{
  "type": "URL",
  "indicator": "https://crbug.com/1354474",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://crbug.com/1354474",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4165007676,
      "indicator": "https://crbug.com/1354474",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "6964c08bf79bcb252eaa9e15",
          "name": "TrojanSpy -  Spotify account under an attack which conceals artists releases / deletes followers",
          "description": "Spotify Attacks: TrojanSpy - Streamer Spotify account under an attack which conceals artists releases / deletes followers. The attack is adversarial. I\u2019m unclear how widespread it is.  . Further research required. OTX auto generated Pegasus. Released work that was once viewable is now concealed, followers deleted.\n#cloudfront #spyware #delete_service #cloudfront_attacks",
          "modified": "2026-02-11T09:03:20.933000",
          "created": "2026-01-12T09:36:11.701000",
          "tags": [
            "google",
            "fastly",
            "googlecl",
            "january",
            "http",
            "domain",
            "akamaias",
            "cloudflar",
            "page url",
            "de summary",
            "april",
            "reverse dns",
            "url https",
            "general full",
            "software",
            "united",
            "resource hash",
            "protocol h3",
            "security quic",
            "protocol h2",
            "security tls",
            "main",
            "present jan",
            "title",
            "gmt max",
            "certificate",
            "moved",
            "lowfi",
            "gmt content",
            "meta",
            "present dec",
            "status",
            "aaaa",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "win32",
            "files",
            "verdict",
            "files ip",
            "address",
            "mtb jan",
            "trojandropper",
            "backdoor",
            "win32upatre jan",
            "origin trial",
            "gmt cache",
            "443 ma2592000",
            "possible",
            "worm",
            "trojan",
            "ip address",
            "record value",
            "dark",
            "found",
            "ipv4 add",
            "error",
            "trojanspy",
            "emails",
            "servers",
            "pegasus",
            "america flag",
            "america asn",
            "tlsv1",
            "read c",
            "show",
            "medium",
            "lstockholm",
            "ospotify ab",
            "odigicert inc",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "dynamicloader",
            "yara rule",
            "ms windows",
            "pe32",
            "named pipe",
            "smartassembly",
            "delphi",
            "malware",
            "united states",
            "pe file",
            "filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "high",
            "write c",
            "tls sni",
            "tls handshake",
            "delete",
            "as15169",
            "stun binding",
            "request",
            "port",
            "win64",
            "themida",
            "guard",
            "risepro",
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "size",
            "mitre att",
            "ck id",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "ck techniques",
            "evasion att",
            "t1480 execution",
            "directui",
            "element",
            "hwndhost",
            "classinfobase",
            "hwndelement",
            "value",
            "explorer",
            "insert",
            "movie",
            "hacktool",
            "showing",
            "entries http",
            "scans show",
            "california",
            "location united",
            "next associated",
            "pulse pulses",
            "name servers",
            "found request",
            "unique",
            "url add",
            "related nids",
            "files location",
            "expiration",
            "flag united",
            "present nov",
            "present sep",
            "href",
            "suricata stream",
            "command decode",
            "starfield",
            "encrypt",
            "iframe",
            "date",
            "title error",
            "hostname",
            "pulse submit",
            "memcommit",
            "checks",
            "windows",
            "capture",
            "cloudfront",
            "colorado",
            "creation date",
            "hostname add",
            "eset",
            "binary file",
            "pdb path",
            "internalname",
            "nod32",
            "amon"
          ],
          "references": [
            "open.spotify.com \u2022",
            "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
            "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
            "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
            "https://target.tccwest.www.littleswimmers.fr/",
            "www.onyx-ware.com \u2022 endgamesystems.com",
            "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Packed.Stealerc-10017074-0",
              "display_name": "Win.Packed.Stealerc-10017074-0",
              "target": null
            },
            {
              "id": "#Lowfi:Win32/AutoIt",
              "display_name": "#Lowfi:Win32/AutoIt",
              "target": "/malware/#Lowfi:Win32/AutoIt"
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "TrojanSpy:MSIL/Yakbeex.A",
              "display_name": "TrojanSpy:MSIL/Yakbeex.A",
              "target": "/malware/TrojanSpy:MSIL/Yakbeex.A"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32:HacktoolX-gen\\ [Trj]",
              "display_name": "Win32:HacktoolX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "nUFS_unicode",
              "display_name": "nUFS_unicode",
              "target": null
            },
            {
              "id": "HackTool:Win32/CobaltStrike.A",
              "display_name": "HackTool:Win32/CobaltStrike.A",
              "target": "/malware/HackTool:Win32/CobaltStrike.A"
            },
            {
              "id": "Win.Dropper.PoisonIvy-9876745-0",
              "display_name": "Win.Dropper.PoisonIvy-9876745-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1293,
            "URL": 3389,
            "FileHash-MD5": 635,
            "FileHash-SHA1": 531,
            "FileHash-SHA256": 2345,
            "domain": 501,
            "email": 12,
            "SSLCertFingerprint": 16
          },
          "indicator_count": 8722,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69642a749490c0bf404aa8ac",
          "name": "Google Services - Malware Packed Google Branded Services",
          "description": "Contacted Google services  | Service (1 of 3) || GoogleChromeElevationService | Mofksys \u2022 Unruy | Relationship: https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b | \n#affilliated #worm _#exploit #alternate_google #infection #spyware",
          "modified": "2026-02-10T22:01:54.041000",
          "created": "2026-01-11T22:55:48.308000",
          "tags": [
            "write c",
            "write",
            "delete c",
            "ms windows",
            "pe32 executable",
            "globalc",
            "united",
            "worm",
            "malware",
            "defender",
            "united states",
            "google",
            "google account",
            "mtb ids",
            "cloudflare dns",
            "https domain",
            "tls sni",
            "medium priority",
            "yara detections",
            "alerts",
            "google play",
            "google api",
            "google chrome",
            "mofksys",
            "exploit",
            "process32nextw",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "search",
            "precreate read",
            "read c",
            "dock",
            "unknown",
            "suspicious",
            "alt google",
            "execution att",
            "lowfi",
            "mtb jan",
            "trojandropper",
            "passive dns",
            "backdoor",
            "win32upatre jan",
            "origin trial",
            "gmt cache",
            "443 ma2592000",
            "possible",
            "trojan",
            "title",
            "mtb dec",
            "ipv4 add",
            "state",
            "trojan",
            "dropper",
            "phishing",
            "ransom",
            "of colorado"
          ],
          "references": [
            "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
            "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
            "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
            "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
            "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2",
            "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
            "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
            "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
            "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
            "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
            "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
            "Contacted Google services",
            "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
            "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
            "codewiki.google",
            "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
            "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
            "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
            "Alerts: injection_process_search protection_rx",
            "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
            "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
            "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
            "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
            "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
            "PE Version Information : TJprojMain.exe",
            "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
            "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Unruy-6912804-0",
              "display_name": "Win.Malware.Unruy-6912804-0",
              "target": null
            },
            {
              "id": "Win.Packed.Eyestye-9754938-0",
              "display_name": "Win.Packed.Eyestye-9754938-0",
              "target": null
            },
            {
              "id": "Eyestye",
              "display_name": "Eyestye",
              "target": null
            },
            {
              "id": "AutoRun",
              "display_name": "AutoRun",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Trojan:Win32/EyeStye.T",
              "display_name": "Trojan:Win32/EyeStye.T",
              "target": "/malware/Trojan:Win32/EyeStye.T"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/4Shared",
              "display_name": "ALF:HeraklezEval:PUA:Win32/4Shared",
              "target": null
            },
            {
              "id": "Cassini",
              "display_name": "Cassini",
              "target": null
            },
            {
              "id": "DarkMoon",
              "display_name": "DarkMoon",
              "target": null
            },
            {
              "id": "PolyRansom",
              "display_name": "PolyRansom",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Malware  Packed",
              "display_name": "Malware  Packed",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1078.003",
              "name": "Local Accounts",
              "display_name": "T1078.003 - Local Accounts"
            },
            {
              "id": "T1078.001",
              "name": "Default Accounts",
              "display_name": "T1078.001 - Default Accounts"
            },
            {
              "id": "T1087.003",
              "name": "Email Account",
              "display_name": "T1087.003 - Email Account"
            },
            {
              "id": "T1078.002",
              "name": "Domain Accounts",
              "display_name": "T1078.002 - Domain Accounts"
            },
            {
              "id": "T1090.004",
              "name": "Domain Fronting",
              "display_name": "T1090.004 - Domain Fronting"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 198,
            "FileHash-SHA1": 165,
            "FileHash-SHA256": 867,
            "URL": 1461,
            "hostname": 429,
            "domain": 221,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3342,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69640c0afc9805a6fa2da07b",
          "name": "MUSO.AI Malware \u2018Incredimail\u2019 Palantir in use[OTX auto populated title -Tsara Brashears]",
          "description": "MUSO.Ai , Is have to do more research. Some searches on reports MUSO as an opt in resource for artist to view, sort, and manage legacy credits, MUSO also collects royalties. Research and investigation confirms no one on music team is associated with  or l thinks they may have heard of MUSO. Is MUSO. AI Palantir customer or service ,spy app services by the folks at Palantir. . [otx auto pop praise:  Tsara Brashears is the most popular songwriter in the world, but can you use the app to find out more about the artist and the musicians behind the tracks?] cute. \n#dembiak #palantir #muso #ai",
          "modified": "2026-02-10T20:03:47.214000",
          "created": "2026-01-11T20:46:02.176000",
          "tags": [
            "lark kdence",
            "zack dare",
            "zafira",
            "jon bonus",
            "andy flebbe",
            "div div",
            "present nov",
            "a domains",
            "united",
            "script urls",
            "div a",
            "script domains",
            "discover",
            "moved",
            "insert",
            "x0 tw",
            "urls",
            "cloudfront x",
            "title error",
            "url analysis",
            "reverse dns",
            "servers",
            "name servers",
            "united states",
            "all ipv4",
            "aaaa",
            "ip address",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "evasion att",
            "t1480 execution",
            "ascii text",
            "mitre att",
            "pattern match",
            "null",
            "error",
            "click",
            "hybrid",
            "general",
            "local",
            "path",
            "starfield",
            "strings",
            "refresh",
            "tools",
            "meta",
            "onload",
            "span",
            "data upload",
            "extraction",
            "type",
            "extra",
            "referen https",
            "include review",
            "exclude sugges",
            "stop",
            "aivoes typ",
            "passive dns",
            "date",
            "united states",
            "status",
            "domain add",
            "files",
            "hostname",
            "read c",
            "medium",
            "search",
            "show",
            "memcommit",
            "high",
            "checks",
            "windows",
            "delete",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "next",
            "amazon02",
            "as autonomous",
            "system",
            "asn16509",
            "domain",
            "current dns",
            "a record",
            "as16509",
            "december",
            "ip information",
            "ipasns ip",
            "google",
            "fastly",
            "googlecl",
            "akamaias",
            "cloudflar",
            "domain tree",
            "links ip",
            "address as",
            "cisco",
            "umbrella rank",
            "general full",
            "url https",
            "software",
            "resource hash",
            "protocol h2",
            "security tls",
            "hostname add",
            "challengescript",
            "captchascript",
            "name",
            "value",
            "source level",
            "url text",
            "automatic",
            "webgl",
            "please",
            "extr data",
            "data",
            "size",
            "title",
            "yara detections",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "entries",
            "rgba",
            "unicode",
            "asnone",
            "malware",
            "port",
            "destination",
            "tlsv1",
            "tls handshake",
            "failure",
            "roboto",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "expiration",
            "url http",
            "no expiration",
            "present jan",
            "unknown ns",
            "certificate",
            "body",
            "present oct",
            "present may",
            "present dec",
            "present sep",
            "present feb",
            "showing",
            "next associated",
            "all se",
            "pulse pulses",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "debiak",
            "tsara brashears",
            "ai",
            "palantir",
            "muso ai",
            "sort",
            "artists",
            "royalties",
            "music",
            "songwriter",
            "collect",
            "view",
            "malicious app",
            "false claims"
          ],
          "references": [
            "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
            "22.hio52.r.cloudfront.net",
            "us-gov-west-1.gov.reveal-global.com",
            "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
            "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
            "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
            "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
            "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
            "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
            "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
            "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
            "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
            "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
            "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
            "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
            "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
            "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
            "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
            "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
            "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
            "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
            "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
            "https://glare.pali om. \u2022 http://engage.palantirfou?",
            "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
            "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
            "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
            "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
            "campdeadwood2026.com",
            "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
            "Pornhub to your phone. Dumping or by request?",
            "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
            "www.killer333.club So I\u2019m right."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Incredimail-6804483-0",
              "display_name": "Win.Malware.Incredimail-6804483-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "TA0028",
              "name": "Persistence",
              "display_name": "TA0028 - Persistence"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10686,
            "hostname": 2427,
            "domain": 1094,
            "FileHash-MD5": 175,
            "FileHash-SHA1": 65,
            "FileHash-SHA256": 1118,
            "email": 4,
            "SSLCertFingerprint": 14
          },
          "indicator_count": 15583,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6958372ef9da31513d96bebb",
          "name": "Connected-IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation",
          "description": "Retaliation? IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation for malicious control | found in the analytics of a highly target device: I\u2019ve included related pulses from 2 other threat responders and an Apple discussion post. Surprisingly, most of the IoC\u2019s pulsed came from one page of analytics. | \u2022 \"avconferenced\", \"procPath\" : \"\\/usr\\/libexec\\/avconferenced |  180.4.1.2 | a version of\npegasus found. | https://prometheus-pushgateway-internal.preview.tp-staging.com/\t\nhostname: prometheus.netmaker.vonnue.dev\t\nhostname: prometheus.dev.aws.finoa.io |\nSince Prometheus pulse . I realize now every Prometheus pulse illicits outrageous behavior.. Is this a secret society? Try to be more secretive. Owl heads in lawn. This behavior illicits investigation for a fix. Please STOP. I\u2019m done looking at Prometheus. Please stop leaving artifacts.",
          "modified": "2026-02-01T20:00:08.812000",
          "created": "2026-01-02T21:22:54.247000",
          "tags": [
            "syscall",
            "nsrunloop",
            "objcclass",
            "region type",
            "start",
            "vsize",
            "prtmax shrmod",
            "region detailn",
            "unused space",
            "at startn",
            "guard",
            "urls",
            "url analysis",
            "verdict",
            "domain",
            "address",
            "location japan",
            "hikone",
            "japan asn",
            "as4713 ntt",
            "related tags",
            "none external",
            "aaaa",
            "united",
            "passive dns",
            "ip address",
            "japan",
            "present dec",
            "domain add",
            "files",
            "japan unknown",
            "present jul",
            "present oct",
            "present sep",
            "present aug",
            "present jun",
            "japan showing",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "reverse dns",
            "present nov",
            "present",
            "present may",
            "present mar",
            "present apr",
            "data upload",
            "extraction",
            "failed",
            "files ip",
            "moved",
            "gmt content",
            "ipv4 add",
            "location united",
            "title",
            "ipv4",
            "dns resolutions",
            "hostname add",
            "asn as4713",
            "all ipv4",
            "google",
            "ocn ntt",
            "googlecl",
            "http",
            "amazon02",
            "akamaias",
            "page url",
            "yahoojp",
            "december",
            "jp summary",
            "february",
            "asn15169",
            "tokyo",
            "kansas city",
            "asn396982",
            "asn30286",
            "asn16509",
            "cisco",
            "umbrella rank",
            "cisco umbrella",
            "rank",
            "kitashinagawa",
            "sureserver ev",
            "ca g3",
            "domains",
            "hashes",
            "microsoft",
            "docomo business",
            "ml14325",
            "as autonomous",
            "asn8075",
            "ip information",
            "ipasns ip",
            "detail domain",
            "domain tree",
            "links domain",
            "requested",
            "value",
            "automatic",
            "webgl",
            "please",
            "mr value",
            "muid value",
            "mjl function",
            "dcmlinker",
            "paq string",
            "kb script",
            "b image",
            "b script",
            "frame a344",
            "redirect chain",
            "kb document",
            "frame",
            "b xhr",
            "kb image",
            "fetch collect",
            "request chain",
            "redirected",
            "http redirect",
            "name servers",
            "redacted for",
            "servers",
            "unknown aaaa",
            "search",
            "for privacy",
            "domeny serwery",
            "verdana tahoma",
            "arial",
            "gmt contenttype",
            "meta",
            "small",
            "results jan",
            "present jan",
            "status",
            "record value",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "process details",
            "flag",
            "japan japan",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "null",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "defense evasion",
            "monitored target",
            "pulse submit",
            "wikipedia",
            "imap",
            "smtp",
            "ocn open",
            "discussion",
            "stub",
            "jprs database",
            "ocnnttocn",
            "maintenance",
            "outages notice",
            "lock status",
            "state",
            "connected",
            "organization",
            "type",
            "name",
            "server",
            "name server",
            "connected date",
            "algorithm",
            "key identifier",
            "data",
            "v3 serial",
            "number",
            "cjp ocybertrust",
            "ev ca",
            "g3 validity",
            "ku ontt",
            "docomo",
            "record type",
            "ttl value",
            "thumbprint",
            "emails",
            "date",
            "trojan",
            "pegasus",
            "title error",
            "hostname",
            "pulse pulses",
            "entries",
            "mtb apr",
            "lowfi",
            "win32",
            "a domains",
            "body",
            "worm",
            "virtool",
            "cybota",
            "showing",
            "palantir",
            "prometheus"
          ],
          "references": [
            "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
            "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
            "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
            "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
            "Nippon Telegraph and Telephone Corporation one governmental now privated",
            "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
            "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
            "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
            "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
            "https://discussions.apple.com/thread/255214328?sortBy=rank",
            "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
            "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
            "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
            "swarm-foundry.com",
            "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
            "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
            "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
            "server-3-164-143-102.nrt20.r.cloudfront.net",
            "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
            "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
            "https://ww41.porn25.com/",
            "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
            "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
            "Other constitutional rights and privileges written in law where severe courses of action is allowed",
            "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
            "Device targeted with l RMS Modules by male in Denver, Co",
            "Attempts to clip target at high rate of speed.Seen again at her residence in October",
            "Target was monitored in store and followed home needed to stop multiple times , change routes.",
            "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
            "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
            "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
            "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
            "Malicious activity seen since a Pulse regarding school outage.",
            "Location search was used to find device users address. It\u2019s with me.",
            "Delete service is being used on this Threat service",
            "Many indicators point to an IP this block is on.",
            "It\u2019s so out of hand,m for 16 people.",
            "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
            "prometheus.netmaker.vonnue.dev",
            "prometheus.dev.aws.finoa.io",
            "Prometheus - Alien God? Morality through the eyes of the immoral",
            "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2879,
            "domain": 1372,
            "URL": 5788,
            "FileHash-SHA256": 1720,
            "CVE": 1,
            "FileHash-MD5": 238,
            "FileHash-SHA1": 241,
            "email": 13
          },
          "indicator_count": 12252,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "76 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6944ce38344ccded23df66f5",
          "name": "Ransom - Amnesty.org - a single link in a Pegasus attack against a civilian.",
          "description": "I don\u2019t have the right words to put this together because it involves so much coercion, fraud, betrayal, manipulation , hacking, multiple business fronts, loud mouth mafia plants, working with someone under false pretenses, redhat security teams in Denver , Colorado, false implications of cyber attacks coming from foreign entities. \n\nTips come from a highly reliable sources. One link in a Pegasus attack .",
          "modified": "2026-01-18T03:05:59.836000",
          "created": "2025-12-19T04:02:00.973000",
          "tags": [
            "intel",
            "ms windows",
            "write c",
            "pe32",
            "pe32 executable",
            "copy c",
            "free",
            "benjamin",
            "write",
            "worm",
            "win32",
            "code",
            "june",
            "delphi",
            "malware",
            "benjamin",
            "tulach",
            "state of colorado",
            "christopher p. \u2018buzz\u2019 ahmann",
            "danica implants",
            "nids_malware_alert",
            "bonu$",
            "network_icmp",
            "network_irc",
            "persistence_autorun",
            "network_http",
            "nids_alert",
            "allocates_rwx",
            "hackers",
            "creates_exe",
            "brian sabey",
            "sour del",
            "packer_entropy",
            "antivm_memory_available",
            "pe_features",
            "get key",
            "crime",
            "organized crime",
            "federal crime",
            "cyber crime",
            "piracy",
            "status",
            "china unknown",
            "name servers",
            "div div",
            "ip address",
            "domain",
            "creation date",
            "record value",
            "meta",
            "title",
            "hong kong",
            "passive dns",
            "gmt content",
            "type",
            "content length",
            "ipv4 add",
            "urls",
            "files",
            "location hong",
            "twitter",
            "youtube",
            "side 3 studios",
            "denver music",
            "infiltration",
            "whistleblower",
            "getkey",
            "cyber warfare",
            "fraud",
            "financial crimes",
            "pegasus",
            "music front",
            "france unknown",
            "present feb",
            "iran unknown",
            "present nov",
            "present jun",
            "present jan",
            "hidden",
            "present jul",
            "date",
            "united",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "llc name",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "pattern match",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "memory dumping",
            "entries",
            "icmp delphi",
            "showing",
            "delete",
            "yara detections",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "dns query",
            "packing t1045",
            "ransom",
            "cve",
            "palantir",
            "remote",
            "graham"
          ],
          "references": [
            "Amnesty.org | remote.amnesty.org",
            "tulach.cc",
            "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
            "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
            "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
            "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
            "Delphi This program must be run under Win32 Compilers",
            "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
            "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
            "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
            "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
            "ipv4bot.whatismyipaddress.com",
            "helloprismatic.com",
            "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
            "Brian Sabey",
            "Christopher P. \u2018Buzz\u2019 Ahmann"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "Ransom:Win32/GandCrab",
              "display_name": "Ransom:Win32/GandCrab",
              "target": "/malware/Ransom:Win32/GandCrab"
            },
            {
              "id": "CVE-2023-2868",
              "display_name": "CVE-2023-2868",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 429,
            "FileHash-SHA1": 341,
            "FileHash-SHA256": 2766,
            "URL": 6976,
            "domain": 1151,
            "CVE": 2,
            "email": 3,
            "hostname": 2913,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 14585,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "91 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net",
        "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
        "Target was monitored in store and followed home needed to stop multiple times , change routes.",
        "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
        "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
        "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
        "tulach.cc",
        "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
        "PE Version Information : TJprojMain.exe",
        "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
        "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
        "Brian Sabey",
        "Attempts to clip target at high rate of speed.Seen again at her residence in October",
        "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
        "22.hio52.r.cloudfront.net",
        "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
        "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
        "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
        "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
        "swarm-foundry.com",
        "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
        "codewiki.google",
        "Alerts: injection_process_search protection_rx",
        "Device targeted with l RMS Modules by male in Denver, Co",
        "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
        "Location search was used to find device users address. It\u2019s with me.",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
        "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2",
        "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
        "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
        "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
        "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
        "Malicious activity seen since a Pulse regarding school outage.",
        "Delphi This program must be run under Win32 Compilers",
        "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
        "www.onyx-ware.com \u2022 endgamesystems.com",
        "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
        "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
        "server-3-164-143-102.nrt20.r.cloudfront.net",
        "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
        "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
        "It\u2019s so out of hand,m for 16 people.",
        "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
        "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
        "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
        "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
        "helloprismatic.com",
        "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
        "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
        "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
        "https://target.tccwest.www.littleswimmers.fr/",
        "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden",
        "Prometheus - Alien God? Morality through the eyes of the immoral",
        "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
        "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
        "Delete service is being used on this Threat service",
        "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
        "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
        "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
        "Pornhub to your phone. Dumping or by request?",
        "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
        "Other constitutional rights and privileges written in law where severe courses of action is allowed",
        "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
        "us-gov-west-1.gov.reveal-global.com",
        "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
        "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
        "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
        "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
        "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
        "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
        "Nippon Telegraph and Telephone Corporation one governmental now privated",
        "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
        "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
        "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
        "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
        "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://discussions.apple.com/thread/255214328?sortBy=rank",
        "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
        "Amnesty.org | remote.amnesty.org",
        "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
        "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
        "Contacted Google services",
        "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
        "campdeadwood2026.com",
        "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
        "www.killer333.club So I\u2019m right.",
        "prometheus.dev.aws.finoa.io",
        "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
        "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
        "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
        "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God.",
        "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
        "https://glare.pali om. \u2022 http://engage.palantirfou?",
        "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
        "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
        "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
        "prometheus.netmaker.vonnue.dev",
        "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
        "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
        "Many indicators point to an IP this block is on.",
        "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
        "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
        "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
        "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
        "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
        "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
        "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
        "ipv4bot.whatismyipaddress.com",
        "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
        "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
        "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
        "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://ww41.porn25.com/",
        "open.spotify.com \u2022",
        "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
        "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
        "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
        "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
        "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
        "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Eyestye",
            "Win.packed.generic-9967832-0",
            "Worm:win32/benjamin",
            "Nufs_unicode",
            "Worm:win32/mofksys.rnd!mtb",
            "Exploit:win32/cve-2017-0147",
            "Win.packed.eyestye-9754938-0",
            "Darkmoon",
            "Win.dropper.poisonivy-9876745-0",
            "Polyransom",
            "Alf:heraklezeval:pua:win32/4shared",
            "Hacktool:win32/cobaltstrike.a",
            "Autorun",
            "Ransom:win32/gandcrab",
            "Cve-2023-2868",
            "Win.trojan.barys-10005825-0",
            "Upatre",
            "Pegasus",
            "Win.malware.unruy-6912804-0",
            "Trojan:win32/eyestye.t",
            "Malware  packed",
            "Trojanspy",
            "Win.malware.incredimail-6804483-0",
            "Win32:hacktoolx-gen\\ [trj]",
            "Cassini",
            "Win.packed.stealerc-10017074-0",
            "Tofsee",
            "#lowfi:win32/autoit",
            "Trojan:win32/zombie.a",
            "Trojanspy:msil/yakbeex.a"
          ],
          "industries": [
            "Technology",
            "Entertainment"
          ],
          "unique_indicators": 51973
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/crbug.com",
    "whois": "http://whois.domaintools.com/crbug.com",
    "domain": "crbug.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "6964c08bf79bcb252eaa9e15",
      "name": "TrojanSpy -  Spotify account under an attack which conceals artists releases / deletes followers",
      "description": "Spotify Attacks: TrojanSpy - Streamer Spotify account under an attack which conceals artists releases / deletes followers. The attack is adversarial. I\u2019m unclear how widespread it is.  . Further research required. OTX auto generated Pegasus. Released work that was once viewable is now concealed, followers deleted.\n#cloudfront #spyware #delete_service #cloudfront_attacks",
      "modified": "2026-02-11T09:03:20.933000",
      "created": "2026-01-12T09:36:11.701000",
      "tags": [
        "google",
        "fastly",
        "googlecl",
        "january",
        "http",
        "domain",
        "akamaias",
        "cloudflar",
        "page url",
        "de summary",
        "april",
        "reverse dns",
        "url https",
        "general full",
        "software",
        "united",
        "resource hash",
        "protocol h3",
        "security quic",
        "protocol h2",
        "security tls",
        "main",
        "present jan",
        "title",
        "gmt max",
        "certificate",
        "moved",
        "lowfi",
        "gmt content",
        "meta",
        "present dec",
        "status",
        "aaaa",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "win32",
        "files",
        "verdict",
        "files ip",
        "address",
        "mtb jan",
        "trojandropper",
        "backdoor",
        "win32upatre jan",
        "origin trial",
        "gmt cache",
        "443 ma2592000",
        "possible",
        "worm",
        "trojan",
        "ip address",
        "record value",
        "dark",
        "found",
        "ipv4 add",
        "error",
        "trojanspy",
        "emails",
        "servers",
        "pegasus",
        "america flag",
        "america asn",
        "tlsv1",
        "read c",
        "show",
        "medium",
        "lstockholm",
        "ospotify ab",
        "odigicert inc",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "dynamicloader",
        "yara rule",
        "ms windows",
        "pe32",
        "named pipe",
        "smartassembly",
        "delphi",
        "malware",
        "united states",
        "pe file",
        "filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "high",
        "write c",
        "tls sni",
        "tls handshake",
        "delete",
        "as15169",
        "stun binding",
        "request",
        "port",
        "win64",
        "themida",
        "guard",
        "risepro",
        "sha256",
        "sha1",
        "pattern match",
        "ascii text",
        "size",
        "mitre att",
        "ck id",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "ck techniques",
        "evasion att",
        "t1480 execution",
        "directui",
        "element",
        "hwndhost",
        "classinfobase",
        "hwndelement",
        "value",
        "explorer",
        "insert",
        "movie",
        "hacktool",
        "showing",
        "entries http",
        "scans show",
        "california",
        "location united",
        "next associated",
        "pulse pulses",
        "name servers",
        "found request",
        "unique",
        "url add",
        "related nids",
        "files location",
        "expiration",
        "flag united",
        "present nov",
        "present sep",
        "href",
        "suricata stream",
        "command decode",
        "starfield",
        "encrypt",
        "iframe",
        "date",
        "title error",
        "hostname",
        "pulse submit",
        "memcommit",
        "checks",
        "windows",
        "capture",
        "cloudfront",
        "colorado",
        "creation date",
        "hostname add",
        "eset",
        "binary file",
        "pdb path",
        "internalname",
        "nod32",
        "amon"
      ],
      "references": [
        "open.spotify.com \u2022",
        "https://open.spotify.com/intl-de/track/5KjB1j0u54VXg6M8SN8hH2",
        "https://open.spotify.com/track/5KjB1j0u54VXg6M8SN8hH2",
        "FileHash-SHA256 cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "events.launchdarkly.com \u2022 clientstream.launchdarkly. \u2022 app.launchdarkly.com",
        "https://target.tccwest.www.littleswimmers.fr/",
        "www.onyx-ware.com \u2022 endgamesystems.com",
        "cloudfront.net \u2022  d127qq8ld0aiq5.cloudfront.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Win.Packed.Stealerc-10017074-0",
          "display_name": "Win.Packed.Stealerc-10017074-0",
          "target": null
        },
        {
          "id": "#Lowfi:Win32/AutoIt",
          "display_name": "#Lowfi:Win32/AutoIt",
          "target": "/malware/#Lowfi:Win32/AutoIt"
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "TrojanSpy:MSIL/Yakbeex.A",
          "display_name": "TrojanSpy:MSIL/Yakbeex.A",
          "target": "/malware/TrojanSpy:MSIL/Yakbeex.A"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32:HacktoolX-gen\\ [Trj]",
          "display_name": "Win32:HacktoolX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "nUFS_unicode",
          "display_name": "nUFS_unicode",
          "target": null
        },
        {
          "id": "HackTool:Win32/CobaltStrike.A",
          "display_name": "HackTool:Win32/CobaltStrike.A",
          "target": "/malware/HackTool:Win32/CobaltStrike.A"
        },
        {
          "id": "Win.Dropper.PoisonIvy-9876745-0",
          "display_name": "Win.Dropper.PoisonIvy-9876745-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1293,
        "URL": 3389,
        "FileHash-MD5": 635,
        "FileHash-SHA1": 531,
        "FileHash-SHA256": 2345,
        "domain": 501,
        "email": 12,
        "SSLCertFingerprint": 16
      },
      "indicator_count": 8722,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69642a749490c0bf404aa8ac",
      "name": "Google Services - Malware Packed Google Branded Services",
      "description": "Contacted Google services  | Service (1 of 3) || GoogleChromeElevationService | Mofksys \u2022 Unruy | Relationship: https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b | \n#affilliated #worm _#exploit #alternate_google #infection #spyware",
      "modified": "2026-02-10T22:01:54.041000",
      "created": "2026-01-11T22:55:48.308000",
      "tags": [
        "write c",
        "write",
        "delete c",
        "ms windows",
        "pe32 executable",
        "globalc",
        "united",
        "worm",
        "malware",
        "defender",
        "united states",
        "google",
        "google account",
        "mtb ids",
        "cloudflare dns",
        "https domain",
        "tls sni",
        "medium priority",
        "yara detections",
        "alerts",
        "google play",
        "google api",
        "google chrome",
        "mofksys",
        "exploit",
        "process32nextw",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "search",
        "precreate read",
        "read c",
        "dock",
        "unknown",
        "suspicious",
        "alt google",
        "execution att",
        "lowfi",
        "mtb jan",
        "trojandropper",
        "passive dns",
        "backdoor",
        "win32upatre jan",
        "origin trial",
        "gmt cache",
        "443 ma2592000",
        "possible",
        "trojan",
        "title",
        "mtb dec",
        "ipv4 add",
        "state",
        "trojan",
        "dropper",
        "phishing",
        "ransom",
        "of colorado"
      ],
      "references": [
        "accounts.google.com \u2022 apis.google.com clients2.google.com \u2022 clients2.googleusercontent.com",
        "142.251.9.95 \u2022 https://clients2.google.com/cr/report \u2022 accounts.google.com \u2022",
        "ogads-pa.clients6.google.com \u2022  optimizationguide-pa.googleapis.com \u2022 play.google.com",
        "update.googleapis.com \u2022 www.google.com \u2022 clientservices.googleapis.com",
        "Worm:Win32/Mofksys.RND!MTB |  Yara Detections: SUSP_Imphash_Mar23_2",
        "IDS Detection: Observed Cloudflare DNS over HTTPS \u2022 Domain (cloudflare-dns .com in TLS SNI)",
        "Alerts: suspicious_iocontrol_codes infostealer_cookies persistence_autorun antisandbox_sleep",
        "Alerts: persistence_autorun_tasks polymorphic procmem_yara static_pe_anomaly antiav_detectfile",
        "Alerts: antiav_detectreg antivm_bochs_keys antivm_generic_disk infostealer_mail injection_write",
        "Alerts: suspicious_command_tools anomalous_deletefile mouse_movement_detect",
        "Alerts: dynamic_function_loading resumethread_remote_process stealth_hiddenreg",
        "Contacted Google services",
        "SERVICE NAME: SSDPSRV \u2022 Delete upnphost\tDelete \u2022 GoogleChromeElevationService",
        "https://otx.alienvault.com/indicator/file/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/cb40cd426d6e55c2b175b5be3327bfdf8d5a0074bf48b823121bd4720ed2ad95",
        "codewiki.google",
        "Win.Malware.Unruy-6912804-0 IDS Detections: Win32/Unruy.C Activity 403 Forbidden",
        "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction",
        "Alerts: network_http antisandbox_sleep creates_exe dropper stealth_window",
        "Alerts: injection_process_search protection_rx",
        "IP\u2019s Contacted: 142.250.74.68  142.250.74.99  18.66.121.69  185.53.179.170  2.22.41.134  204.79.197.200",
        "IP\u2019s Contacted: 208.91.196.46  209.197.3.8  216.239.32.29  35.186.238.101",
        "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com www.google.com",
        "Domains Contacted: ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com",
        "Domains Contacted: d38psrni17bvxu.cloudfront.net www2.megawebfind.com  www6.megawebfind.com",
        "PE Version Information : TJprojMain.exe",
        "Found in : https://otx.alienvault.com/pulse/69640c0afc9805a6fa2da07b",
        "IDS Detections Win32/Unruy.C Activity \u2022 403 Forbidden"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Unruy-6912804-0",
          "display_name": "Win.Malware.Unruy-6912804-0",
          "target": null
        },
        {
          "id": "Win.Packed.Eyestye-9754938-0",
          "display_name": "Win.Packed.Eyestye-9754938-0",
          "target": null
        },
        {
          "id": "Eyestye",
          "display_name": "Eyestye",
          "target": null
        },
        {
          "id": "AutoRun",
          "display_name": "AutoRun",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Trojan:Win32/EyeStye.T",
          "display_name": "Trojan:Win32/EyeStye.T",
          "target": "/malware/Trojan:Win32/EyeStye.T"
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/4Shared",
          "display_name": "ALF:HeraklezEval:PUA:Win32/4Shared",
          "target": null
        },
        {
          "id": "Cassini",
          "display_name": "Cassini",
          "target": null
        },
        {
          "id": "DarkMoon",
          "display_name": "DarkMoon",
          "target": null
        },
        {
          "id": "PolyRansom",
          "display_name": "PolyRansom",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Malware  Packed",
          "display_name": "Malware  Packed",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1078.003",
          "name": "Local Accounts",
          "display_name": "T1078.003 - Local Accounts"
        },
        {
          "id": "T1078.001",
          "name": "Default Accounts",
          "display_name": "T1078.001 - Default Accounts"
        },
        {
          "id": "T1087.003",
          "name": "Email Account",
          "display_name": "T1087.003 - Email Account"
        },
        {
          "id": "T1078.002",
          "name": "Domain Accounts",
          "display_name": "T1078.002 - Domain Accounts"
        },
        {
          "id": "T1090.004",
          "name": "Domain Fronting",
          "display_name": "T1090.004 - Domain Fronting"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 198,
        "FileHash-SHA1": 165,
        "FileHash-SHA256": 867,
        "URL": 1461,
        "hostname": 429,
        "domain": 221,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 3342,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69640c0afc9805a6fa2da07b",
      "name": "MUSO.AI Malware \u2018Incredimail\u2019 Palantir in use[OTX auto populated title -Tsara Brashears]",
      "description": "MUSO.Ai , Is have to do more research. Some searches on reports MUSO as an opt in resource for artist to view, sort, and manage legacy credits, MUSO also collects royalties. Research and investigation confirms no one on music team is associated with  or l thinks they may have heard of MUSO. Is MUSO. AI Palantir customer or service ,spy app services by the folks at Palantir. . [otx auto pop praise:  Tsara Brashears is the most popular songwriter in the world, but can you use the app to find out more about the artist and the musicians behind the tracks?] cute. \n#dembiak #palantir #muso #ai",
      "modified": "2026-02-10T20:03:47.214000",
      "created": "2026-01-11T20:46:02.176000",
      "tags": [
        "lark kdence",
        "zack dare",
        "zafira",
        "jon bonus",
        "andy flebbe",
        "div div",
        "present nov",
        "a domains",
        "united",
        "script urls",
        "div a",
        "script domains",
        "discover",
        "moved",
        "insert",
        "x0 tw",
        "urls",
        "cloudfront x",
        "title error",
        "url analysis",
        "reverse dns",
        "servers",
        "name servers",
        "united states",
        "all ipv4",
        "aaaa",
        "ip address",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "evasion att",
        "t1480 execution",
        "ascii text",
        "mitre att",
        "pattern match",
        "null",
        "error",
        "click",
        "hybrid",
        "general",
        "local",
        "path",
        "starfield",
        "strings",
        "refresh",
        "tools",
        "meta",
        "onload",
        "span",
        "data upload",
        "extraction",
        "type",
        "extra",
        "referen https",
        "include review",
        "exclude sugges",
        "stop",
        "aivoes typ",
        "passive dns",
        "date",
        "united states",
        "status",
        "domain add",
        "files",
        "hostname",
        "read c",
        "medium",
        "search",
        "show",
        "memcommit",
        "high",
        "checks",
        "windows",
        "delete",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "next",
        "amazon02",
        "as autonomous",
        "system",
        "asn16509",
        "domain",
        "current dns",
        "a record",
        "as16509",
        "december",
        "ip information",
        "ipasns ip",
        "google",
        "fastly",
        "googlecl",
        "akamaias",
        "cloudflar",
        "domain tree",
        "links ip",
        "address as",
        "cisco",
        "umbrella rank",
        "general full",
        "url https",
        "software",
        "resource hash",
        "protocol h2",
        "security tls",
        "hostname add",
        "challengescript",
        "captchascript",
        "name",
        "value",
        "source level",
        "url text",
        "automatic",
        "webgl",
        "please",
        "extr data",
        "data",
        "size",
        "title",
        "yara detections",
        "filehash",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "entries",
        "rgba",
        "unicode",
        "asnone",
        "malware",
        "port",
        "destination",
        "tlsv1",
        "tls handshake",
        "failure",
        "roboto",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "expiration",
        "url http",
        "no expiration",
        "present jan",
        "unknown ns",
        "certificate",
        "body",
        "present oct",
        "present may",
        "present dec",
        "present sep",
        "present feb",
        "showing",
        "next associated",
        "all se",
        "pulse pulses",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "debiak",
        "tsara brashears",
        "ai",
        "palantir",
        "muso ai",
        "sort",
        "artists",
        "royalties",
        "music",
        "songwriter",
        "collect",
        "view",
        "malicious app",
        "false claims"
      ],
      "references": [
        "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
        "22.hio52.r.cloudfront.net",
        "us-gov-west-1.gov.reveal-global.com",
        "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
        "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
        "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
        "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
        "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
        "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
        "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
        "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
        "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
        "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
        "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
        "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
        "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
        "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
        "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
        "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
        "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
        "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
        "https://glare.pali om. \u2022 http://engage.palantirfou?",
        "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
        "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
        "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
        "campdeadwood2026.com",
        "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
        "Pornhub to your phone. Dumping or by request?",
        "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
        "www.killer333.club So I\u2019m right."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Incredimail-6804483-0",
          "display_name": "Win.Malware.Incredimail-6804483-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "TA0028",
          "name": "Persistence",
          "display_name": "TA0028 - Persistence"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10686,
        "hostname": 2427,
        "domain": 1094,
        "FileHash-MD5": 175,
        "FileHash-SHA1": 65,
        "FileHash-SHA256": 1118,
        "email": 4,
        "SSLCertFingerprint": 14
      },
      "indicator_count": 15583,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 144,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6958372ef9da31513d96bebb",
      "name": "Connected-IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation",
      "description": "Retaliation? IOS remotely connected to 180.4.1.2 \u2022  ocn.ad.jp -NTT Communications Corporation for malicious control | found in the analytics of a highly target device: I\u2019ve included related pulses from 2 other threat responders and an Apple discussion post. Surprisingly, most of the IoC\u2019s pulsed came from one page of analytics. | \u2022 \"avconferenced\", \"procPath\" : \"\\/usr\\/libexec\\/avconferenced |  180.4.1.2 | a version of\npegasus found. | https://prometheus-pushgateway-internal.preview.tp-staging.com/\t\nhostname: prometheus.netmaker.vonnue.dev\t\nhostname: prometheus.dev.aws.finoa.io |\nSince Prometheus pulse . I realize now every Prometheus pulse illicits outrageous behavior.. Is this a secret society? Try to be more secretive. Owl heads in lawn. This behavior illicits investigation for a fix. Please STOP. I\u2019m done looking at Prometheus. Please stop leaving artifacts.",
      "modified": "2026-02-01T20:00:08.812000",
      "created": "2026-01-02T21:22:54.247000",
      "tags": [
        "syscall",
        "nsrunloop",
        "objcclass",
        "region type",
        "start",
        "vsize",
        "prtmax shrmod",
        "region detailn",
        "unused space",
        "at startn",
        "guard",
        "urls",
        "url analysis",
        "verdict",
        "domain",
        "address",
        "location japan",
        "hikone",
        "japan asn",
        "as4713 ntt",
        "related tags",
        "none external",
        "aaaa",
        "united",
        "passive dns",
        "ip address",
        "japan",
        "present dec",
        "domain add",
        "files",
        "japan unknown",
        "present jul",
        "present oct",
        "present sep",
        "present aug",
        "present jun",
        "japan showing",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "reverse dns",
        "present nov",
        "present",
        "present may",
        "present mar",
        "present apr",
        "data upload",
        "extraction",
        "failed",
        "files ip",
        "moved",
        "gmt content",
        "ipv4 add",
        "location united",
        "title",
        "ipv4",
        "dns resolutions",
        "hostname add",
        "asn as4713",
        "all ipv4",
        "google",
        "ocn ntt",
        "googlecl",
        "http",
        "amazon02",
        "akamaias",
        "page url",
        "yahoojp",
        "december",
        "jp summary",
        "february",
        "asn15169",
        "tokyo",
        "kansas city",
        "asn396982",
        "asn30286",
        "asn16509",
        "cisco",
        "umbrella rank",
        "cisco umbrella",
        "rank",
        "kitashinagawa",
        "sureserver ev",
        "ca g3",
        "domains",
        "hashes",
        "microsoft",
        "docomo business",
        "ml14325",
        "as autonomous",
        "asn8075",
        "ip information",
        "ipasns ip",
        "detail domain",
        "domain tree",
        "links domain",
        "requested",
        "value",
        "automatic",
        "webgl",
        "please",
        "mr value",
        "muid value",
        "mjl function",
        "dcmlinker",
        "paq string",
        "kb script",
        "b image",
        "b script",
        "frame a344",
        "redirect chain",
        "kb document",
        "frame",
        "b xhr",
        "kb image",
        "fetch collect",
        "request chain",
        "redirected",
        "http redirect",
        "name servers",
        "redacted for",
        "servers",
        "unknown aaaa",
        "search",
        "for privacy",
        "domeny serwery",
        "verdana tahoma",
        "arial",
        "gmt contenttype",
        "meta",
        "small",
        "results jan",
        "present jan",
        "status",
        "record value",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "process details",
        "flag",
        "japan japan",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "null",
        "refresh",
        "span",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "defense evasion",
        "monitored target",
        "pulse submit",
        "wikipedia",
        "imap",
        "smtp",
        "ocn open",
        "discussion",
        "stub",
        "jprs database",
        "ocnnttocn",
        "maintenance",
        "outages notice",
        "lock status",
        "state",
        "connected",
        "organization",
        "type",
        "name",
        "server",
        "name server",
        "connected date",
        "algorithm",
        "key identifier",
        "data",
        "v3 serial",
        "number",
        "cjp ocybertrust",
        "ev ca",
        "g3 validity",
        "ku ontt",
        "docomo",
        "record type",
        "ttl value",
        "thumbprint",
        "emails",
        "date",
        "trojan",
        "pegasus",
        "title error",
        "hostname",
        "pulse pulses",
        "entries",
        "mtb apr",
        "lowfi",
        "win32",
        "a domains",
        "body",
        "worm",
        "virtool",
        "cybota",
        "showing",
        "palantir",
        "prometheus"
      ],
      "references": [
        "ocn.ne.jp \u2022 180.4.1.2 \u2022 gateway1.ocn.ad.jp",
        "login.ocn.ne.jp 122.28.88.229 \u2022 outpost@alpha.ocn.ne.jp",
        "ocn.ad.jp - Registrant Org: NTT Communications Corporation",
        "Page Title:  \u30ed\u30b0\u30a4\u30f3 | OCN\u30e1\u30fc\u30eb | OCN",
        "Nippon Telegraph and Telephone Corporation one governmental now privated",
        "computersandsoftware \u2022 portal sites \u2022 search engines and portals",
        "(Found on targeted iOS device) mr-file-connector-193.api.auxosandbox.com",
        "Guardicore by CyberHunterAutoFeed \u2022 https://otx.alienvault.com/pulse/655d47fb128a006a7d06afa2",
        "Japanese Phishing Site by pingineer \u2022 https://otx.alienvault.com/pulse/61d3b380c44ee030dd092a80",
        "https://discussions.apple.com/thread/255214328?sortBy=rank",
        "https://urlscan.io/result/98a3575f-9b94-4ef3-ae84-8e585f882151/#indicators",
        "Interesting (found in pulse) https://www.studentfinancewales.co.uk/contact",
        "kalpak.palantirfedstart.com \u2022 lsauth-vault.palantirfedstart.com \u2022 sandboxes-ranunculus.palantirfedstart.com",
        "swarm-foundry.com",
        "When you see silly related domains it\u2019s probably Palantir kids: fuckingshitshow.org  Domain kinkfuck.com \u2022 nobodycares.art",
        "heavy-r.com \u2022 fartyphant.com \u2022 uglyphant.com \u2022 maciej.sztajerwald@gmail.com",
        "https://hybrid-analysis.com/sample/6af451b8e64c3f8abafc84e776fe6c257888e0875b2d22c75b23b13960f46567/69580966ed3458719b0f0ed5",
        "server-3-164-143-102.nrt20.r.cloudfront.net",
        "ec2-3-115-135-167.ap-northeast-1.compute.amazonaws.com",
        "ec2-57-181-50-85.ap-northeast-1.compute.amazonaws.com",
        "https://ww41.porn25.com/",
        "https://otx.alienvault.com/indicator/url/https://t.notif-laposte.info/TrackActions/NGJlYjE5NjZhZDlkODU0NzE3Yzg3Zjk3ODJkMmMxZWRjMTlkODAxZmEyMjY5YjU5YjY1MGU1OWFmZTdhMDlhMmM2YjY3ZTBiYzYwNWUwODdmMzkzZDc5ZjAwNDViODM1OGU5MTA0M2IzMjRmOGQwNTgxZGZjMmUyODFlZDI3MDYzZTQzNzg4NGVkMWJmMDgwMzM0NTA5OGRmY2M0NTVjZA",
        "If something curious is found on privatelybowen property we have a constitutional  right to examine it.",
        "Other constitutional rights and privileges written in law where severe courses of action is allowed",
        "iOS device, Update 26.2 , heavily monitored target of death threats, attempts & unfortunate outcome..",
        "Device targeted with l RMS Modules by male in Denver, Co",
        "Attempts to clip target at high rate of speed.Seen again at her residence in October",
        "Target was monitored in store and followed home needed to stop multiple times , change routes.",
        "Multiple attackers. Don\u2019t believe me, look at the pulses.  Caged in by male with deauther watch.",
        "Most of the people doing this are  50\u2019s plus, plus. There are youngsters but many grey haired , grandparents",
        "The older the smarter the way better. These people are brilliant , ruthless and dangerous",
        "Phone recently accessed, a tiny unauthorized speaker was on. Threat actors connected.",
        "Malicious activity seen since a Pulse regarding school outage.",
        "Location search was used to find device users address. It\u2019s with me.",
        "Delete service is being used on this Threat service",
        "Many indicators point to an IP this block is on.",
        "It\u2019s so out of hand,m for 16 people.",
        "https://prometheus-pushgateway-internal.preview.tp-staging.com/",
        "prometheus.netmaker.vonnue.dev",
        "prometheus.dev.aws.finoa.io",
        "Prometheus - Alien God? Morality through the eyes of the immoral",
        "Prometheus- allegedly related to Peter Thiel , Elon Musk and tech bro Joes who are playing God."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2879,
        "domain": 1372,
        "URL": 5788,
        "FileHash-SHA256": 1720,
        "CVE": 1,
        "FileHash-MD5": 238,
        "FileHash-SHA1": 241,
        "email": 13
      },
      "indicator_count": 12252,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "76 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6944ce38344ccded23df66f5",
      "name": "Ransom - Amnesty.org - a single link in a Pegasus attack against a civilian.",
      "description": "I don\u2019t have the right words to put this together because it involves so much coercion, fraud, betrayal, manipulation , hacking, multiple business fronts, loud mouth mafia plants, working with someone under false pretenses, redhat security teams in Denver , Colorado, false implications of cyber attacks coming from foreign entities. \n\nTips come from a highly reliable sources. One link in a Pegasus attack .",
      "modified": "2026-01-18T03:05:59.836000",
      "created": "2025-12-19T04:02:00.973000",
      "tags": [
        "intel",
        "ms windows",
        "write c",
        "pe32",
        "pe32 executable",
        "copy c",
        "free",
        "benjamin",
        "write",
        "worm",
        "win32",
        "code",
        "june",
        "delphi",
        "malware",
        "benjamin",
        "tulach",
        "state of colorado",
        "christopher p. \u2018buzz\u2019 ahmann",
        "danica implants",
        "nids_malware_alert",
        "bonu$",
        "network_icmp",
        "network_irc",
        "persistence_autorun",
        "network_http",
        "nids_alert",
        "allocates_rwx",
        "hackers",
        "creates_exe",
        "brian sabey",
        "sour del",
        "packer_entropy",
        "antivm_memory_available",
        "pe_features",
        "get key",
        "crime",
        "organized crime",
        "federal crime",
        "cyber crime",
        "piracy",
        "status",
        "china unknown",
        "name servers",
        "div div",
        "ip address",
        "domain",
        "creation date",
        "record value",
        "meta",
        "title",
        "hong kong",
        "passive dns",
        "gmt content",
        "type",
        "content length",
        "ipv4 add",
        "urls",
        "files",
        "location hong",
        "twitter",
        "youtube",
        "side 3 studios",
        "denver music",
        "infiltration",
        "whistleblower",
        "getkey",
        "cyber warfare",
        "fraud",
        "financial crimes",
        "pegasus",
        "music front",
        "france unknown",
        "present feb",
        "iran unknown",
        "present nov",
        "present jun",
        "present jan",
        "hidden",
        "present jul",
        "date",
        "united",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "llc name",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "found",
        "pattern match",
        "mitre att",
        "show technique",
        "ck matrix",
        "ascii text",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "memory dumping",
        "entries",
        "icmp delphi",
        "showing",
        "delete",
        "yara detections",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "dns query",
        "packing t1045",
        "ransom",
        "cve",
        "palantir",
        "remote",
        "graham"
      ],
      "references": [
        "Amnesty.org | remote.amnesty.org",
        "tulach.cc",
        "Worm:Win32/Benjamin IDS Detections: Win32.Worm.Benjamin.A CnC Checkin ICMP",
        "Alerts : nids_malware_alert network_icmp network_irc persistence_autorun network_http",
        "Alerts :  nids_alert allocates_rwx creates_exe packer_entropy antivm_memory_available",
        "Delphi Likely Precursor to Scan PING Delphi-Piette Windows Yara Detections Delphi",
        "Delphi This program must be run under Win32 Compilers",
        "More IP\u2019s Contacted  74.6.143.26 Domains Contacted benjamin.xww.de",
        "http://www.yixun.com/getkey {\"privateKey\": \"JMVRar4COFWb3eKZ\"}",
        "Server: JFE https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.yixun.com/getkey",
        "http://www.shopsleuth.com/goal-academy/the-citadel/colorado-springs-co",
        "ipv4bot.whatismyipaddress.com",
        "helloprismatic.com",
        "https://palantir-staging.staging.candidate.app.paulsjob.ai/",
        "Brian Sabey",
        "Christopher P. \u2018Buzz\u2019 Ahmann"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "Ransom:Win32/GandCrab",
          "display_name": "Ransom:Win32/GandCrab",
          "target": "/malware/Ransom:Win32/GandCrab"
        },
        {
          "id": "CVE-2023-2868",
          "display_name": "CVE-2023-2868",
          "target": null
        },
        {
          "id": "Exploit:Win32/CVE-2017-0147",
          "display_name": "Exploit:Win32/CVE-2017-0147",
          "target": "/malware/Exploit:Win32/CVE-2017-0147"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 429,
        "FileHash-SHA1": 341,
        "FileHash-SHA256": 2766,
        "URL": 6976,
        "domain": 1151,
        "CVE": 2,
        "email": 3,
        "hostname": 2913,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 14585,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "91 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://crbug.com/1354474",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://crbug.com/1354474",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622240.094058
}