{
  "type": "URL",
  "indicator": "https://crowdcomms.com/container",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://crowdcomms.com/container",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4162407586,
      "indicator": "https://crowdcomms.com/container",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "69b2b7cb05b2098c1d2bf20f",
          "name": "federal goverment clone cellbrite credit q vashti",
          "description": "",
          "modified": "2026-03-12T12:55:39.046000",
          "created": "2026-03-12T12:55:39.046000",
          "tags": [
            "url https",
            "url http",
            "germany",
            "united",
            "ukraine",
            "japan",
            "extraction",
            "data upload",
            "urls",
            "url analysis",
            "enter sc",
            "extr",
            "iocs",
            "active",
            "france unknown",
            "present jan",
            "servers",
            "homair sweet",
            "grabber",
            "encrypt",
            "ipv4",
            "role title",
            "divx",
            "pitfall",
            "internet",
            "ip role",
            "america asn",
            "extraction data",
            "leveibielabs",
            "all se",
            "enter source",
            "url or",
            "texirag",
            "drop",
            "present nov",
            "united states",
            "america",
            "levdibidelabs",
            "failed",
            "idron anv",
            "include manualv",
            "review data",
            "iterng",
            "name servers",
            "passive dns",
            "incapsula",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "script head",
            "request",
            "cookie",
            "indicator",
            "msie",
            "chrome",
            "backdoor",
            "gmt content",
            "ipv4 add",
            "twitter",
            "title",
            "process32nextw",
            "ms windows",
            "intel",
            "pe32",
            "regopenkeyexa",
            "read c",
            "medium",
            "class",
            "write",
            "template",
            "present oct",
            "present jul",
            "aaaa",
            "present sep",
            "present aug",
            "url add",
            "http",
            "hostname",
            "related tags",
            "kx81xdbx0f",
            "x86xd3",
            "xa7xe28x06",
            "x82xd4",
            "delete c",
            "regsetvalueexa",
            "regbinary",
            "xa1xf1",
            "xe8xc2x14",
            "malware",
            "stream",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "push",
            "present dec",
            "italy",
            "present jun",
            "embeddedwb",
            "whitelisted",
            "windows nt",
            "dns traffic",
            "russia",
            "cname",
            "accept",
            "destination",
            "port",
            "et smtp",
            "message",
            "et trojan",
            "components",
            "suspicious",
            "download",
            "hostile",
            "next",
            "logic",
            "gather victim",
            "et info",
            "etpro trojan",
            "trojan",
            "report spam",
            "interesting",
            "created",
            "pegasus",
            "manipulation",
            "service",
            "capture",
            "et",
            "etpro",
            "host",
            "attack",
            "mtb description",
            "windows",
            "shellexecuteexw",
            "writeconsolew",
            "registry",
            "t1031",
            "modify existing",
            "dock",
            "type indicator",
            "added active",
            "related pulses",
            "arcflex",
            "filehashsha1",
            "types of",
            "learn more",
            "filehashsha256",
            "cellebrite",
            "white label",
            "search",
            "sha1",
            "france",
            "cmanual jan",
            "expiration date",
            "domain add",
            "pulse submit",
            "files",
            "ip address",
            "gmt cache",
            "sameorigin",
            "reverse dns",
            "unknown ns",
            "admin org",
            "zipcode",
            "gmt server",
            "pulse pulses",
            "entries",
            "hostname add",
            "verdict",
            "germany unknown",
            "status",
            "domain",
            "xpirat",
            "netherlands",
            "netherlands asn",
            "as35280 acorus",
            "dns resolutions",
            "error",
            "files ip",
            "copy",
            "telnet login",
            "suspicious path",
            "busybox",
            "login attempt",
            "gpl telnet",
            "high",
            "tcp syn",
            "telnet root",
            "path",
            "mirai",
            "emails",
            "domain name",
            "jlu11q",
            "tqbplo",
            "hours ago",
            "found",
            "yahoo",
            "gmail",
            "yandex",
            "https://cellebrite.com/en/federal-government/",
            "monitoring",
            "monitored target",
            "dangerous",
            "spyware",
            "80211",
            "colorado",
            "x amz",
            "government",
            "mirai login attempt",
            "emotet",
            "c2",
            ".ru",
            ".com",
            "denver",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "dead connect",
            "hostile",
            "adversarial",
            "abuse",
            "criminal intent",
            "block messages",
            "botnet"
          ],
          "references": [
            "fastwebnet.it | Cellebrite White Label Spyware Service",
            "putrhnwl.exe",
            "Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
            "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
            "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
            "IP\u2019s Contacted : 54.230.129.165",
            "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
            "Domains Contacted: pitfall.divx.com www.google.com",
            "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Yara: Detections Tofsee",
            "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
            "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
            "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
            "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
            "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
            "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
            "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
            "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
            "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
            "ET TROJAN Suspicious double Server Header",
            "ET DNS DNS Query to a .tk domain - Likey",
            "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
            "Needs to be sorted. Actively being exploited on US",
            "162.159.134.42 \u2022 https://cellebrite.com/",
            "https://cellebrite.com/en/federal-government/",
            "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
            "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
            "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
            "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
            "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
            "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Germany",
            "Ireland",
            "Switzerland",
            "Poland",
            "Belgium",
            "Netherlands",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "ETPRO",
              "display_name": "ETPRO",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.PC!MTB",
              "display_name": "Trojan:Win32/Emotet.PC!MTB",
              "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aptdrop.RU",
              "display_name": "Trojan:Win32/Aptdrop.RU",
              "target": "/malware/Trojan:Win32/Aptdrop.RU"
            },
            {
              "id": "Ransomware/Win.Stop.R4529",
              "display_name": "Ransomware/Win.Stop.R4529",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32/BackdoorX",
              "display_name": "Win32/BackdoorX",
              "target": null
            },
            {
              "id": "Win.Trojan.Dialog-9873788-0",
              "display_name": "Win.Trojan.Dialog-9873788-0",
              "target": null
            },
            {
              "id": "Tsunami-6981155-0",
              "display_name": "Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1195",
              "name": "Supply Chain Compromise",
              "display_name": "T1195 - Supply Chain Compromise"
            },
            {
              "id": "T1196",
              "name": "Control Panel Items",
              "display_name": "T1196 - Control Panel Items"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1556",
              "name": "Modify Authentication Process",
              "display_name": "T1556 - Modify Authentication Process"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1581",
              "name": "Geofencing",
              "display_name": "T1581 - Geofencing"
            },
            {
              "id": "T1582",
              "name": "SMS Control",
              "display_name": "T1582 - SMS Control"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1587",
              "name": "Develop Capabilities",
              "display_name": "T1587 - Develop Capabilities"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [
            "Journalists",
            "Government",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": "696f7d467763ed4d4e74d133",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4994,
            "domain": 2519,
            "hostname": 3281,
            "FileHash-SHA256": 4467,
            "FileHash-MD5": 1118,
            "FileHash-SHA1": 1056,
            "email": 12,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 17448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "38 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696f7d467763ed4d4e74d133",
          "name": "Federal Government-Cellebrite Attack found actively targeting iOS and other devices | Mirai login attempts | TelNet Login",
          "description": "https://cellebrite.com/en/federal-government/ | Found on a crime victims devices. Targets abused by spyware in an unethical manner by andvesarial \u2018governmental\u2019 possibly \u2018contracted\u2019 entities. Waged against targets such as victims of crime , journalists , researchers , students. Target Users: Serves public safety, enterprise, and government sectors, aiding first responders, investigators, prosecutors, and analysts. How it's Used Law enforcement uses it to unlock devices and retrieve evidence like messages, location history, and app data for criminal investigations. It helps uncover critical information from digital devices, even recovering data that users thought was permanently deleted. Controversy & Privacy Concerns While marketed as a tool for lawful investigations, its powerful data extraction capabilities raise significant privacy concerns and ethical debates.",
          "modified": "2026-02-19T12:05:47.166000",
          "created": "2026-01-20T13:04:06.622000",
          "tags": [
            "url https",
            "url http",
            "germany",
            "united",
            "ukraine",
            "japan",
            "extraction",
            "data upload",
            "urls",
            "url analysis",
            "enter sc",
            "extr",
            "iocs",
            "active",
            "france unknown",
            "present jan",
            "servers",
            "homair sweet",
            "grabber",
            "encrypt",
            "ipv4",
            "role title",
            "divx",
            "pitfall",
            "internet",
            "ip role",
            "america asn",
            "extraction data",
            "leveibielabs",
            "all se",
            "enter source",
            "url or",
            "texirag",
            "drop",
            "present nov",
            "united states",
            "america",
            "levdibidelabs",
            "failed",
            "idron anv",
            "include manualv",
            "review data",
            "iterng",
            "name servers",
            "passive dns",
            "incapsula",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "script head",
            "request",
            "cookie",
            "indicator",
            "msie",
            "chrome",
            "backdoor",
            "gmt content",
            "ipv4 add",
            "twitter",
            "title",
            "process32nextw",
            "ms windows",
            "intel",
            "pe32",
            "regopenkeyexa",
            "read c",
            "medium",
            "class",
            "write",
            "template",
            "present oct",
            "present jul",
            "aaaa",
            "present sep",
            "present aug",
            "url add",
            "http",
            "hostname",
            "related tags",
            "kx81xdbx0f",
            "x86xd3",
            "xa7xe28x06",
            "x82xd4",
            "delete c",
            "regsetvalueexa",
            "regbinary",
            "xa1xf1",
            "xe8xc2x14",
            "malware",
            "stream",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "push",
            "present dec",
            "italy",
            "present jun",
            "embeddedwb",
            "whitelisted",
            "windows nt",
            "dns traffic",
            "russia",
            "cname",
            "accept",
            "destination",
            "port",
            "et smtp",
            "message",
            "et trojan",
            "components",
            "suspicious",
            "download",
            "hostile",
            "next",
            "logic",
            "gather victim",
            "et info",
            "etpro trojan",
            "trojan",
            "report spam",
            "interesting",
            "created",
            "pegasus",
            "manipulation",
            "service",
            "capture",
            "et",
            "etpro",
            "host",
            "attack",
            "mtb description",
            "windows",
            "shellexecuteexw",
            "writeconsolew",
            "registry",
            "t1031",
            "modify existing",
            "dock",
            "type indicator",
            "added active",
            "related pulses",
            "arcflex",
            "filehashsha1",
            "types of",
            "learn more",
            "filehashsha256",
            "cellebrite",
            "white label",
            "search",
            "sha1",
            "france",
            "cmanual jan",
            "expiration date",
            "domain add",
            "pulse submit",
            "files",
            "ip address",
            "gmt cache",
            "sameorigin",
            "reverse dns",
            "unknown ns",
            "admin org",
            "zipcode",
            "gmt server",
            "pulse pulses",
            "entries",
            "hostname add",
            "verdict",
            "germany unknown",
            "status",
            "domain",
            "xpirat",
            "netherlands",
            "netherlands asn",
            "as35280 acorus",
            "dns resolutions",
            "error",
            "files ip",
            "copy",
            "telnet login",
            "suspicious path",
            "busybox",
            "login attempt",
            "gpl telnet",
            "high",
            "tcp syn",
            "telnet root",
            "path",
            "mirai",
            "emails",
            "domain name",
            "jlu11q",
            "tqbplo",
            "hours ago",
            "found",
            "yahoo",
            "gmail",
            "yandex",
            "https://cellebrite.com/en/federal-government/",
            "monitoring",
            "monitored target",
            "dangerous",
            "spyware",
            "80211",
            "colorado",
            "x amz",
            "government",
            "mirai login attempt",
            "emotet",
            "c2",
            ".ru",
            ".com",
            "denver",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "dead connect",
            "hostile",
            "adversarial",
            "abuse",
            "criminal intent",
            "block messages",
            "botnet"
          ],
          "references": [
            "fastwebnet.it | Cellebrite White Label Spyware Service",
            "putrhnwl.exe",
            "Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
            "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
            "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
            "IP\u2019s Contacted : 54.230.129.165",
            "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
            "Domains Contacted: pitfall.divx.com www.google.com",
            "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Yara: Detections Tofsee",
            "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
            "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
            "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
            "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
            "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
            "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
            "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
            "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
            "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
            "ET TROJAN Suspicious double Server Header",
            "ET DNS DNS Query to a .tk domain - Likey",
            "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
            "Needs to be sorted. Actively being exploited on US",
            "162.159.134.42 \u2022 https://cellebrite.com/",
            "https://cellebrite.com/en/federal-government/",
            "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
            "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
            "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
            "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
            "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
            "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Germany",
            "Ireland",
            "Switzerland",
            "Poland",
            "Belgium",
            "Netherlands",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "ETPRO",
              "display_name": "ETPRO",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.PC!MTB",
              "display_name": "Trojan:Win32/Emotet.PC!MTB",
              "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aptdrop.RU",
              "display_name": "Trojan:Win32/Aptdrop.RU",
              "target": "/malware/Trojan:Win32/Aptdrop.RU"
            },
            {
              "id": "Ransomware/Win.Stop.R4529",
              "display_name": "Ransomware/Win.Stop.R4529",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32/BackdoorX",
              "display_name": "Win32/BackdoorX",
              "target": null
            },
            {
              "id": "Win.Trojan.Dialog-9873788-0",
              "display_name": "Win.Trojan.Dialog-9873788-0",
              "target": null
            },
            {
              "id": "Tsunami-6981155-0",
              "display_name": "Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1195",
              "name": "Supply Chain Compromise",
              "display_name": "T1195 - Supply Chain Compromise"
            },
            {
              "id": "T1196",
              "name": "Control Panel Items",
              "display_name": "T1196 - Control Panel Items"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1556",
              "name": "Modify Authentication Process",
              "display_name": "T1556 - Modify Authentication Process"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1581",
              "name": "Geofencing",
              "display_name": "T1581 - Geofencing"
            },
            {
              "id": "T1582",
              "name": "SMS Control",
              "display_name": "T1582 - SMS Control"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1587",
              "name": "Develop Capabilities",
              "display_name": "T1587 - Develop Capabilities"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [
            "Journalists",
            "Government",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4994,
            "domain": 2519,
            "hostname": 3281,
            "FileHash-SHA256": 4467,
            "FileHash-MD5": 1118,
            "FileHash-SHA1": 1056,
            "email": 12,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 17448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "59 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f3ef3b05672ba47b903e3",
          "name": "Create Amazing Password Forms - Project Cicada",
          "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
          "modified": "2026-01-13T22:02:50.260000",
          "created": "2025-12-14T22:49:23.114000",
          "tags": [
            "cicada",
            "project cicada",
            "united states",
            "quasi government",
            "asnone country",
            "united",
            "moved",
            "agent",
            "meta",
            "title error",
            "reverse dns",
            "servers",
            "urls",
            "url analysis",
            "aaaa",
            "present dec",
            "ip address",
            "america flag",
            "unknown",
            "Christopher P. \u2018Buzz\u2019 Ahmann",
            "brian sabey.",
            "State of Colorado",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results mar",
            "avast avg",
            "qualified immunity",
            "address google",
            "freeman",
            "mathis",
            "special forces",
            "tailored access",
            "tao",
            "hacker force",
            "infiltrate",
            "manipulate",
            "sabotage",
            "tools",
            "show",
            "results nov",
            "9b",
            "tao operations",
            "root9b",
            "hunt operations",
            "error mar",
            "over watch",
            "overkill",
            "read c",
            "memcommit",
            "high",
            "checks",
            "windows",
            "delete",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "next",
            "local",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "suspicious_write_exe",
            "network_icmp",
            "antisandbox_restart",
            "creates_largekey",
            "infostealer_keylogger",
            "proess_martian",
            "injection_resumethread",
            "allocates_rwx",
            "targeted intelligence",
            "js_eval",
            "network_http",
            "name servers",
            "value domain",
            "domain name",
            "expiration date",
            "safe browsing",
            "unknown ns",
            "record value",
            "vercel",
            "certificate",
            "domain add",
            "refresh",
            "encrypt",
            "x vercel",
            "k jun",
            "mtb jul",
            "next http",
            "scans record",
            "value",
            "deployment not",
            "ransom",
            "trojan",
            "a domains",
            "safari",
            "android",
            "webkit",
            "animation",
            "click",
            "title",
            "passive dns",
            "gmt content",
            "arial helvetica",
            "ipv4 add",
            "status",
            "search",
            "emails",
            "as15169 google",
            "virtool",
            "cryp",
            "as396982",
            "win32",
            "error",
            "code",
            "domain",
            "showing",
            "query",
            "hostile",
            "observed dns",
            "et dns",
            "et info",
            "dns query",
            "malware",
            "push",
            "gmt cache",
            "sameorigin",
            "files",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "as44273 host",
            "hostname add",
            "unknown aaaa",
            "win32upatre dec",
            "mtb dec",
            "trojandropper",
            "hstr",
            "next associated",
            "backdoor",
            "entity",
            "tempe",
            "present sep",
            "hostname",
            "verdict",
            "lowfi",
            "usesscrrun",
            "ipv4",
            "element",
            "password",
            "developers",
            "create",
            "forms web",
            "group",
            "make sure",
            "autocomplete",
            "currentpassword",
            "make",
            "extraction",
            "data upload",
            "search otx",
            "ider data",
            "asn na",
            "ag da",
            "source level",
            "url text",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "asn16509",
            "amazon02",
            "resource",
            "hash",
            "as16509",
            "us note",
            "route",
            "redacted for",
            "script urls",
            "japan unknown",
            "present apr",
            "present mar",
            "accept",
            "cookie",
            "path",
            "sectigo https",
            "encrypt https",
            "log id",
            "trustasia https",
            "amazon",
            "search criteria",
            "22965417271",
            "summary leaf",
            "timestamp entry",
            "log operator",
            "https",
            "script script",
            "cname",
            "present jun",
            "coup",
            "files ip",
            "address",
            "location united",
            "asn as16509",
            "color value",
            "item tile",
            "gmt max",
            "primary text",
            "text color",
            "play button",
            "search bar",
            "dasher",
            "flag",
            "bad traffic",
            "tls handshake",
            "failure",
            "analysis tip",
            "windir",
            "openurl c",
            "ascii text",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "network traffic",
            "beginstring",
            "show process",
            "null",
            "span",
            "general",
            "strings",
            "look",
            "verify",
            "restart",
            "dynamicloader",
            "ee fc",
            "yara rule",
            "ff d5",
            "c1 e0",
            "f0 ff",
            "ff ff",
            "eb e2",
            "ed b8",
            "fe ff",
            "june",
            "polymorphic",
            "network cnc",
            "cnc",
            "dead connect",
            "present nov",
            "france unknown",
            "generic http",
            "exe upload",
            "uploading exe",
            "intel",
            "ms windows",
            "medium",
            "http traffic",
            "monitored target",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "learn",
            "command",
            "suspicious",
            "informative",
            "name tactics",
            "spawns",
            "t1480 execution",
            "file defense",
            "file discovery",
            "t1071",
            "t1057",
            "segoe ui",
            "script",
            "html",
            "body",
            "twitter",
            "formbook cnc",
            "checkin",
            "pegasus",
            "get updates",
            "p2p zeus",
            "downloader",
            "mpress",
            "win32upatre sep",
            "win32upatre oct",
            "win32upatre nov",
            "india unknown",
            "r61afin",
            "common upatre",
            "write c",
            "cts exe",
            "ids detections",
            "open",
            "present aug",
            "singapore",
            "date",
            "creation date",
            "pentest people",
            "tesla hackers",
            "vietnam unknown",
            "viet nam",
            "company limited",
            "pulse pulses"
          ],
          "references": [
            "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
            "dev-app.project-cicada.com \u2022 project-cicada.com",
            "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
            "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
            "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
            "api.acumatica.flex.redteam.com",
            "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
            "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
            "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
            "https://goo.gl/9p2vKq",
            "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
            "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
            "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
            "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
            "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
            "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
            "IDS Detections Gh0stCringe CnC Activity M2",
            "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
            "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
            "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
            "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
            "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
            "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
          ],
          "public": 1,
          "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Doc.Downloader.EmotetRed02220-9938909-0",
              "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/VB.IL",
              "display_name": "TrojanDropper:Win32/VB.IL",
              "target": "/malware/TrojanDropper:Win32/VB.IL"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Cymt",
              "display_name": "Cymt",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.AA",
              "display_name": "TrojanDownloader:Win32/Upatre.AA",
              "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
            },
            {
              "id": "Win.Trojan.Gh0stRAT-9955419-1",
              "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
              "target": null
            },
            {
              "id": "Win32:MalOb-BX",
              "display_name": "Win32:MalOb-BX",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.K",
              "display_name": "VirTool:Win32/Obfuscator.K",
              "target": "/malware/VirTool:Win32/Obfuscator.K"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11102,
            "hostname": 4142,
            "domain": 4251,
            "email": 15,
            "FileHash-SHA256": 3108,
            "FileHash-MD5": 624,
            "FileHash-SHA1": 490,
            "CIDR": 1,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 23736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "96 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "Yara Detections: Nullsoft_NSIS",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "Yara: Detections Tofsee",
        "ET TROJAN Suspicious double Server Header",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "putrhnwl.exe",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "ET DNS DNS Query to a .tk domain - Likey",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "https://goo.gl/9p2vKq",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "https://cellebrite.com/en/federal-government/",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "IP\u2019s Contacted : 54.230.129.165",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "Needs to be sorted. Actively being exploited on US",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "api.acumatica.flex.redteam.com",
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)"
          ],
          "malware_families": [
            "Tsunami-6981155-0",
            "Unix.trojan.tsunami-6981155-0",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Ransomware/win.stop.r4529",
            "Trojan:win32/emotet.pc!mtb",
            "Pegasus",
            "Trojan:win32/danabot",
            "Trojandownloader:win32/upatre.aa",
            "Win.trojan.gh0strat-9955419-1",
            "Win32/backdoorx",
            "Win.trojan.dialog-9873788-0",
            "Win.trojan.agent",
            "Win32:trojan-gen",
            "Win32:malob-bx",
            "Trojandownloader:win32/cutwail.bs",
            "Mirai",
            "Cymt",
            "Doc.downloader.emotetred02220-9938909-0",
            "Trojan:win32/aptdrop.ru",
            "Ransom:win32/crowti.a",
            "Et",
            "Backdoor:linux/demonbot",
            "Backdoor:win32/tofsee.t",
            "Virtool:win32/obfuscator.k",
            "Trojandropper:win32/vb.il",
            "Crypt3.bxvc",
            "Etpro"
          ],
          "industries": [
            "Civil society",
            "Journalists",
            "Government"
          ],
          "unique_indicators": 41778
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/crowdcomms.com",
    "whois": "http://whois.domaintools.com/crowdcomms.com",
    "domain": "crowdcomms.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "69b2b7cb05b2098c1d2bf20f",
      "name": "federal goverment clone cellbrite credit q vashti",
      "description": "",
      "modified": "2026-03-12T12:55:39.046000",
      "created": "2026-03-12T12:55:39.046000",
      "tags": [
        "url https",
        "url http",
        "germany",
        "united",
        "ukraine",
        "japan",
        "extraction",
        "data upload",
        "urls",
        "url analysis",
        "enter sc",
        "extr",
        "iocs",
        "active",
        "france unknown",
        "present jan",
        "servers",
        "homair sweet",
        "grabber",
        "encrypt",
        "ipv4",
        "role title",
        "divx",
        "pitfall",
        "internet",
        "ip role",
        "america asn",
        "extraction data",
        "leveibielabs",
        "all se",
        "enter source",
        "url or",
        "texirag",
        "drop",
        "present nov",
        "united states",
        "america",
        "levdibidelabs",
        "failed",
        "idron anv",
        "include manualv",
        "review data",
        "iterng",
        "name servers",
        "passive dns",
        "incapsula",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "script head",
        "request",
        "cookie",
        "indicator",
        "msie",
        "chrome",
        "backdoor",
        "gmt content",
        "ipv4 add",
        "twitter",
        "title",
        "process32nextw",
        "ms windows",
        "intel",
        "pe32",
        "regopenkeyexa",
        "read c",
        "medium",
        "class",
        "write",
        "template",
        "present oct",
        "present jul",
        "aaaa",
        "present sep",
        "present aug",
        "url add",
        "http",
        "hostname",
        "related tags",
        "kx81xdbx0f",
        "x86xd3",
        "xa7xe28x06",
        "x82xd4",
        "delete c",
        "regsetvalueexa",
        "regbinary",
        "xa1xf1",
        "xe8xc2x14",
        "malware",
        "stream",
        "unknown",
        "win32",
        "persistence",
        "execution",
        "push",
        "present dec",
        "italy",
        "present jun",
        "embeddedwb",
        "whitelisted",
        "windows nt",
        "dns traffic",
        "russia",
        "cname",
        "accept",
        "destination",
        "port",
        "et smtp",
        "message",
        "et trojan",
        "components",
        "suspicious",
        "download",
        "hostile",
        "next",
        "logic",
        "gather victim",
        "et info",
        "etpro trojan",
        "trojan",
        "report spam",
        "interesting",
        "created",
        "pegasus",
        "manipulation",
        "service",
        "capture",
        "et",
        "etpro",
        "host",
        "attack",
        "mtb description",
        "windows",
        "shellexecuteexw",
        "writeconsolew",
        "registry",
        "t1031",
        "modify existing",
        "dock",
        "type indicator",
        "added active",
        "related pulses",
        "arcflex",
        "filehashsha1",
        "types of",
        "learn more",
        "filehashsha256",
        "cellebrite",
        "white label",
        "search",
        "sha1",
        "france",
        "cmanual jan",
        "expiration date",
        "domain add",
        "pulse submit",
        "files",
        "ip address",
        "gmt cache",
        "sameorigin",
        "reverse dns",
        "unknown ns",
        "admin org",
        "zipcode",
        "gmt server",
        "pulse pulses",
        "entries",
        "hostname add",
        "verdict",
        "germany unknown",
        "status",
        "domain",
        "xpirat",
        "netherlands",
        "netherlands asn",
        "as35280 acorus",
        "dns resolutions",
        "error",
        "files ip",
        "copy",
        "telnet login",
        "suspicious path",
        "busybox",
        "login attempt",
        "gpl telnet",
        "high",
        "tcp syn",
        "telnet root",
        "path",
        "mirai",
        "emails",
        "domain name",
        "jlu11q",
        "tqbplo",
        "hours ago",
        "found",
        "yahoo",
        "gmail",
        "yandex",
        "https://cellebrite.com/en/federal-government/",
        "monitoring",
        "monitored target",
        "dangerous",
        "spyware",
        "80211",
        "colorado",
        "x amz",
        "government",
        "mirai login attempt",
        "emotet",
        "c2",
        ".ru",
        ".com",
        "denver",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "dead connect",
        "hostile",
        "adversarial",
        "abuse",
        "criminal intent",
        "block messages",
        "botnet"
      ],
      "references": [
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "putrhnwl.exe",
        "Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "IP\u2019s Contacted : 54.230.129.165",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Yara: Detections Tofsee",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "ET TROJAN Suspicious double Server Header",
        "ET DNS DNS Query to a .tk domain - Likey",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "Needs to be sorted. Actively being exploited on US",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "https://cellebrite.com/en/federal-government/",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Germany",
        "Ireland",
        "Switzerland",
        "Poland",
        "Belgium",
        "Netherlands",
        "Sweden"
      ],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "ETPRO",
          "display_name": "ETPRO",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.PC!MTB",
          "display_name": "Trojan:Win32/Emotet.PC!MTB",
          "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aptdrop.RU",
          "display_name": "Trojan:Win32/Aptdrop.RU",
          "target": "/malware/Trojan:Win32/Aptdrop.RU"
        },
        {
          "id": "Ransomware/Win.Stop.R4529",
          "display_name": "Ransomware/Win.Stop.R4529",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32/BackdoorX",
          "display_name": "Win32/BackdoorX",
          "target": null
        },
        {
          "id": "Win.Trojan.Dialog-9873788-0",
          "display_name": "Win.Trojan.Dialog-9873788-0",
          "target": null
        },
        {
          "id": "Tsunami-6981155-0",
          "display_name": "Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1195",
          "name": "Supply Chain Compromise",
          "display_name": "T1195 - Supply Chain Compromise"
        },
        {
          "id": "T1196",
          "name": "Control Panel Items",
          "display_name": "T1196 - Control Panel Items"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1556",
          "name": "Modify Authentication Process",
          "display_name": "T1556 - Modify Authentication Process"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1581",
          "name": "Geofencing",
          "display_name": "T1581 - Geofencing"
        },
        {
          "id": "T1582",
          "name": "SMS Control",
          "display_name": "T1582 - SMS Control"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1587",
          "name": "Develop Capabilities",
          "display_name": "T1587 - Develop Capabilities"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [
        "Journalists",
        "Government",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": "696f7d467763ed4d4e74d133",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4994,
        "domain": 2519,
        "hostname": 3281,
        "FileHash-SHA256": 4467,
        "FileHash-MD5": 1118,
        "FileHash-SHA1": 1056,
        "email": 12,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 17448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "38 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696f7d467763ed4d4e74d133",
      "name": "Federal Government-Cellebrite Attack found actively targeting iOS and other devices | Mirai login attempts | TelNet Login",
      "description": "https://cellebrite.com/en/federal-government/ | Found on a crime victims devices. Targets abused by spyware in an unethical manner by andvesarial \u2018governmental\u2019 possibly \u2018contracted\u2019 entities. Waged against targets such as victims of crime , journalists , researchers , students. Target Users: Serves public safety, enterprise, and government sectors, aiding first responders, investigators, prosecutors, and analysts. How it's Used Law enforcement uses it to unlock devices and retrieve evidence like messages, location history, and app data for criminal investigations. It helps uncover critical information from digital devices, even recovering data that users thought was permanently deleted. Controversy & Privacy Concerns While marketed as a tool for lawful investigations, its powerful data extraction capabilities raise significant privacy concerns and ethical debates.",
      "modified": "2026-02-19T12:05:47.166000",
      "created": "2026-01-20T13:04:06.622000",
      "tags": [
        "url https",
        "url http",
        "germany",
        "united",
        "ukraine",
        "japan",
        "extraction",
        "data upload",
        "urls",
        "url analysis",
        "enter sc",
        "extr",
        "iocs",
        "active",
        "france unknown",
        "present jan",
        "servers",
        "homair sweet",
        "grabber",
        "encrypt",
        "ipv4",
        "role title",
        "divx",
        "pitfall",
        "internet",
        "ip role",
        "america asn",
        "extraction data",
        "leveibielabs",
        "all se",
        "enter source",
        "url or",
        "texirag",
        "drop",
        "present nov",
        "united states",
        "america",
        "levdibidelabs",
        "failed",
        "idron anv",
        "include manualv",
        "review data",
        "iterng",
        "name servers",
        "passive dns",
        "incapsula",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "script head",
        "request",
        "cookie",
        "indicator",
        "msie",
        "chrome",
        "backdoor",
        "gmt content",
        "ipv4 add",
        "twitter",
        "title",
        "process32nextw",
        "ms windows",
        "intel",
        "pe32",
        "regopenkeyexa",
        "read c",
        "medium",
        "class",
        "write",
        "template",
        "present oct",
        "present jul",
        "aaaa",
        "present sep",
        "present aug",
        "url add",
        "http",
        "hostname",
        "related tags",
        "kx81xdbx0f",
        "x86xd3",
        "xa7xe28x06",
        "x82xd4",
        "delete c",
        "regsetvalueexa",
        "regbinary",
        "xa1xf1",
        "xe8xc2x14",
        "malware",
        "stream",
        "unknown",
        "win32",
        "persistence",
        "execution",
        "push",
        "present dec",
        "italy",
        "present jun",
        "embeddedwb",
        "whitelisted",
        "windows nt",
        "dns traffic",
        "russia",
        "cname",
        "accept",
        "destination",
        "port",
        "et smtp",
        "message",
        "et trojan",
        "components",
        "suspicious",
        "download",
        "hostile",
        "next",
        "logic",
        "gather victim",
        "et info",
        "etpro trojan",
        "trojan",
        "report spam",
        "interesting",
        "created",
        "pegasus",
        "manipulation",
        "service",
        "capture",
        "et",
        "etpro",
        "host",
        "attack",
        "mtb description",
        "windows",
        "shellexecuteexw",
        "writeconsolew",
        "registry",
        "t1031",
        "modify existing",
        "dock",
        "type indicator",
        "added active",
        "related pulses",
        "arcflex",
        "filehashsha1",
        "types of",
        "learn more",
        "filehashsha256",
        "cellebrite",
        "white label",
        "search",
        "sha1",
        "france",
        "cmanual jan",
        "expiration date",
        "domain add",
        "pulse submit",
        "files",
        "ip address",
        "gmt cache",
        "sameorigin",
        "reverse dns",
        "unknown ns",
        "admin org",
        "zipcode",
        "gmt server",
        "pulse pulses",
        "entries",
        "hostname add",
        "verdict",
        "germany unknown",
        "status",
        "domain",
        "xpirat",
        "netherlands",
        "netherlands asn",
        "as35280 acorus",
        "dns resolutions",
        "error",
        "files ip",
        "copy",
        "telnet login",
        "suspicious path",
        "busybox",
        "login attempt",
        "gpl telnet",
        "high",
        "tcp syn",
        "telnet root",
        "path",
        "mirai",
        "emails",
        "domain name",
        "jlu11q",
        "tqbplo",
        "hours ago",
        "found",
        "yahoo",
        "gmail",
        "yandex",
        "https://cellebrite.com/en/federal-government/",
        "monitoring",
        "monitored target",
        "dangerous",
        "spyware",
        "80211",
        "colorado",
        "x amz",
        "government",
        "mirai login attempt",
        "emotet",
        "c2",
        ".ru",
        ".com",
        "denver",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "dead connect",
        "hostile",
        "adversarial",
        "abuse",
        "criminal intent",
        "block messages",
        "botnet"
      ],
      "references": [
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "putrhnwl.exe",
        "Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "IP\u2019s Contacted : 54.230.129.165",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Yara: Detections Tofsee",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "ET TROJAN Suspicious double Server Header",
        "ET DNS DNS Query to a .tk domain - Likey",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "Needs to be sorted. Actively being exploited on US",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "https://cellebrite.com/en/federal-government/",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Germany",
        "Ireland",
        "Switzerland",
        "Poland",
        "Belgium",
        "Netherlands",
        "Sweden"
      ],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "ETPRO",
          "display_name": "ETPRO",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.PC!MTB",
          "display_name": "Trojan:Win32/Emotet.PC!MTB",
          "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aptdrop.RU",
          "display_name": "Trojan:Win32/Aptdrop.RU",
          "target": "/malware/Trojan:Win32/Aptdrop.RU"
        },
        {
          "id": "Ransomware/Win.Stop.R4529",
          "display_name": "Ransomware/Win.Stop.R4529",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32/BackdoorX",
          "display_name": "Win32/BackdoorX",
          "target": null
        },
        {
          "id": "Win.Trojan.Dialog-9873788-0",
          "display_name": "Win.Trojan.Dialog-9873788-0",
          "target": null
        },
        {
          "id": "Tsunami-6981155-0",
          "display_name": "Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1195",
          "name": "Supply Chain Compromise",
          "display_name": "T1195 - Supply Chain Compromise"
        },
        {
          "id": "T1196",
          "name": "Control Panel Items",
          "display_name": "T1196 - Control Panel Items"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1556",
          "name": "Modify Authentication Process",
          "display_name": "T1556 - Modify Authentication Process"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1581",
          "name": "Geofencing",
          "display_name": "T1581 - Geofencing"
        },
        {
          "id": "T1582",
          "name": "SMS Control",
          "display_name": "T1582 - SMS Control"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1587",
          "name": "Develop Capabilities",
          "display_name": "T1587 - Develop Capabilities"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [
        "Journalists",
        "Government",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4994,
        "domain": 2519,
        "hostname": 3281,
        "FileHash-SHA256": 4467,
        "FileHash-MD5": 1118,
        "FileHash-SHA1": 1056,
        "email": 12,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 17448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "59 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f3ef3b05672ba47b903e3",
      "name": "Create Amazing Password Forms - Project Cicada",
      "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
      "modified": "2026-01-13T22:02:50.260000",
      "created": "2025-12-14T22:49:23.114000",
      "tags": [
        "cicada",
        "project cicada",
        "united states",
        "quasi government",
        "asnone country",
        "united",
        "moved",
        "agent",
        "meta",
        "title error",
        "reverse dns",
        "servers",
        "urls",
        "url analysis",
        "aaaa",
        "present dec",
        "ip address",
        "america flag",
        "unknown",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "brian sabey.",
        "State of Colorado",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results mar",
        "avast avg",
        "qualified immunity",
        "address google",
        "freeman",
        "mathis",
        "special forces",
        "tailored access",
        "tao",
        "hacker force",
        "infiltrate",
        "manipulate",
        "sabotage",
        "tools",
        "show",
        "results nov",
        "9b",
        "tao operations",
        "root9b",
        "hunt operations",
        "error mar",
        "over watch",
        "overkill",
        "read c",
        "memcommit",
        "high",
        "checks",
        "windows",
        "delete",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "next",
        "local",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "suspicious_write_exe",
        "network_icmp",
        "antisandbox_restart",
        "creates_largekey",
        "infostealer_keylogger",
        "proess_martian",
        "injection_resumethread",
        "allocates_rwx",
        "targeted intelligence",
        "js_eval",
        "network_http",
        "name servers",
        "value domain",
        "domain name",
        "expiration date",
        "safe browsing",
        "unknown ns",
        "record value",
        "vercel",
        "certificate",
        "domain add",
        "refresh",
        "encrypt",
        "x vercel",
        "k jun",
        "mtb jul",
        "next http",
        "scans record",
        "value",
        "deployment not",
        "ransom",
        "trojan",
        "a domains",
        "safari",
        "android",
        "webkit",
        "animation",
        "click",
        "title",
        "passive dns",
        "gmt content",
        "arial helvetica",
        "ipv4 add",
        "status",
        "search",
        "emails",
        "as15169 google",
        "virtool",
        "cryp",
        "as396982",
        "win32",
        "error",
        "code",
        "domain",
        "showing",
        "query",
        "hostile",
        "observed dns",
        "et dns",
        "et info",
        "dns query",
        "malware",
        "push",
        "gmt cache",
        "sameorigin",
        "files",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "as44273 host",
        "hostname add",
        "unknown aaaa",
        "win32upatre dec",
        "mtb dec",
        "trojandropper",
        "hstr",
        "next associated",
        "backdoor",
        "entity",
        "tempe",
        "present sep",
        "hostname",
        "verdict",
        "lowfi",
        "usesscrrun",
        "ipv4",
        "element",
        "password",
        "developers",
        "create",
        "forms web",
        "group",
        "make sure",
        "autocomplete",
        "currentpassword",
        "make",
        "extraction",
        "data upload",
        "search otx",
        "ider data",
        "asn na",
        "ag da",
        "source level",
        "url text",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "asn16509",
        "amazon02",
        "resource",
        "hash",
        "as16509",
        "us note",
        "route",
        "redacted for",
        "script urls",
        "japan unknown",
        "present apr",
        "present mar",
        "accept",
        "cookie",
        "path",
        "sectigo https",
        "encrypt https",
        "log id",
        "trustasia https",
        "amazon",
        "search criteria",
        "22965417271",
        "summary leaf",
        "timestamp entry",
        "log operator",
        "https",
        "script script",
        "cname",
        "present jun",
        "coup",
        "files ip",
        "address",
        "location united",
        "asn as16509",
        "color value",
        "item tile",
        "gmt max",
        "primary text",
        "text color",
        "play button",
        "search bar",
        "dasher",
        "flag",
        "bad traffic",
        "tls handshake",
        "failure",
        "analysis tip",
        "windir",
        "openurl c",
        "ascii text",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "network traffic",
        "beginstring",
        "show process",
        "null",
        "span",
        "general",
        "strings",
        "look",
        "verify",
        "restart",
        "dynamicloader",
        "ee fc",
        "yara rule",
        "ff d5",
        "c1 e0",
        "f0 ff",
        "ff ff",
        "eb e2",
        "ed b8",
        "fe ff",
        "june",
        "polymorphic",
        "network cnc",
        "cnc",
        "dead connect",
        "present nov",
        "france unknown",
        "generic http",
        "exe upload",
        "uploading exe",
        "intel",
        "ms windows",
        "medium",
        "http traffic",
        "monitored target",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "learn",
        "command",
        "suspicious",
        "informative",
        "name tactics",
        "spawns",
        "t1480 execution",
        "file defense",
        "file discovery",
        "t1071",
        "t1057",
        "segoe ui",
        "script",
        "html",
        "body",
        "twitter",
        "formbook cnc",
        "checkin",
        "pegasus",
        "get updates",
        "p2p zeus",
        "downloader",
        "mpress",
        "win32upatre sep",
        "win32upatre oct",
        "win32upatre nov",
        "india unknown",
        "r61afin",
        "common upatre",
        "write c",
        "cts exe",
        "ids detections",
        "open",
        "present aug",
        "singapore",
        "date",
        "creation date",
        "pentest people",
        "tesla hackers",
        "vietnam unknown",
        "viet nam",
        "company limited",
        "pulse pulses"
      ],
      "references": [
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "api.acumatica.flex.redteam.com",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "https://goo.gl/9p2vKq",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
      ],
      "public": 1,
      "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Doc.Downloader.EmotetRed02220-9938909-0",
          "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/VB.IL",
          "display_name": "TrojanDropper:Win32/VB.IL",
          "target": "/malware/TrojanDropper:Win32/VB.IL"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Cymt",
          "display_name": "Cymt",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.AA",
          "display_name": "TrojanDownloader:Win32/Upatre.AA",
          "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
        },
        {
          "id": "Win.Trojan.Gh0stRAT-9955419-1",
          "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
          "target": null
        },
        {
          "id": "Win32:MalOb-BX",
          "display_name": "Win32:MalOb-BX",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.K",
          "display_name": "VirTool:Win32/Obfuscator.K",
          "target": "/malware/VirTool:Win32/Obfuscator.K"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11102,
        "hostname": 4142,
        "domain": 4251,
        "email": 15,
        "FileHash-SHA256": 3108,
        "FileHash-MD5": 624,
        "FileHash-SHA1": 490,
        "CIDR": 1,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 23736,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "96 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://crowdcomms.com/container",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://crowdcomms.com/container",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638668.8921974
}