "whois lookups",
            "expiration date",
            "registrar iana",
            "creation date",
            "first",
            "united",
            "as15169 google",
            "cname",
            "status",
            "virtool",
            "cryp",
            "as396982 google",
            "search",
            "name servers",
            "win32",
            "remote"
          ],
          "references": [
            "MyChart Phishing Scams",
            "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
            "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win64-Trojan/Pakes.Exp",
              "display_name": "Win64-Trojan/Pakes.Exp",
              "target": null
            },
            {
              "id": "Win64:RansomX-gen",
              "display_name": "Win64:RansomX-gen",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 37,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 3473,
            "domain": 693,
            "URL": 4384,
            "hostname": 1610,
            "CVE": 2,
            "email": 3
          },
          "indicator_count": 10235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "610 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bbb9815816db0de034f3a3",
          "name": "Dark Power - Pegasus |  https://lawlink.com/",
          "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
          "modified": "2024-03-02T13:01:40.418000",
          "created": "2024-02-01T15:32:17.285000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "778 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bbb98c440c1c45ec12ccdc",
          "name": "Dark Power - Pegasus |  https://lawlink.com/",
          "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
          "modified": "2024-03-02T13:01:40.418000",
          "created": "2024-02-01T15:32:28.063000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "778 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bbb98d9818cca8f130c195",
          "name": "Dark Power - Pegasus |  https://lawlink.com/",
          "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
          "modified": "2024-03-02T13:01:40.418000",
          "created": "2024-02-01T15:32:29.619000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "778 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bbb998c3b7662e5059b6c2",
          "name": "Dark Power - Pegasus |  https://lawlink.com/",
          "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
          "modified": "2024-03-02T13:01:40.418000",
          "created": "2024-02-01T15:32:40.759000",
          "tags": [
            "no expiration",
            "filehashmd5",
            "iocs",
            "next",
            "scan endpoints",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "filehashsha1",
            "filehashsha256",
            "ipv4",
            "expiration",
            "url http",
            "url https",
            "hostname",
            "domain",
            "domain xn",
            "orgid1054",
            "ruen",
            "multiru",
            "multi",
            "fh no",
            "f no",
            "m892175",
            "n1822",
            "contact",
            "contacted",
            "ciphersuite",
            "backdoor",
            "generic malware",
            "mydoom",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "1b@ssl.com",
            "apple",
            "all octoseek",
            "aaaa",
            "access",
            "alerts",
            "analyze",
            "antivirus",
            "apple as714",
            "apple as8075",
            "bootstrap@4.6.2",
            "body",
            "cellebrite",
            "cobalt strike",
            "command and control",
            "content type",
            "core",
            "create c",
            "cyber threat",
            "dark power",
            "privilege",
            "abuse",
            "legal",
            "privilege abuse",
            "preemptive policing",
            "ransomware",
            "dns",
            "worm",
            "network",
            "rat",
            "bat",
            "colorado",
            "douglas county",
            "pd",
            "racism",
            "sexism",
            "cover up",
            "malicious",
            "jeffrey reimer dpt",
            "default",
            "defender",
            "delete c",
            "dnssec",
            "document file",
            "dynamic",
            "dynamicloader",
            "emotet",
            "execution",
            "expiration",
            "date",
            "factory",
            "february",
            "filehash",
            "formbook",
            "hacktool",
            "framing",
            "harstel",
            "florence, co",
            "sherida",
            "spyeye",
            "castle pines",
            "tools",
            "defense",
            "medical malpractice fraud",
            "scheme",
            "tsara brashears",
            "targeting",
            "swatting",
            "high",
            "hostname",
            "hostnames",
            "malicious prosecution",
            "apb",
            "installer",
            "intel",
            "iocs",
            "ios",
            "lawlink@2x.svg",
            "local",
            "local",
            "lockbit",
            "lumma stealer",
            "corruption",
            "state actors",
            "untitled states",
            "installer",
            "intel",
            "makop",
            "malware",
            "silencing",
            "ms windows",
            "human rights",
            "civil rights",
            "retaliation",
            "name servers",
            "next",
            "passive dns",
            "paste",
            "collect contacts",
            "password",
            "unlock phone",
            "ios",
            "apple gateway",
            "android overlay",
            "interfacing",
            "pe32",
            "pegasus",
            "phishing",
            "protect",
            "pulse",
            "pulses",
            "qakbot",
            "quasar",
            "ransomexx",
            "read c",
            "record value",
            "regdword",
            "regsetvalueexa",
            "relacionada",
            "sample",
            "samples",
            "scan endpoints",
            "search",
            "servers",
            "shared",
            "show",
            "ssl certificate",
            "status",
            "stealer",
            "survivor",
            "t1063",
            "targets sa",
            "url",
            "xport",
            "write c",
            "write",
            "win32",
            "whois record",
            "threat",
            "threat analyzer",
            "tlsv1",
            "tracking",
            "united",
            "unknown",
            "urls",
            "urls https",
            "ursnif",
            "v2 document",
            "vanilla-lazyload@12.0.0",
            "vista event"
          ],
          "references": [
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
            "cbi.com",
            "deviceinbox.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
            "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
            "support.apple.com [nefarious]",
            "caselaw.lawlink.com",
            "http://mail.thyrsus.com/ [phishing]",
            "ppa.launchpad.net [Apple open use]",
            "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
            "1click-uninstaller.informer.com [Apple - access PE]",
            "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:PowerShell/DynamicLoader",
              "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored.E",
              "display_name": "Worm:Win32/Bloored.E",
              "target": "/malware/Worm:Win32/Bloored.E"
            },
            {
              "id": "Makop",
              "display_name": "Makop",
              "target": null
            },
            {
              "id": "RansomEXX (ELF)",
              "display_name": "RansomEXX (ELF)",
              "target": null
            },
            {
              "id": "Ransom:Win32/Makop",
              "display_name": "Ransom:Win32/Makop",
              "target": "/malware/Ransom:Win32/Makop"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "PWS:Win32/XPort",
              "display_name": "PWS:Win32/XPort",
              "target": "/malware/PWS:Win32/XPort"
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1505.001",
              "name": "SQL Stored Procedures",
              "display_name": "T1505.001 - SQL Stored Procedures"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1353,
            "URL": 5046,
            "FileHash-MD5": 5182,
            "FileHash-SHA1": 2869,
            "FileHash-SHA256": 4063,
            "hostname": 2471,
            "email": 28,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 21019,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "778 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657ab025b97f20f31bbfcd70",
          "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
          "description": "Alleged attorney defending Jeffrey Scott Reimer DPT. Firm uses every possible tool to destroy, make life unbearable, threaten and cause harm to targets. I don't  feel safe. I hope this research helps the next target.\n\nMissouri government is seen throughout. The corruption is mafia deep. There is tracking. In person stalking, theft, identity theft, mail theft, modification of records and services, legitimate death threats,etc.\nOpen records act: Target has made multiple reports to authorities regarding physical assaults, threats, phone hacking, etc. OCA:  Reports show a settlement was paid by Brian Sabey in part to help Tsara Brashears discover hacker.\nI've been receiving death threats, followed, property accessed, tampering. Attacking entire family including her children, father and beyond.",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2023-12-14T07:35:01.537000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 512,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657c03432f4f2997c7d3aff4",
          "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
          "description": "",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2023-12-15T07:41:55.972000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": "657ab025b97f20f31bbfcd70",
          "export_count": 508,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657c045ef15bd06d27da1b08",
          "name": "Resource Hijacking by attorney https://hallrender.com/attorney/brian-sabey",
          "description": "",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2023-12-15T07:46:38.664000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": "657c03432f4f2997c7d3aff4",
          "export_count": 508,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658dd341d97d04b0253392d4",
          "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
          "description": "",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2023-12-28T19:57:53.875000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": "657ab025b97f20f31bbfcd70",
          "export_count": 522,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ef8c00492cc6bdaa8b605",
          "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch | https://safebae.org",
          "description": "",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2023-12-29T16:50:08.330000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": "658dd341d97d04b0253392d4",
          "export_count": 518,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659d6ae800440c0befb47e22",
          "name": "BazaLoader affiliates use elaborate infection chains via notable victim interaction",
          "description": "",
          "modified": "2024-01-13T06:01:05.467000",
          "created": "2024-01-09T15:48:56.676000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb",
            "whois whois",
            "whois parent",
            "glupteba",
            "setup stub",
            "c2ae"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": "657c045ef15bd06d27da1b08",
          "export_count": 250,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2001,
            "hostname": 3531,
            "URL": 7519,
            "FileHash-MD5": 2851,
            "FileHash-SHA1": 1622,
            "FileHash-SHA256": 5092,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 22653,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657aaff046e2083b423a39e2",
          "name": "Inmortal Invoke-Mimikatz",
          "description": "Attorney defending Jeffrey Scott Reimer DPT. Firm uses every possible tool to destroy, make life uncomfortable, threaten and cause harm to targets.\nPossible masquerading / DBA as attorney with such illegal behavior.\nMay have been hired to harass and...she is reported dead of suicide morning after reporting harassment. Missouri government is seen throughout as if hired by firm. If this is a true law firm , the corruption is mafia deep. \n\nI'm 24/7 followed. Hacked l, etc.  \nVery expensive threat and deliver campaign. Verdict: Digital profile completely destroyed. Lives at risk.",
          "modified": "2024-01-12T04:02:22.872000",
          "created": "2023-12-14T07:34:08.701000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "historical ssl",
            "communicating",
            "referrer",
            "execution",
            "tsara brashears",
            "highly targeted",
            "njrat",
            "ransomware",
            "heodo",
            "tag count",
            "thu aug",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "malicious url",
            "blacklist https",
            "united",
            "firehol",
            "maltiverse",
            "cyber threat",
            "control server",
            "host",
            "phishing",
            "engineering",
            "paypal",
            "download",
            "malware",
            "nanocore rat",
            "meterpreter",
            "pony",
            "facebook",
            "stealer",
            "redline stealer",
            "dnspionage",
            "mirai",
            "nanocore",
            "bradesco",
            "emotet",
            "cobalt strike",
            "bank",
            "zeus",
            "zbot",
            "suppobox",
            "generic",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "protocol h2",
            "security tls",
            "software",
            "get h2",
            "hash",
            "main",
            "search live",
            "api blog",
            "docs pricing",
            "december",
            "hall render",
            "advisory",
            "brochure url",
            "link url",
            "linkedin link",
            "facebook link",
            "value",
            "login",
            "variables",
            "modernizr",
            "lsmeta function",
            "lsoldgsqueue",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "no data",
            "tld count",
            "urls",
            "count blacklist",
            "heur",
            "html",
            "site top",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "win64",
            "unsafe",
            "genkryptik",
            "artemis",
            "opencandy",
            "agent",
            "dropper",
            "fakealert",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "tiggre",
            "presenoker",
            "filetour",
            "cleaner",
            "conduit",
            "wacatac",
            "mimikatz",
            "redirector",
            "deepscan",
            "iframe",
            "memscan",
            "suspicious",
            "magazine",
            "applicunwnt",
            "alexa",
            "phish",
            "win32.pdf.alien",
            "freemake",
            "webtoolbar",
            "trojanspy",
            "label",
            "input",
            "form",
            "button",
            "render",
            "articles",
            "column",
            "brian",
            "search",
            "contact",
            "span",
            "accept",
            "this",
            "close",
            "district",
            "ultimate",
            "ip address",
            "blacklist",
            "covid19",
            "phishing chase",
            "windows nt",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "bypass",
            "formbook",
            "generic malware",
            "cutwail",
            "safe site",
            "phishing site",
            "team",
            "tofsee",
            "azorult",
            "service",
            "runescape",
            "remcos",
            "malicious",
            "miner",
            "hacktool",
            "agenttesla",
            "unknown",
            "downloader",
            "trojan",
            "detplock",
            "networm",
            "cryptinject",
            "beach research",
            "rms",
            "redline",
            "brian sabey",
            "hallrender.com",
            "hallrender.com/attorney/brian-sabey",
            "tulach",
            "tulach.cc",
            "mo.gov",
            "safebae.org",
            "civicalg.com",
            "civicalg",
            "passive dns",
            "domain",
            "registrar",
            "scan endpoints",
            "all octoseek",
            "hostname",
            "pulse pulses",
            "date",
            "next",
            "computer",
            "company limited",
            "first",
            "utc submissions",
            "submitters",
            "gti9158",
            "gti9080l",
            "gti9128v",
            "summary iocs",
            "graph community",
            "namecheap inc",
            "cloudflare",
            "com laude",
            "ltd dba",
            "porkbun llc",
            "ii llc",
            "csc corporate",
            "amazon02",
            "google",
            "cloudflarenet",
            "akamaias",
            "innova co",
            "indonesia",
            "level3",
            "china telecom",
            "mb setup",
            "mb opera",
            "mb qimage",
            "mb iesettings",
            "mb super",
            "optimizer",
            "premium",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "jpeg image",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "traffic",
            "tor known",
            "exit",
            "node tcp",
            "tor relayrouter",
            "spammer",
            "tor exit",
            "threats et",
            "node udp",
            "adware",
            "quasar rat",
            "installpack",
            "xrat",
            "fusioncore",
            "union",
            "raccoon",
            "metastealer",
            "xtrat",
            "blacklist http",
            "url http",
            "hijacking",
            "information",
            "report spam",
            "attorney",
            "trojanx",
            "zpevdo",
            "vidar",
            "agent tesla",
            "nymaim",
            "virut",
            "occamy",
            "iobit",
            "sality",
            "all search",
            "otx octoseek",
            "author avatar",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "pulses",
            "ipv4",
            "expiration",
            "no expiration",
            "iocs",
            "create new",
            "site safe",
            "lovgate",
            "unruy",
            "patcher",
            "nsis",
            "installcore",
            "adload",
            "cve201711882",
            "sonbokli",
            "ubot",
            "hsbc",
            "uztuby",
            "malicious host",
            "microsoft",
            "psexec",
            "brontok",
            "startpage",
            "keygen",
            "fareit",
            "secrisk",
            "floxif",
            "threat roundup",
            "c2 raccoon",
            "march",
            "critical risk",
            "apple phone",
            "unlocker",
            "installer",
            "laplasclipper",
            "blister",
            "june",
            "name verdict",
            "falcon sandbox",
            "malware generic",
            "tue dec",
            "temp",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "twitter",
            "seraph",
            "bazaloader",
            "media",
            "security",
            "technology",
            "dns replication",
            "virustotal",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "notepad",
            "java",
            "update checker",
            "verisign",
            "server",
            "asia pacific",
            "data",
            "whois database",
            "registrar abuse",
            "apnic whois",
            "apnic",
            "icann whois",
            "nanjing",
            "cnnic",
            "hackers",
            "virus network",
            "relacionada",
            "cyberstalking",
            "excel",
            "macros sneaky",
            "unauthorized",
            "wannacry kill",
            "attack",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "metro",
            "copy",
            "project",
            "cnc server",
            "proxy",
            "ramnit",
            "cl0p",
            "inmortal",
            "noname057",
            "jul jan",
            "fri jun",
            "tag tag",
            "failed_code_integrity_checks",
            "python_initiated-connection",
            "powershell_create_scheduled",
            "creation_of_an_executable_by_an_executable",
            "botnetwork",
            "c2",
            "apple hacking",
            "government relations",
            "abuse",
            "download csv",
            "json ip",
            "linkid252669",
            "adwaresig",
            "suspected",
            "filerepmalware",
            "dapato",
            "predator",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "mediaget",
            "softonic",
            "encpk",
            "qbot",
            "kraddare",
            "dllinject",
            "driverpack",
            "genpack",
            "offercore",
            "vitzo",
            "babar",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "connection",
            "pragma",
            "team malware",
            "binder",
            "pykspa",
            "feodo",
            "mark",
            "bomb"
          ],
          "references": [
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
            "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
            "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
            "192.124.249.53:80",
            "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
            "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
            "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
            "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
            "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
            "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
            "rp.dudaran2.com [routerlogin.net to safebae.org]",
            "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
            "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
            "https://poemhunter.com/tsara-brashears/",
            "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
            "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
            "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
            "government.westlaw.com",
            "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
            "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
            "west-sca.duckdns.org",
            "us-west-2.es.amazonaws.com     (pslicorp)",
            "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
            "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
            "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
            "www.hallrender.com (malware hosting)",
            "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
            "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
            "www.dead-speak.com",
            "www42.jhonisdead.com",
            "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
            "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
            "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
            "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
            "fakecelebporno.com",
            "batchcourtexpressservicesqa.westlaw.com",
            "batchpublicrecords.westlaw.com",
            "apple-aqo.com (1 DNSPod.net)",
            "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
            "c.oooooooooo.ga (c.apple.com cdn)",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "init.ess.apple.com ( Code Script \u2022 MortalK)",
            "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
            "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
            "https://www.hallrender.com/attorney/brian-sabey"
          ],
          "public": 1,
          "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WIN32.PDF.Alien",
              "display_name": "WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "Freemake",
              "display_name": "Freemake",
              "target": null
            },
            {
              "id": "Redirector",
              "display_name": "Redirector",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Behav",
              "display_name": "Behav",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "WIN32.PDF.ALIEN",
              "display_name": "WIN32.PDF.ALIEN",
              "target": null
            },
            {
              "id": "ZeuS",
              "display_name": "ZeuS",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "njRAT",
              "display_name": "njRAT",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Invoke-Mimikatz",
              "display_name": "Invoke-Mimikatz",
              "target": null
            },
            {
              "id": "China Telecom",
              "display_name": "China Telecom",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Sonbokli",
              "display_name": "Sonbokli",
              "target": null
            },
            {
              "id": "Ubot",
              "display_name": "Ubot",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Uztuby",
              "display_name": "Uztuby",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "Vitzo",
              "display_name": "Vitzo",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 438,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1995,
            "hostname": 3222,
            "URL": 7179,
            "FileHash-MD5": 2749,
            "FileHash-SHA1": 1538,
            "FileHash-SHA256": 4661,
            "CVE": 24,
            "email": 9,
            "CIDR": 4
          },
          "indicator_count": 21381,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "829 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://poemhunter.com/tsara-brashears/",
        "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
        "cbi.com",
        "rp.dudaran2.com [routerlogin.net to safebae.org]",
        "support.apple.com [nefarious]",
        "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "www.dead-speak.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
        "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
        "fakecelebporno.com",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
        "192.124.249.53:80",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
        "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
        "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
        "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
        "www.hallrender.com (malware hosting)",
        "caselaw.lawlink.com",
        "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
        "us-west-2.es.amazonaws.com     (pslicorp)",
        "deviceinbox.com",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S",
        "https://hallrender.com/attorney/brian-sabey",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "batchcourtexpressservicesqa.westlaw.com",
        "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
        "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
        "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
        "government.westlaw.com",
        "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
        "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
        "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
        "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
        "batchpublicrecords.westlaw.com",
        "init.ess.apple.com ( Code Script \u2022 MortalK)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
        "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
        "MyChart Phishing Scams",
        "https://www.hallrender.com/attorney/brian-sabey",
        "west-sca.duckdns.org",
        "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
        "apple-aqo.com (1 DNSPod.net)",
        "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "ppa.launchpad.net [Apple open use]",
        "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
        "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
        "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
        "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
        "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
        "http://mail.thyrsus.com/ [phishing]",
        "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "c.oooooooooo.ga (c.apple.com cdn)",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "www42.jhonisdead.com",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor"
          ],
          "malware_families": [
            "Dark power",
            "Suppobox",
            "Alf:trojan:win32/formbook",
            "Behav",
            "Emotet",
            "Babar",
            "Wannacry kill switch",
            "China telecom",
            "Cl0p",
            "Hacktool",
            "Domains",
            "Win32.pdf.alien",
            "Inmortal",
            "Cobalt strike",
            "Pws:win32/xport",
            "Lockbit",
            "Tulach",
            "Redline",
            "Worm:win32/bloored.e",
            "Pegasus",
            "Redirector",
            "Freemake",
            "Invoke-mimikatz",
            "Win64-trojan/pakes.exp",
            "Sonbokli",
            "Quasar rat",
            "Lumma stealer",
            "Trojan:win32/tiggre",
            "Makop",
            "Uztuby",
            "Qakbot",
            "Ubot",
            "Hsbc",
            "Apnic",
            "Beach research",
            "Zeus",
            "Formbook",
            "Zbot",
            "Mirai",
            "Trojan:win32/wacatac",
            "Alf:trojan:powershell/dynamicloader",
            "Win64:ransomx-gen",
            "Trojanspy",
            "Qbot",
            "Vitzo",
            "Ransomexx (elf)",
            "Rms",
            "Njrat",
            "Ransom:win32/makop",
            "Maltiverse",
            "Webtoolbar"
          ],
          "industries": [
            "Technology",
            "Health",
            "Healthcare"
          ],
          "unique_indicators": 53713
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/ciassoc.com",
    "whois": "http://whois.domaintools.com/ciassoc.com",
    "domain": "ciassoc.com",
    "hostname": "cpcontacts.ciassoc.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 14,
  "pulses": [
    {
      "id": "69d3532c76eb3bf5edd9609b",
      "name": "clone credit octoseek-Dark Power - Pegasus | https://lawlink.com/ CREATED 2 YEARS AGO MODIFIED 2 YEARS AGO by OctoSeek",
      "description": "",
      "modified": "2026-04-06T06:31:08.181000",
      "created": "2026-04-06T06:31:08.181000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65bbb998c3b7662e5059b6c2",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "13 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d3532a6537880f6e2c68dc",
      "name": "clone credit octoseek-Dark Power - Pegasus | https://lawlink.com/ CREATED 2 YEARS AGO MODIFIED 2 YEARS AGO by OctoSeek",
      "description": "",
      "modified": "2026-04-06T06:31:06.730000",
      "created": "2026-04-06T06:31:06.730000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65bbb998c3b7662e5059b6c2",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "13 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66994bda3e150656cd5ac9dd",
      "name": "Browser Session Hijacking Various MyChart Phishing Scams",
      "description": "Ongoing issues with medical information hijacking. Various medical corporations affected. Tracking, medical, injection process, records retrieval, botnets.",
      "modified": "2024-08-17T16:01:11.866000",
      "created": "2024-07-18T17:07:38.719000",
      "tags": [
        "historical ssl",
        "referrer",
        "domains",
        "august",
        "phishingscams",
        "domains part",
        "domain tracker",
        "roundup",
        "new problems",
        "privacy badger",
        "startpage",
        "self",
        "httponly",
        "samesitenone",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "pragma",
        "mychartlocale",
        "urls",
        "ip detections",
        "country",
        "contacted",
        "files",
        "file type",
        "name file",
        "gmbh",
        "cloudflare",
        "tucows",
        "ii llc",
        "alibaba cloud",
        "computing",
        "sample",
        "media t1091",
        "t1497 may",
        "mitre att",
        "access ta0001",
        "replication",
        "ta0004 process",
        "injection t1055",
        "defense evasion",
        "http requests",
        "get http",
        "request",
        "host",
        "dns resolutions",
        "ip traffic",
        "hashes",
        "tsara brashears",
        "red team",
        "hackers",
        "highly targeted",
        "critical risk",
        "cyberstalking",
        "apple",
        "apple ios",
        "logistics",
        "cyber defense",
        "guloader",
        "hacktool",
        "emotet",
        "phishing",
        "facebook",
        "malware",
        "hiddentear",
        "maze",
        "server",
        "domain status",
        "date",
        "algorithm",
        "google llc",
        "registrar abuse",
        "registrar",
        "record type",
        "ttl value",
        "aaaa",
        "whois lookup",
        "admin country",
        "ca creation",
        "dnssec",
        "markmonitor",
        "siblings",
        "whois lookups",
        "expiration date",
        "registrar iana",
        "creation date",
        "first",
        "united",
        "as15169 google",
        "cname",
        "status",
        "virtool",
        "cryp",
        "as396982 google",
        "search",
        "name servers",
        "win32",
        "remote"
      ],
      "references": [
        "MyChart Phishing Scams",
        "exploit_source IP's: 20.99.186.246 , 40.126.24.147 , 40.126.24.149 , 40.126.24.81 , 40.126.24.82",
        "VirTool:Win32/Obfuscator: 0.googleusercontent.com [hacking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\t URL\thttp://45.159.189.105/bot/regex |\thttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win64-Trojan/Pakes.Exp",
          "display_name": "Win64-Trojan/Pakes.Exp",
          "target": null
        },
        {
          "id": "Win64:RansomX-gen",
          "display_name": "Win64:RansomX-gen",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 37,
        "FileHash-SHA1": 33,
        "FileHash-SHA256": 3473,
        "domain": 693,
        "URL": 4384,
        "hostname": 1610,
        "CVE": 2,
        "email": 3
      },
      "indicator_count": 10235,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "610 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bbb9815816db0de034f3a3",
      "name": "Dark Power - Pegasus |  https://lawlink.com/",
      "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
      "modified": "2024-03-02T13:01:40.418000",
      "created": "2024-02-01T15:32:17.285000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "778 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bbb98c440c1c45ec12ccdc",
      "name": "Dark Power - Pegasus |  https://lawlink.com/",
      "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
      "modified": "2024-03-02T13:01:40.418000",
      "created": "2024-02-01T15:32:28.063000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "778 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bbb98d9818cca8f130c195",
      "name": "Dark Power - Pegasus |  https://lawlink.com/",
      "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
      "modified": "2024-03-02T13:01:40.418000",
      "created": "2024-02-01T15:32:29.619000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "778 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bbb998c3b7662e5059b6c2",
      "name": "Dark Power - Pegasus |  https://lawlink.com/",
      "description": "Dark Power ransomware first emerged in early 2023. The group engages in multi-extortion, threatening to release victim data for various reasons. Dark Power encrypts the victim's files and requests a ransom payment in exchange for the decryption key. Dark Power's ransom note is distinct from other ransomware campaigns.\n\nPrivilege and other abusive practices considering individuals targeted.",
      "modified": "2024-03-02T13:01:40.418000",
      "created": "2024-02-01T15:32:40.759000",
      "tags": [
        "no expiration",
        "filehashmd5",
        "iocs",
        "next",
        "scan endpoints",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "filehashsha1",
        "filehashsha256",
        "ipv4",
        "expiration",
        "url http",
        "url https",
        "hostname",
        "domain",
        "domain xn",
        "orgid1054",
        "ruen",
        "multiru",
        "multi",
        "fh no",
        "f no",
        "m892175",
        "n1822",
        "contact",
        "contacted",
        "ciphersuite",
        "backdoor",
        "generic malware",
        "mydoom",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "1b@ssl.com",
        "apple",
        "all octoseek",
        "aaaa",
        "access",
        "alerts",
        "analyze",
        "antivirus",
        "apple as714",
        "apple as8075",
        "bootstrap@4.6.2",
        "body",
        "cellebrite",
        "cobalt strike",
        "command and control",
        "content type",
        "core",
        "create c",
        "cyber threat",
        "dark power",
        "privilege",
        "abuse",
        "legal",
        "privilege abuse",
        "preemptive policing",
        "ransomware",
        "dns",
        "worm",
        "network",
        "rat",
        "bat",
        "colorado",
        "douglas county",
        "pd",
        "racism",
        "sexism",
        "cover up",
        "malicious",
        "jeffrey reimer dpt",
        "default",
        "defender",
        "delete c",
        "dnssec",
        "document file",
        "dynamic",
        "dynamicloader",
        "emotet",
        "execution",
        "expiration",
        "date",
        "factory",
        "february",
        "filehash",
        "formbook",
        "hacktool",
        "framing",
        "harstel",
        "florence, co",
        "sherida",
        "spyeye",
        "castle pines",
        "tools",
        "defense",
        "medical malpractice fraud",
        "scheme",
        "tsara brashears",
        "targeting",
        "swatting",
        "high",
        "hostname",
        "hostnames",
        "malicious prosecution",
        "apb",
        "installer",
        "intel",
        "iocs",
        "ios",
        "lawlink@2x.svg",
        "local",
        "local",
        "lockbit",
        "lumma stealer",
        "corruption",
        "state actors",
        "untitled states",
        "installer",
        "intel",
        "makop",
        "malware",
        "silencing",
        "ms windows",
        "human rights",
        "civil rights",
        "retaliation",
        "name servers",
        "next",
        "passive dns",
        "paste",
        "collect contacts",
        "password",
        "unlock phone",
        "ios",
        "apple gateway",
        "android overlay",
        "interfacing",
        "pe32",
        "pegasus",
        "phishing",
        "protect",
        "pulse",
        "pulses",
        "qakbot",
        "quasar",
        "ransomexx",
        "read c",
        "record value",
        "regdword",
        "regsetvalueexa",
        "relacionada",
        "sample",
        "samples",
        "scan endpoints",
        "search",
        "servers",
        "shared",
        "show",
        "ssl certificate",
        "status",
        "stealer",
        "survivor",
        "t1063",
        "targets sa",
        "url",
        "xport",
        "write c",
        "write",
        "win32",
        "whois record",
        "threat",
        "threat analyzer",
        "tlsv1",
        "tracking",
        "united",
        "unknown",
        "urls",
        "urls https",
        "ursnif",
        "v2 document",
        "vanilla-lazyload@12.0.0",
        "vista event"
      ],
      "references": [
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "cbi.com",
        "deviceinbox.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [iOS unlocker password cracker]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing, apple data collecting, malvertizing]",
        "http://api.steampowered.com/http:/api.steampowered.com/ISteamUser/GetPlayerSummaries/v2/?key=C48A57D233D635FB8F3F10A436ECC1C6&steamids=76561198381531427 [Apple ' Get Player Summary]",
        "support.apple.com [nefarious]",
        "caselaw.lawlink.com",
        "http://mail.thyrsus.com/ [phishing]",
        "ppa.launchpad.net [Apple open use]",
        "http://www.apple.com/certificateauthority/AppleApplicationIntegrationCA5G1.cer [Apple Ubuntu access]",
        "1click-uninstaller.informer.com [Apple - access PE]",
        "http://findbetterresults.com/Merino_Wool_Sweater.cfm?domain=forever-maroc.info&fp=8hY5xppsJcgtsARaT7WA9YWFkv73AgUQdyA1jnNh+yA3h9O8vZwUKqaru+BK8mHlpfLdKQ3uyLeEMmr67cTpI5enUnehh8e08wXWZNWzuUuirPDdezatbM1egtU/y9NvL+vDq1mMMFh/mM2oY2OTk3Q55I/HPDvMg9G5tDB7B2NI1ORnlbH9It49w5nNtE8GPJO62ZrvE7op4RE1uejyAg==&yep=tn+cv4IO28h1WrEcdzQlEs/jm101ce3N5Yd+dISS3zi1qqYLL/bRey5jbLHFBau3HlE+l5mG3OfHGMjIhgUcSjmzkFmO8xF5WIF5bJ3TAo5F28EHKI1Zq/4skZteAEAU5z84hISeRSzcOq5BOh6KqXkJ975lpWA3dnOl6D4sRQWtda/GdACNYKHuxXk56T3vAIxgvjIsOYAJmKp5S"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:PowerShell/DynamicLoader",
          "display_name": "ALF:Trojan:PowerShell/DynamicLoader",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored.E",
          "display_name": "Worm:Win32/Bloored.E",
          "target": "/malware/Worm:Win32/Bloored.E"
        },
        {
          "id": "Makop",
          "display_name": "Makop",
          "target": null
        },
        {
          "id": "RansomEXX (ELF)",
          "display_name": "RansomEXX (ELF)",
          "target": null
        },
        {
          "id": "Ransom:Win32/Makop",
          "display_name": "Ransom:Win32/Makop",
          "target": "/malware/Ransom:Win32/Makop"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "PWS:Win32/XPort",
          "display_name": "PWS:Win32/XPort",
          "target": "/malware/PWS:Win32/XPort"
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1505.001",
          "name": "SQL Stored Procedures",
          "display_name": "T1505.001 - SQL Stored Procedures"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 29,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1353,
        "URL": 5046,
        "FileHash-MD5": 5182,
        "FileHash-SHA1": 2869,
        "FileHash-SHA256": 4063,
        "hostname": 2471,
        "email": 28,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 21019,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "778 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657ab025b97f20f31bbfcd70",
      "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
      "description": "Alleged attorney defending Jeffrey Scott Reimer DPT. Firm uses every possible tool to destroy, make life unbearable, threaten and cause harm to targets. I don't  feel safe. I hope this research helps the next target.\n\nMissouri government is seen throughout. The corruption is mafia deep. There is tracking. In person stalking, theft, identity theft, mail theft, modification of records and services, legitimate death threats,etc.\nOpen records act: Target has made multiple reports to authorities regarding physical assaults, threats, phone hacking, etc. OCA:  Reports show a settlement was paid by Brian Sabey in part to help Tsara Brashears discover hacker.\nI've been receiving death threats, followed, property accessed, tampering. Attacking entire family including her children, father and beyond.",
      "modified": "2024-01-13T06:01:05.467000",
      "created": "2023-12-14T07:35:01.537000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "historical ssl",
        "communicating",
        "referrer",
        "execution",
        "tsara brashears",
        "highly targeted",
        "njrat",
        "ransomware",
        "heodo",
        "tag count",
        "thu aug",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "malicious url",
        "blacklist https",
        "united",
        "firehol",
        "maltiverse",
        "cyber threat",
        "control server",
        "host",
        "phishing",
        "engineering",
        "paypal",
        "download",
        "malware",
        "nanocore rat",
        "meterpreter",
        "pony",
        "facebook",
        "stealer",
        "redline stealer",
        "dnspionage",
        "mirai",
        "nanocore",
        "bradesco",
        "emotet",
        "cobalt strike",
        "bank",
        "zeus",
        "zbot",
        "suppobox",
        "generic",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "reverse dns",
        "general full",
        "url https",
        "resource",
        "protocol h2",
        "security tls",
        "software",
        "get h2",
        "hash",
        "main",
        "search live",
        "api blog",
        "docs pricing",
        "december",
        "hall render",
        "advisory",
        "brochure url",
        "link url",
        "linkedin link",
        "facebook link",
        "value",
        "login",
        "variables",
        "modernizr",
        "lsmeta function",
        "lsoldgsqueue",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "no data",
        "tld count",
        "urls",
        "count blacklist",
        "heur",
        "html",
        "site top",
        "malicious site",
        "malware site",
        "riskware",
        "exploit",
        "win64",
        "unsafe",
        "genkryptik",
        "artemis",
        "opencandy",
        "agent",
        "dropper",
        "fakealert",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "tiggre",
        "presenoker",
        "filetour",
        "cleaner",
        "conduit",
        "wacatac",
        "mimikatz",
        "redirector",
        "deepscan",
        "iframe",
        "memscan",
        "suspicious",
        "magazine",
        "applicunwnt",
        "alexa",
        "phish",
        "win32.pdf.alien",
        "freemake",
        "webtoolbar",
        "trojanspy",
        "label",
        "input",
        "form",
        "button",
        "render",
        "articles",
        "column",
        "brian",
        "search",
        "contact",
        "span",
        "accept",
        "this",
        "close",
        "district",
        "ultimate",
        "ip address",
        "blacklist",
        "covid19",
        "phishing chase",
        "windows nt",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "digicert global",
        "g2 tls",
        "rsa sha256",
        "bypass",
        "formbook",
        "generic malware",
        "cutwail",
        "safe site",
        "phishing site",
        "team",
        "tofsee",
        "azorult",
        "service",
        "runescape",
        "remcos",
        "malicious",
        "miner",
        "hacktool",
        "agenttesla",
        "unknown",
        "downloader",
        "trojan",
        "detplock",
        "networm",
        "cryptinject",
        "beach research",
        "rms",
        "redline",
        "brian sabey",
        "hallrender.com",
        "hallrender.com/attorney/brian-sabey",
        "tulach",
        "tulach.cc",
        "mo.gov",
        "safebae.org",
        "civicalg.com",
        "civicalg",
        "passive dns",
        "domain",
        "registrar",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse pulses",
        "date",
        "next",
        "computer",
        "company limited",
        "first",
        "utc submissions",
        "submitters",
        "gti9158",
        "gti9080l",
        "gti9128v",
        "summary iocs",
        "graph community",
        "namecheap inc",
        "cloudflare",
        "com laude",
        "ltd dba",
        "porkbun llc",
        "ii llc",
        "csc corporate",
        "amazon02",
        "google",
        "cloudflarenet",
        "akamaias",
        "innova co",
        "indonesia",
        "level3",
        "china telecom",
        "mb setup",
        "mb opera",
        "mb qimage",
        "mb iesettings",
        "mb super",
        "optimizer",
        "premium",
        "pattern match",
        "file",
        "ascii text",
        "indicator",
        "jpeg image",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "traffic",
        "tor known",
        "exit",
        "node tcp",
        "tor relayrouter",
        "spammer",
        "tor exit",
        "threats et",
        "node udp",
        "adware",
        "quasar rat",
        "installpack",
        "xrat",
        "fusioncore",
        "union",
        "raccoon",
        "metastealer",
        "xtrat",
        "blacklist http",
        "url http",
        "hijacking",
        "information",
        "report spam",
        "attorney",
        "trojanx",
        "zpevdo",
        "vidar",
        "agent tesla",
        "nymaim",
        "virut",
        "occamy",
        "iobit",
        "sality",
        "all search",
        "otx octoseek",
        "author avatar",
        "role title",
        "added active",
        "related pulses",
        "entries",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "pulses",
        "ipv4",
        "expiration",
        "no expiration",
        "iocs",
        "create new",
        "site safe",
        "lovgate",
        "unruy",
        "patcher",
        "nsis",
        "installcore",
        "adload",
        "cve201711882",
        "sonbokli",
        "ubot",
        "hsbc",
        "uztuby",
        "malicious host",
        "microsoft",
        "psexec",
        "brontok",
        "startpage",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "threat roundup",
        "c2 raccoon",
        "march",
        "critical risk",
        "apple phone",
        "unlocker",
        "installer",
        "laplasclipper",
        "blister",
        "june",
        "name verdict",
        "falcon sandbox",
        "malware generic",
        "tue dec",
        "temp",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "twitter",
        "seraph",
        "bazaloader",
        "media",
        "security",
        "technology",
        "dns replication",
        "virustotal",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "notepad",
        "java",
        "update checker",
        "verisign",
        "server",
        "asia pacific",
        "data",
        "whois database",
        "registrar abuse",
        "apnic whois",
        "apnic",
        "icann whois",
        "nanjing",
        "cnnic",
        "hackers",
        "virus network",
        "relacionada",
        "cyberstalking",
        "excel",
        "macros sneaky",
        "unauthorized",
        "wannacry kill",
        "attack",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "quasar",
        "metro",
        "copy",
        "project",
        "cnc server",
        "proxy",
        "ramnit",
        "cl0p",
        "inmortal",
        "noname057",
        "jul jan",
        "fri jun",
        "tag tag",
        "failed_code_integrity_checks",
        "python_initiated-connection",
        "powershell_create_scheduled",
        "creation_of_an_executable_by_an_executable",
        "botnetwork",
        "c2",
        "apple hacking",
        "government relations",
        "abuse",
        "download csv",
        "json ip",
        "linkid252669",
        "adwaresig",
        "suspected",
        "filerepmalware",
        "dapato",
        "predator",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "mediaget",
        "softonic",
        "encpk",
        "qbot",
        "kraddare",
        "dllinject",
        "driverpack",
        "genpack",
        "offercore",
        "vitzo",
        "babar",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers",
        "connection",
        "pragma",
        "team malware",
        "binder",
        "pykspa",
        "feodo",
        "mark",
        "bomb",
        "whois whois",
        "whois parent",
        "glupteba",
        "setup stub",
        "c2ae"
      ],
      "references": [
        "https://hallrender.com/attorney/brian-sabey",
        "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
        "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
        "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
        "192.124.249.53:80",
        "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
        "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
        "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
        "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
        "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
        "rp.dudaran2.com [routerlogin.net to safebae.org]",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
        "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
        "https://poemhunter.com/tsara-brashears/",
        "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
        "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
        "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
        "government.westlaw.com",
        "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
        "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
        "west-sca.duckdns.org",
        "us-west-2.es.amazonaws.com     (pslicorp)",
        "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
        "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
        "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
        "www.hallrender.com (malware hosting)",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "www.dead-speak.com",
        "www42.jhonisdead.com",
        "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
        "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
        "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
        "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
        "fakecelebporno.com",
        "batchcourtexpressservicesqa.westlaw.com",
        "batchpublicrecords.westlaw.com",
        "apple-aqo.com (1 DNSPod.net)",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
        "c.oooooooooo.ga (c.apple.com cdn)",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "init.ess.apple.com ( Code Script \u2022 MortalK)",
        "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
        "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
        "https://www.hallrender.com/attorney/brian-sabey"
      ],
      "public": 1,
      "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WIN32.PDF.Alien",
          "display_name": "WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "Freemake",
          "display_name": "Freemake",
          "target": null
        },
        {
          "id": "Redirector",
          "display_name": "Redirector",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Behav",
          "display_name": "Behav",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "RMS",
          "display_name": "RMS",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "WIN32.PDF.ALIEN",
          "display_name": "WIN32.PDF.ALIEN",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "njRAT",
          "display_name": "njRAT",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre",
          "display_name": "Trojan:Win32/Tiggre",
          "target": "/malware/Trojan:Win32/Tiggre"
        },
        {
          "id": "Invoke-Mimikatz",
          "display_name": "Invoke-Mimikatz",
          "target": null
        },
        {
          "id": "China Telecom",
          "display_name": "China Telecom",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Sonbokli",
          "display_name": "Sonbokli",
          "target": null
        },
        {
          "id": "Ubot",
          "display_name": "Ubot",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "Uztuby",
          "display_name": "Uztuby",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Vitzo",
          "display_name": "Vitzo",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 512,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2001,
        "hostname": 3531,
        "URL": 7519,
        "FileHash-MD5": 2851,
        "FileHash-SHA1": 1622,
        "FileHash-SHA256": 5092,
        "CVE": 24,
        "email": 9,
        "CIDR": 4
      },
      "indicator_count": 22653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "827 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657c03432f4f2997c7d3aff4",
      "name": "CryptInject \u2022 Inmortal \u2022 Invoke-Mimikatz \u2022 WannaCry Kill Switch",
      "description": "",
      "modified": "2024-01-13T06:01:05.467000",
      "created": "2023-12-15T07:41:55.972000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "historical ssl",
        "communicating",
        "referrer",
        "execution",
        "tsara brashears",
        "highly targeted",
        "njrat",
        "ransomware",
        "heodo",
        "tag count",
        "thu aug",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "malicious url",
        "blacklist https",
        "united",
        "firehol",
        "maltiverse",
        "cyber threat",
        "control server",
        "host",
        "phishing",
        "engineering",
        "paypal",
        "download",
        "malware",
        "nanocore rat",
        "meterpreter",
        "pony",
        "facebook",
        "stealer",
        "redline stealer",
        "dnspionage",
        "mirai",
        "nanocore",
        "bradesco",
        "emotet",
        "cobalt strike",
        "bank",
        "zeus",
        "zbot",
        "suppobox",
        "generic",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "reverse dns",
        "general full",
        "url https",
        "resource",
        "protocol h2",
        "security tls",
        "software",
        "get h2",
        "hash",
        "main",
        "search live",
        "api blog",
        "docs pricing",
        "december",
        "hall render",
        "advisory",
        "brochure url",
        "link url",
        "linkedin link",
        "facebook link",
        "value",
        "login",
        "variables",
        "modernizr",
        "lsmeta function",
        "lsoldgsqueue",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "no data",
        "tld count",
        "urls",
        "count blacklist",
        "heur",
        "html",
        "site top",
        "malicious site",
        "malware site",
        "riskware",
        "exploit",
        "win64",
        "unsafe",
        "genkryptik",
        "artemis",
        "opencandy",
        "agent",
        "dropper",
        "fakealert",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "tiggre",
        "presenoker",
        "filetour",
        "cleaner",
        "conduit",
        "wacatac",
        "mimikatz",
        "redirector",
        "deepscan",
        "iframe",
        "memscan",
        "suspicious",
        "magazine",
        "applicunwnt",
        "alexa",
        "phish",
        "win32.pdf.alien",
        "freemake",
        "webtoolbar",
        "trojanspy",
        "label",
        "input",
        "form",
        "button",
        "render",
        "articles",
        "column",
        "brian",
        "search",
        "contact",
        "span",
        "accept",
        "this",
        "close",
        "district",
        "ultimate",
        "ip address",
        "blacklist",
        "covid19",
        "phishing chase",
        "windows nt",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "digicert global",
        "g2 tls",
        "rsa sha256",
        "bypass",
        "formbook",
        "generic malware",
        "cutwail",
        "safe site",
        "phishing site",
        "team",
        "tofsee",
        "azorult",
        "service",
        "runescape",
        "remcos",
        "malicious",
        "miner",
        "hacktool",
        "agenttesla",
        "unknown",
        "downloader",
        "trojan",
        "detplock",
        "networm",
        "cryptinject",
        "beach research",
        "rms",
        "redline",
        "brian sabey",
        "hallrender.com",
        "hallrender.com/attorney/brian-sabey",
        "tulach",
        "tulach.cc",
        "mo.gov",
        "safebae.org",
        "civicalg.com",
        "civicalg",
        "passive dns",
        "domain",
        "registrar",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse pulses",
        "date",
        "next",
        "computer",
        "company limited",
        "first",
        "utc submissions",
        "submitters",
        "gti9158",
        "gti9080l",
        "gti9128v",
        "summary iocs",
        "graph community",
        "namecheap inc",
        "cloudflare",
        "com laude",
        "ltd dba",
        "porkbun llc",
        "ii llc",
        "csc corporate",
        "amazon02",
        "google",
        "cloudflarenet",
        "akamaias",
        "innova co",
        "indonesia",
        "level3",
        "china telecom",
        "mb setup",
        "mb opera",
        "mb qimage",
        "mb iesettings",
        "mb super",
        "optimizer",
        "premium",
        "pattern match",
        "file",
        "ascii text",
        "indicator",
        "jpeg image",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "traffic",
        "tor known",
        "exit",
        "node tcp",
        "tor relayrouter",
        "spammer",
        "tor exit",
        "threats et",
        "node udp",
        "adware",
        "quasar rat",
        "installpack",
        "xrat",
        "fusioncore",
        "union",
        "raccoon",
        "metastealer",
        "xtrat",
        "blacklist http",
        "url http",
        "hijacking",
        "information",
        "report spam",
        "attorney",
        "trojanx",
        "zpevdo",
        "vidar",
        "agent tesla",
        "nymaim",
        "virut",
        "occamy",
        "iobit",
        "sality",
        "all search",
        "otx octoseek",
        "author avatar",
        "role title",
        "added active",
        "related pulses",
        "entries",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "pulses",
        "ipv4",
        "expiration",
        "no expiration",
        "iocs",
        "create new",
        "site safe",
        "lovgate",
        "unruy",
        "patcher",
        "nsis",
        "installcore",
        "adload",
        "cve201711882",
        "sonbokli",
        "ubot",
        "hsbc",
        "uztuby",
        "malicious host",
        "microsoft",
        "psexec",
        "brontok",
        "startpage",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "threat roundup",
        "c2 raccoon",
        "march",
        "critical risk",
        "apple phone",
        "unlocker",
        "installer",
        "laplasclipper",
        "blister",
        "june",
        "name verdict",
        "falcon sandbox",
        "malware generic",
        "tue dec",
        "temp",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "twitter",
        "seraph",
        "bazaloader",
        "media",
        "security",
        "technology",
        "dns replication",
        "virustotal",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "notepad",
        "java",
        "update checker",
        "verisign",
        "server",
        "asia pacific",
        "data",
        "whois database",
        "registrar abuse",
        "apnic whois",
        "apnic",
        "icann whois",
        "nanjing",
        "cnnic",
        "hackers",
        "virus network",
        "relacionada",
        "cyberstalking",
        "excel",
        "macros sneaky",
        "unauthorized",
        "wannacry kill",
        "attack",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "quasar",
        "metro",
        "copy",
        "project",
        "cnc server",
        "proxy",
        "ramnit",
        "cl0p",
        "inmortal",
        "noname057",
        "jul jan",
        "fri jun",
        "tag tag",
        "failed_code_integrity_checks",
        "python_initiated-connection",
        "powershell_create_scheduled",
        "creation_of_an_executable_by_an_executable",
        "botnetwork",
        "c2",
        "apple hacking",
        "government relations",
        "abuse",
        "download csv",
        "json ip",
        "linkid252669",
        "adwaresig",
        "suspected",
        "filerepmalware",
        "dapato",
        "predator",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "mediaget",
        "softonic",
        "encpk",
        "qbot",
        "kraddare",
        "dllinject",
        "driverpack",
        "genpack",
        "offercore",
        "vitzo",
        "babar",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers",
        "connection",
        "pragma",
        "team malware",
        "binder",
        "pykspa",
        "feodo",
        "mark",
        "bomb",
        "whois whois",
        "whois parent",
        "glupteba",
        "setup stub",
        "c2ae"
      ],
      "references": [
        "https://hallrender.com/attorney/brian-sabey",
        "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
        "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
        "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
        "192.124.249.53:80",
        "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
        "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
        "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
        "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
        "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
        "rp.dudaran2.com [routerlogin.net to safebae.org]",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
        "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
        "https://poemhunter.com/tsara-brashears/",
        "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
        "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
        "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
        "government.westlaw.com",
        "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
        "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
        "west-sca.duckdns.org",
        "us-west-2.es.amazonaws.com     (pslicorp)",
        "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
        "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
        "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
        "www.hallrender.com (malware hosting)",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "www.dead-speak.com",
        "www42.jhonisdead.com",
        "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
        "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
        "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
        "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
        "fakecelebporno.com",
        "batchcourtexpressservicesqa.westlaw.com",
        "batchpublicrecords.westlaw.com",
        "apple-aqo.com (1 DNSPod.net)",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
        "c.oooooooooo.ga (c.apple.com cdn)",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "init.ess.apple.com ( Code Script \u2022 MortalK)",
        "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
        "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
        "https://www.hallrender.com/attorney/brian-sabey"
      ],
      "public": 1,
      "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WIN32.PDF.Alien",
          "display_name": "WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "Freemake",
          "display_name": "Freemake",
          "target": null
        },
        {
          "id": "Redirector",
          "display_name": "Redirector",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Behav",
          "display_name": "Behav",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "RMS",
          "display_name": "RMS",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "WIN32.PDF.ALIEN",
          "display_name": "WIN32.PDF.ALIEN",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "njRAT",
          "display_name": "njRAT",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre",
          "display_name": "Trojan:Win32/Tiggre",
          "target": "/malware/Trojan:Win32/Tiggre"
        },
        {
          "id": "Invoke-Mimikatz",
          "display_name": "Invoke-Mimikatz",
          "target": null
        },
        {
          "id": "China Telecom",
          "display_name": "China Telecom",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Sonbokli",
          "display_name": "Sonbokli",
          "target": null
        },
        {
          "id": "Ubot",
          "display_name": "Ubot",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "Uztuby",
          "display_name": "Uztuby",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Vitzo",
          "display_name": "Vitzo",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "white",
      "cloned_from": "657ab025b97f20f31bbfcd70",
      "export_count": 508,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2001,
        "hostname": 3531,
        "URL": 7519,
        "FileHash-MD5": 2851,
        "FileHash-SHA1": 1622,
        "FileHash-SHA256": 5092,
        "CVE": 24,
        "email": 9,
        "CIDR": 4
      },
      "indicator_count": 22653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "827 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657c045ef15bd06d27da1b08",
      "name": "Resource Hijacking by attorney https://hallrender.com/attorney/brian-sabey",
      "description": "",
      "modified": "2024-01-13T06:01:05.467000",
      "created": "2023-12-15T07:46:38.664000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "historical ssl",
        "communicating",
        "referrer",
        "execution",
        "tsara brashears",
        "highly targeted",
        "njrat",
        "ransomware",
        "heodo",
        "tag count",
        "thu aug",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "malicious url",
        "blacklist https",
        "united",
        "firehol",
        "maltiverse",
        "cyber threat",
        "control server",
        "host",
        "phishing",
        "engineering",
        "paypal",
        "download",
        "malware",
        "nanocore rat",
        "meterpreter",
        "pony",
        "facebook",
        "stealer",
        "redline stealer",
        "dnspionage",
        "mirai",
        "nanocore",
        "bradesco",
        "emotet",
        "cobalt strike",
        "bank",
        "zeus",
        "zbot",
        "suppobox",
        "generic",
        "site",
        "cisco umbrella",
        "alexa top",
        "million",
        "reverse dns",
        "general full",
        "url https",
        "resource",
        "protocol h2",
        "security tls",
        "software",
        "get h2",
        "hash",
        "main",
        "search live",
        "api blog",
        "docs pricing",
        "december",
        "hall render",
        "advisory",
        "brochure url",
        "link url",
        "linkedin link",
        "facebook link",
        "value",
        "login",
        "variables",
        "modernizr",
        "lsmeta function",
        "lsoldgsqueue",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "no data",
        "tld count",
        "urls",
        "count blacklist",
        "heur",
        "html",
        "site top",
        "malicious site",
        "malware site",
        "riskware",
        "exploit",
        "win64",
        "unsafe",
        "genkryptik",
        "artemis",
        "opencandy",
        "agent",
        "dropper",
        "fakealert",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "tiggre",
        "presenoker",
        "filetour",
        "cleaner",
        "conduit",
        "wacatac",
        "mimikatz",
        "redirector",
        "deepscan",
        "iframe",
        "memscan",
        "suspicious",
        "magazine",
        "applicunwnt",
        "alexa",
        "phish",
        "win32.pdf.alien",
        "freemake",
        "webtoolbar",
        "trojanspy",
        "label",
        "input",
        "form",
        "button",
        "render",
        "articles",
        "column",
        "brian",
        "search",
        "contact",
        "span",
        "accept",
        "this",
        "close",
        "district",
        "ultimate",
        "ip address",
        "blacklist",
        "covid19",
        "phishing chase",
        "windows nt",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "digicert global",
        "g2 tls",
        "rsa sha256",
        "bypass",
        "formbook",
        "generic malware",
        "cutwail",
        "safe site",
        "phishing site",
        "team",
        "tofsee",
        "azorult",
        "service",
        "runescape",
        "remcos",
        "malicious",
        "miner",
        "hacktool",
        "agenttesla",
        "unknown",
        "downloader",
        "trojan",
        "detplock",
        "networm",
        "cryptinject",
        "beach research",
        "rms",
        "redline",
        "brian sabey",
        "hallrender.com",
        "hallrender.com/attorney/brian-sabey",
        "tulach",
        "tulach.cc",
        "mo.gov",
        "safebae.org",
        "civicalg.com",
        "civicalg",
        "passive dns",
        "domain",
        "registrar",
        "scan endpoints",
        "all octoseek",
        "hostname",
        "pulse pulses",
        "date",
        "next",
        "computer",
        "company limited",
        "first",
        "utc submissions",
        "submitters",
        "gti9158",
        "gti9080l",
        "gti9128v",
        "summary iocs",
        "graph community",
        "namecheap inc",
        "cloudflare",
        "com laude",
        "ltd dba",
        "porkbun llc",
        "ii llc",
        "csc corporate",
        "amazon02",
        "google",
        "cloudflarenet",
        "akamaias",
        "innova co",
        "indonesia",
        "level3",
        "china telecom",
        "mb setup",
        "mb opera",
        "mb qimage",
        "mb iesettings",
        "mb super",
        "optimizer",
        "premium",
        "pattern match",
        "file",
        "ascii text",
        "indicator",
        "jpeg image",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "general",
        "hybrid",
        "local",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "traffic",
        "tor known",
        "exit",
        "node tcp",
        "tor relayrouter",
        "spammer",
        "tor exit",
        "threats et",
        "node udp",
        "adware",
        "quasar rat",
        "installpack",
        "xrat",
        "fusioncore",
        "union",
        "raccoon",
        "metastealer",
        "xtrat",
        "blacklist http",
        "url http",
        "hijacking",
        "information",
        "report spam",
        "attorney",
        "trojanx",
        "zpevdo",
        "vidar",
        "agent tesla",
        "nymaim",
        "virut",
        "occamy",
        "iobit",
        "sality",
        "all search",
        "otx octoseek",
        "author avatar",
        "role title",
        "added active",
        "related pulses",
        "entries",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "pulses",
        "ipv4",
        "expiration",
        "no expiration",
        "iocs",
        "create new",
        "site safe",
        "lovgate",
        "unruy",
        "patcher",
        "nsis",
        "installcore",
        "adload",
        "cve201711882",
        "sonbokli",
        "ubot",
        "hsbc",
        "uztuby",
        "malicious host",
        "microsoft",
        "psexec",
        "brontok",
        "startpage",
        "keygen",
        "fareit",
        "secrisk",
        "floxif",
        "threat roundup",
        "c2 raccoon",
        "march",
        "critical risk",
        "apple phone",
        "unlocker",
        "installer",
        "laplasclipper",
        "blister",
        "june",
        "name verdict",
        "falcon sandbox",
        "malware generic",
        "tue dec",
        "temp",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "twitter",
        "seraph",
        "bazaloader",
        "media",
        "security",
        "technology",
        "dns replication",
        "virustotal",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "notepad",
        "java",
        "update checker",
        "verisign",
        "server",
        "asia pacific",
        "data",
        "whois database",
        "registrar abuse",
        "apnic whois",
        "apnic",
        "icann whois",
        "nanjing",
        "cnnic",
        "hackers",
        "virus network",
        "relacionada",
        "cyberstalking",
        "excel",
        "macros sneaky",
        "unauthorized",
        "wannacry kill",
        "attack",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "quasar",
        "metro",
        "copy",
        "project",
        "cnc server",
        "proxy",
        "ramnit",
        "cl0p",
        "inmortal",
        "noname057",
        "jul jan",
        "fri jun",
        "tag tag",
        "failed_code_integrity_checks",
        "python_initiated-connection",
        "powershell_create_scheduled",
        "creation_of_an_executable_by_an_executable",
        "botnetwork",
        "c2",
        "apple hacking",
        "government relations",
        "abuse",
        "download csv",
        "json ip",
        "linkid252669",
        "adwaresig",
        "suspected",
        "filerepmalware",
        "dapato",
        "predator",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "mediaget",
        "softonic",
        "encpk",
        "qbot",
        "kraddare",
        "dllinject",
        "driverpack",
        "genpack",
        "offercore",
        "vitzo",
        "babar",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers",
        "connection",
        "pragma",
        "team malware",
        "binder",
        "pykspa",
        "feodo",
        "mark",
        "bomb",
        "whois whois",
        "whois parent",
        "glupteba",
        "setup stub",
        "c2ae"
      ],
      "references": [
        "https://hallrender.com/attorney/brian-sabey",
        "https://hybrid-analysis.com/sample/66a840a853476a7b66a1202d7f21b28e71b94912341dee123345e620f41fda9d/6571d012385f14f31d0191ad",
        "https://tracking.crazyegg.com/clock?t=1701949195114&tk=09a1de462eccb2ebc17a566aec5ed8b4&s=331938&p=%2Fattorney%2Fbrian-sabey%2F&u=502212&v=618f8e048086160d46ee09468f987c3211863abb&f=hallrender.com%2Fattorney%2Fbrian-sabey&ul=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F ( tracking tsra Brashears,tracking, clock app)",
        "https://www.hallrender.com/attorney/brian-sabey/#breadcrumb",
        "192.124.249.53:80",
        "hallrender.com    (Malware hosting DGA domain, malware hosting, social engineering , fraud services, threat hounds, cyber criminals, dangerous group)",
        "https://www.hallrender.com/service/antitrust/ ('t' process - targetsTsara Brashears)",
        "https://www.hallrender.com/professional/kathy-l-thurston/ (phishing)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1 (malware hosting)",
        "https://www.hallrender.com/wp-content/themes/Hall-Render/assets/js/minified/lazy_load-1.9.7-min.js?ver=3.0.1%27 (malware hosting)",
        "Other malicious Hall Render assets and attacks. This doesn't include evidence of physical, documented crimes against targets who may not know source)",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu phishing and other cybercrime, serious cyber attacks)",
        "114.114.114.114. (auto populated IP descriptions: tulach, brian sabey, apple, law)",
        "rp.dudaran2.com [routerlogin.net to safebae.org]",
        "vortex-nlb-http2-fed-us-taut-purple.nr-data.net [Apple data, ransomed]",
        "https://1.1.1.1/login.html [login access to Brashears' Warp if applicable]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "http://xd.x9.client.api.vpngate2.jp/api/?session_id=1773986324675443378",
        "https://poemhunter.com/tsara-brashears/",
        "https://pin.it/ [Tsara Brashears Lesbian (libel) Botnetwork, libel]",
        "http://45.159.189.105/bot/regex ( Laplas clipper, Password stealer. Tracks Tsara Brashears, devices, location, , behavior. Obsessive targeting & social engineering)",
        "https://www.virustotal.com/graph/g682ab72ed7b14bc68948e2dbfc22be8f7b2a00a339eb490083e18dc764a618dd",
        "government.westlaw.com",
        "web2.westlaw.com (Malicious: Only targets Tsara Brashears & safebae.org/cyber stalking now deceased Daisy Coleman deceased, alleged suicide )",
        "safebae.org (Skynet) Was now deceased Daisy Coleman a real person or actress in Audrey & Daisy? Tragic",
        "west-sca.duckdns.org",
        "us-west-2.es.amazonaws.com     (pslicorp)",
        "hero9780.duckdns.org ( government.westlaw.com/house of mo)",
        "https://www.hallrender.com/2018/12/13/nationwide-emailed-bomb-threats-are-new-ransom-technique (target emailed bomb \"t\" threat, reported, dismissed)",
        "http://www.hallrender.com/resources/blog (Malware hosting, malvertizing URL/ targets Tsara Brashears)",
        "www.hallrender.com (malware hosting)",
        "https://www.milehighmedia.com/en/Charlie-Dean/pornstar/49512 (Mile High Media malvertizing relationship = subsidiary)",
        "https://www.milehighmedia.com/en/pornstar/milehighmedia/Justin-Hunt/51017",
        "www.dead-speak.com",
        "www42.jhonisdead.com",
        "alohatube.xyz (http://benjamin.xww.de/ porn malvertizing blame shift. Formerly property of Hall Render Brian Sabey)",
        "https://alohatube.xyz/search/tsara-brashears (Formerly Botnetwork malvertizing campaign targeting Tsara Brashears crime victim. Now http. Benjamin. xww )",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ (Heavy malvertizing. Phishing m formerly named a Bot Network. )",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ( tagging, malware campaign,  Apple iOS password cracker, libel, straight female)",
        "www.pornhub.com (Targets Tsara Brashears. Pornography malvertizing, tagging)",
        "poemhunter.com (Blacklisted.Target Tsara Brashears with relentless malvertizing attacks including, device hacking)",
        "fakecelebporno.com",
        "batchcourtexpressservicesqa.westlaw.com",
        "batchpublicrecords.westlaw.com",
        "apple-aqo.com (1 DNSPod.net)",
        "http://init.ess.apple.com/WebObjects/VCInit.woa/wa/getBag?ix=4  (Apple access hacktool \u2192init.ess.apple.com/Web0)",
        "c.oooooooooo.ga (c.apple.com cdn)",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "init.ess.apple.com ( Code Script \u2022 MortalK)",
        "34bc869d2906198362a4346373ce5b94 (bpbd.portal.ov.bd/npfblock/2021-jpg.",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net (BitCoin Aussie)",
        "000002f1558a89f29984934d511289491032f9e96a249c12f2f6d42678264114 (Notepad.exe - python initiated connection)",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Pin.It BotNet a Malicious Pinterest fraud service]",
        "https://www.hallrender.com/attorney/brian-sabey"
      ],
      "public": 1,
      "adversary": "M. Brian Sabey Hall Render Malicious & Dangerous Threat Actor",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WIN32.PDF.Alien",
          "display_name": "WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "Freemake",
          "display_name": "Freemake",
          "target": null
        },
        {
          "id": "Redirector",
          "display_name": "Redirector",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "Behav",
          "display_name": "Behav",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "RMS",
          "display_name": "RMS",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "WIN32.PDF.ALIEN",
          "display_name": "WIN32.PDF.ALIEN",
          "target": null
        },
        {
          "id": "ZeuS",
          "display_name": "ZeuS",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "ALF:Trojan:Win32/FormBook",
          "display_name": "ALF:Trojan:Win32/FormBook",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "njRAT",
          "display_name": "njRAT",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tiggre",
          "display_name": "Trojan:Win32/Tiggre",
          "target": "/malware/Trojan:Win32/Tiggre"
        },
        {
          "id": "Invoke-Mimikatz",
          "display_name": "Invoke-Mimikatz",
          "target": null
        },
        {
          "id": "China Telecom",
          "display_name": "China Telecom",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Sonbokli",
          "display_name": "Sonbokli",
          "target": null
        },
        {
          "id": "Ubot",
          "display_name": "Ubot",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "Uztuby",
          "display_name": "Uztuby",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "Vitzo",
          "display_name": "Vitzo",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "white",
      "cloned_from": "657c03432f4f2997c7d3aff4",
      "export_count": 508,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2001,
        "hostname": 3531,
        "URL": 7519,
        "FileHash-MD5": 2851,
        "FileHash-SHA1": 1622,
        "FileHash-SHA256": 5092,
        "CVE": 24,
        "email": 9,
        "CIDR": 4
      },
      "indicator_count": 22653,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "827 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://cpcontacts.ciassoc.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://cpcontacts.ciassoc.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776661424.8909085
}