{
  "type": "URL",
  "indicator": "https://curatedlinks.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://curatedlinks.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3972766278,
      "indicator": "https://curatedlinks.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "6935c92c5fc93fd873c6aa6d",
          "name": "[COINBASECARTEL] - Ransomware Victim: Cinvestav - RedPacket Security | CVE-2025-11727 (New)",
          "description": "Related to multiple exploits. Government Cyber Defense implications but shows as very legitimate looking masquerading. I am not positive and don\u2019t want to move to Belfast. Populated NSA [.] gov domains and subdomains (w/o no headers) lightly researched but does not assert a government identity. \n*New CVE-2025-11727",
          "modified": "2026-01-06T18:04:02.620000",
          "created": "2025-12-07T18:36:28.055000",
          "tags": [
            "memcommit",
            "read c",
            "t1082",
            "cryptexportkey",
            "invalid pointer",
            "write",
            "msil",
            "malware",
            "media",
            "autorun",
            "countries",
            "united",
            "america",
            "high defense",
            "evasion",
            "t1055",
            "ck technique",
            "technique id",
            "allocates",
            "potential code",
            "attempts",
            "threatintel",
            "dark web",
            "coinbasecartel",
            "ransomware",
            "osint",
            "tor",
            "data breach",
            "cinvestav",
            "ai generated",
            "ransomware leak",
            "page",
            "november",
            "investigacin y",
            "nacional",
            "mexican",
            "mexico",
            "present nov",
            "verdana",
            "td tr",
            "passive dns",
            "ip address",
            "urls",
            "aaaa",
            "present may",
            "present oct",
            "present jul",
            "virtool",
            "present sep",
            "present jun",
            "win32",
            "default",
            "unicode",
            "png image",
            "rgba",
            "high",
            "dock",
            "execution",
            "xport",
            "unknown",
            "data upload",
            "extraction",
            "will",
            "data",
            "name cloudflare",
            "hostmaster name",
            "org cloudflare",
            "townsend st",
            "city san",
            "us creation",
            "kelihos",
            "ipv4",
            "present dec",
            "files",
            "domain",
            "search",
            "hostname",
            "verdict",
            "location united",
            "asn as16625",
            "akamai",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results nov",
            "present aug",
            "backdoor",
            "msie",
            "chrome",
            "trojan",
            "mtb aug",
            "worm",
            "cryp",
            "junkpoly",
            "twitter",
            "trojandropper",
            "title",
            "germany unknown",
            "ipv4 add",
            "pulse pulses",
            "hosting",
            "reverse dns",
            "cologne",
            "search engine",
            "gse compromised",
            "redacted for",
            "privacy admin",
            "privacy tech",
            "server",
            "organization",
            "street",
            "city",
            "stateprovince",
            "postal code",
            "country",
            "resolver domain",
            "cape sa",
            "virustot",
            "type pdf",
            "name",
            "lookups",
            "email abuse",
            "historical ssl",
            "certificates",
            "first",
            "graph summary",
            "cname",
            "address",
            "ip2location",
            "bogon ip",
            "admin",
            "network",
            "wifi password",
            "ssid",
            "demo",
            "details",
            "failed",
            "include review",
            "exclude sugges",
            "onlv",
            "x try",
            "find s",
            "typ url",
            "url data",
            "severity att",
            "module load",
            "icmp traffic",
            "dns query",
            "t1055 jseval",
            "windows nt",
            "port",
            "entries",
            "destination",
            "medium",
            "show",
            "pecompact",
            "june",
            "service",
            "next",
            "xserver",
            "encrypt",
            "t1129",
            "windows module",
            "dlls",
            "convention",
            "windows native"
          ],
          "references": [
            "Search Engines \u2022 Browser Extensions | Google.com.? | Duck DNS",
            "Related : Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection",
            "hallplan.vm05.iveins.de",
            "https://otx.alienvault.com/pulse/65b85faa9b8e3e1206d7f25c",
            "Masquerading as?  : bitcoin-king.nsa.mx  \u2022 cpcontacts.nsa.mx  \u2022 vulkanslot-bet777.nsa.mx",
            "Name : iveins.de  Service : connect",
            "https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav \u2022 evilginx.redpacketsecurity.com",
            "phish-demo-poc.phish-demo-poc.redpacketsecurity.com \u2022 phish-demo-poc.redpacketsecurity.com",
            "https://otx.alienvault.com/indicator/cve/CVE-2025-11727"
          ],
          "public": 1,
          "adversary": "COINBASECARTEL",
          "targeted_countries": [
            "United States of America",
            "Sweden",
            "Bangladesh",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tiggre!rfn",
              "display_name": "Trojan:Win32/Tiggre!rfn",
              "target": "/malware/Trojan:Win32/Tiggre!rfn"
            },
            {
              "id": "MSIL:Agent-DQ\\ [Trj]",
              "display_name": "MSIL:Agent-DQ\\ [Trj]",
              "target": null
            },
            {
              "id": "VirTool:MSIL/Covent.A",
              "display_name": "VirTool:MSIL/Covent.A",
              "target": "/malware/VirTool:MSIL/Covent.A"
            },
            {
              "id": "Trojan:Win32/Pynamer!rfn",
              "display_name": "Trojan:Win32/Pynamer!rfn",
              "target": "/malware/Trojan:Win32/Pynamer!rfn"
            },
            {
              "id": "Win64:TrojanX",
              "display_name": "Win64:TrojanX",
              "target": null
            },
            {
              "id": "VirTool:MSIL/Covent",
              "display_name": "VirTool:MSIL/Covent",
              "target": "/malware/VirTool:MSIL/Covent"
            },
            {
              "id": "#Lowfi:HSTR:MSIL/Obfuscator.Deepsea",
              "display_name": "#Lowfi:HSTR:MSIL/Obfuscator.Deepsea",
              "target": null
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Kelihos",
              "display_name": "Kelihos",
              "target": null
            },
            {
              "id": "CVE-2025-11727",
              "display_name": "CVE-2025-11727",
              "target": null
            },
            {
              "id": "Exploit:JS/CVE-2014-0322",
              "display_name": "Exploit:JS/CVE-2014-0322",
              "target": "/malware/Exploit:JS/CVE-2014-0322"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            }
          ],
          "industries": [
            "Education"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 144,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 1746,
            "URL": 5018,
            "hostname": 1827,
            "domain": 1072,
            "CVE": 3,
            "email": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9938,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "102 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e6547f22d43d6d149cac7a",
          "name": "RedCap Abuse | The 1st Pulse was deleted from OTX . AlienVault",
          "description": "Another example of target working with a hacker impersonating some7he.sje was not. The hackers had the perfect opportunity to stay attached to Dropbox, photos. microphone and highlighted heavily targets location. || Target was suspicious about several issues related to pair. Hacker has only one piece of equipment for project. Target basically had to give him all , tips, cues and direction for project. If this Pulse is deleted I don't know what to think.",
          "modified": "2024-10-15T02:02:53.504000",
          "created": "2024-09-15T03:29:03.699000",
          "tags": [
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "ip address",
            "related nids",
            "code",
            "process32nextw",
            "intel",
            "ms windows",
            "united",
            "pe32",
            "search",
            "module load",
            "t1129",
            "read c",
            "default",
            "path",
            "write",
            "malware",
            "copy",
            "win32",
            "suspicious",
            "unknown",
            "united kingdom",
            "set cookie",
            "as43350 nforce",
            "script urls",
            "as55286",
            "status",
            "cookie",
            "trojan",
            "template",
            "showing",
            "entries",
            "body",
            "ransom",
            "meta",
            "a div",
            "div div",
            "ipv4",
            "script script",
            "as16276",
            "france unknown",
            "link",
            "span a",
            "span span",
            "span",
            "class",
            "pragma",
            "servers",
            "creation date",
            "emails",
            "domain",
            "expiration date",
            "cname",
            "aaaa",
            "certificate",
            "lowfitrojan",
            "hstr",
            "jsauto25 jun",
            "pm lowfitrojan",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "endpoints all",
            "trojan features",
            "date hash",
            "as15169 google",
            "as44273 host",
            "september",
            "de indicators",
            "domains",
            "hashes",
            "dynamicloader",
            "yara detections",
            "enigmaprotector",
            "high",
            "bios",
            "dynamic",
            "filehash",
            "yaxpax",
            "yapaxi",
            "zp6axi0",
            "cuckoo",
            "name servers",
            "domains ii",
            "for privacy",
            "redacted for",
            "next",
            "domain address",
            "alienvault name",
            "server",
            "flag",
            "contacted hosts",
            "process details",
            "misc attack",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "exit node",
            "traffic group",
            "suricata",
            "overview ip",
            "address",
            "files location",
            "flag united",
            "hostname",
            "files domain",
            "months ago",
            "created",
            "email",
            "modified",
            "filehashsha1",
            "filehashsha256",
            "white cve",
            "cyber",
            "xamzexpires300",
            "twitter",
            "xor ddos",
            "xorddos",
            "hacktool",
            "bazaarloader",
            "redcap",
            "formbook",
            "locky",
            "lockbit",
            "ransomware",
            "target",
            "ebury",
            "virustotal",
            "crypter",
            "shadowpad",
            "corrupt",
            "cryptor",
            "android",
            "xrat",
            "xtrat",
            "malicious",
            "honeypot",
            "fraud",
            "already",
            "behav",
            "ragnar locker",
            "swipper",
            "n\u2205 ip",
            "write c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "delete c",
            "execution",
            "dock",
            "persistence",
            "august",
            "asnone bulgaria",
            "sales",
            "algorithm",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "whois lookups",
            "dnssec",
            "domain name",
            "abuse contact",
            "registrar abuse",
            "contact phone",
            "registrar iana",
            "date",
            "dns replication",
            "record type",
            "ttl value",
            "msms33388520",
            "data",
            "cus starizona",
            "cngo daddy",
            "authority",
            "g2 validity"
          ],
          "references": [
            "TrojanSpy:Win32/Nivdort.DE",
            "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
            "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
            "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
            "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
            "Alerts: nids_malware_alert network_icmp persistence_autorun"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_ade36583",
              "display_name": "ALF:Trojan:Win32/Cassini_ade36583",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
              "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
              "target": null
            },
            {
              "id": "Ransom:Win32/Wannaren",
              "display_name": "Ransom:Win32/Wannaren",
              "target": "/malware/Ransom:Win32/Wannaren"
            },
            {
              "id": "#LowfiTrojan:JS/Auto25",
              "display_name": "#LowfiTrojan:JS/Auto25",
              "target": "/malware/#LowfiTrojan:JS/Auto25"
            },
            {
              "id": "Trojan:Win32/Startpage",
              "display_name": "Trojan:Win32/Startpage",
              "target": "/malware/Trojan:Win32/Startpage"
            },
            {
              "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
              "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
              "target": null
            },
            {
              "id": "Win.Packed.XtremeRAT-9837419-0",
              "display_name": "Win.Packed.XtremeRAT-9837419-0",
              "target": null
            },
            {
              "id": "Win.Packed.Kelios-10023944-0",
              "display_name": "Win.Packed.Kelios-10023944-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Unruy-5885",
              "display_name": "Win.Trojan.Unruy-5885",
              "target": null
            },
            {
              "id": "Ebury",
              "display_name": "Ebury",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Swipper",
              "display_name": "Swipper",
              "target": null
            },
            {
              "id": "N\u2205 IP",
              "display_name": "N\u2205 IP",
              "target": null
            },
            {
              "id": "Locky",
              "display_name": "Locky",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.DE",
              "display_name": "TrojanSpy:Win32/Nivdort.DE",
              "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [
            "Government",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4315,
            "FileHash-MD5": 573,
            "FileHash-SHA1": 550,
            "FileHash-SHA256": 4114,
            "domain": 4757,
            "hostname": 2075,
            "SSLCertFingerprint": 5,
            "email": 14,
            "CIDR": 1
          },
          "indicator_count": 16404,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
        "Related : Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection",
        "phish-demo-poc.phish-demo-poc.redpacketsecurity.com \u2022 phish-demo-poc.redpacketsecurity.com",
        "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
        "Masquerading as?  : bitcoin-king.nsa.mx  \u2022 cpcontacts.nsa.mx  \u2022 vulkanslot-bet777.nsa.mx",
        "TrojanSpy:Win32/Nivdort.DE",
        "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
        "Search Engines \u2022 Browser Extensions | Google.com.? | Duck DNS",
        "Alerts: nids_malware_alert network_icmp persistence_autorun",
        "Name : iveins.de  Service : connect",
        "https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav \u2022 evilginx.redpacketsecurity.com",
        "https://otx.alienvault.com/pulse/65b85faa9b8e3e1206d7f25c",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
        "hallplan.vm05.iveins.de",
        "https://otx.alienvault.com/indicator/cve/CVE-2025-11727"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "COINBASECARTEL"
          ],
          "malware_families": [
            "Trojan:win32/tiggre!rfn",
            "Virtool:msil/covent",
            "Win.packed.kelios-10023944-0",
            "N\u2205 ip",
            "Tofsee",
            "Ransom:win32/wannaren",
            "Alf:heraklezeval:trojandownloader:win32/unruy",
            "Alf:trojan:win32/cassini_ade36583",
            "Trojan:win32/startpage",
            "Win64:trojanx",
            "Msil:agent-dq\\ [trj]",
            "Swipper",
            "Trojan:win32/pynamer!rfn",
            "Locky",
            "Trojanspy:win32/nivdort.de",
            "Kelihos",
            "#lowfi:hstr:msil/obfuscator.deepsea",
            "Alf:heraklezeval:trojandownloader:win32/unruy!rfn",
            "Win.packed.xtremerat-9837419-0",
            "Ebury",
            "Formbook",
            "Exploit:js/cve-2014-0322",
            "Win.trojan.unruy-5885",
            "Win32:malware",
            "Virtool:msil/covent.a",
            "#lowfitrojan:js/auto25",
            "Ransom:win32/haperlock",
            "Cve-2025-11727"
          ],
          "industries": [
            "Healthcare",
            "Education",
            "Government"
          ],
          "unique_indicators": 27139
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/curatedlinks.com",
    "whois": "http://whois.domaintools.com/curatedlinks.com",
    "domain": "curatedlinks.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "6935c92c5fc93fd873c6aa6d",
      "name": "[COINBASECARTEL] - Ransomware Victim: Cinvestav - RedPacket Security | CVE-2025-11727 (New)",
      "description": "Related to multiple exploits. Government Cyber Defense implications but shows as very legitimate looking masquerading. I am not positive and don\u2019t want to move to Belfast. Populated NSA [.] gov domains and subdomains (w/o no headers) lightly researched but does not assert a government identity. \n*New CVE-2025-11727",
      "modified": "2026-01-06T18:04:02.620000",
      "created": "2025-12-07T18:36:28.055000",
      "tags": [
        "memcommit",
        "read c",
        "t1082",
        "cryptexportkey",
        "invalid pointer",
        "write",
        "msil",
        "malware",
        "media",
        "autorun",
        "countries",
        "united",
        "america",
        "high defense",
        "evasion",
        "t1055",
        "ck technique",
        "technique id",
        "allocates",
        "potential code",
        "attempts",
        "threatintel",
        "dark web",
        "coinbasecartel",
        "ransomware",
        "osint",
        "tor",
        "data breach",
        "cinvestav",
        "ai generated",
        "ransomware leak",
        "page",
        "november",
        "investigacin y",
        "nacional",
        "mexican",
        "mexico",
        "present nov",
        "verdana",
        "td tr",
        "passive dns",
        "ip address",
        "urls",
        "aaaa",
        "present may",
        "present oct",
        "present jul",
        "virtool",
        "present sep",
        "present jun",
        "win32",
        "default",
        "unicode",
        "png image",
        "rgba",
        "high",
        "dock",
        "execution",
        "xport",
        "unknown",
        "data upload",
        "extraction",
        "will",
        "data",
        "name cloudflare",
        "hostmaster name",
        "org cloudflare",
        "townsend st",
        "city san",
        "us creation",
        "kelihos",
        "ipv4",
        "present dec",
        "files",
        "domain",
        "search",
        "hostname",
        "verdict",
        "location united",
        "asn as16625",
        "akamai",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results nov",
        "present aug",
        "backdoor",
        "msie",
        "chrome",
        "trojan",
        "mtb aug",
        "worm",
        "cryp",
        "junkpoly",
        "twitter",
        "trojandropper",
        "title",
        "germany unknown",
        "ipv4 add",
        "pulse pulses",
        "hosting",
        "reverse dns",
        "cologne",
        "search engine",
        "gse compromised",
        "redacted for",
        "privacy admin",
        "privacy tech",
        "server",
        "organization",
        "street",
        "city",
        "stateprovince",
        "postal code",
        "country",
        "resolver domain",
        "cape sa",
        "virustot",
        "type pdf",
        "name",
        "lookups",
        "email abuse",
        "historical ssl",
        "certificates",
        "first",
        "graph summary",
        "cname",
        "address",
        "ip2location",
        "bogon ip",
        "admin",
        "network",
        "wifi password",
        "ssid",
        "demo",
        "details",
        "failed",
        "include review",
        "exclude sugges",
        "onlv",
        "x try",
        "find s",
        "typ url",
        "url data",
        "severity att",
        "module load",
        "icmp traffic",
        "dns query",
        "t1055 jseval",
        "windows nt",
        "port",
        "entries",
        "destination",
        "medium",
        "show",
        "pecompact",
        "june",
        "service",
        "next",
        "xserver",
        "encrypt",
        "t1129",
        "windows module",
        "dlls",
        "convention",
        "windows native"
      ],
      "references": [
        "Search Engines \u2022 Browser Extensions | Google.com.? | Duck DNS",
        "Related : Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection",
        "hallplan.vm05.iveins.de",
        "https://otx.alienvault.com/pulse/65b85faa9b8e3e1206d7f25c",
        "Masquerading as?  : bitcoin-king.nsa.mx  \u2022 cpcontacts.nsa.mx  \u2022 vulkanslot-bet777.nsa.mx",
        "Name : iveins.de  Service : connect",
        "https://www.redpacketsecurity.com/coinbasecartel-ransomware-victim-cinvestav \u2022 evilginx.redpacketsecurity.com",
        "phish-demo-poc.phish-demo-poc.redpacketsecurity.com \u2022 phish-demo-poc.redpacketsecurity.com",
        "https://otx.alienvault.com/indicator/cve/CVE-2025-11727"
      ],
      "public": 1,
      "adversary": "COINBASECARTEL",
      "targeted_countries": [
        "United States of America",
        "Sweden",
        "Bangladesh",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tiggre!rfn",
          "display_name": "Trojan:Win32/Tiggre!rfn",
          "target": "/malware/Trojan:Win32/Tiggre!rfn"
        },
        {
          "id": "MSIL:Agent-DQ\\ [Trj]",
          "display_name": "MSIL:Agent-DQ\\ [Trj]",
          "target": null
        },
        {
          "id": "VirTool:MSIL/Covent.A",
          "display_name": "VirTool:MSIL/Covent.A",
          "target": "/malware/VirTool:MSIL/Covent.A"
        },
        {
          "id": "Trojan:Win32/Pynamer!rfn",
          "display_name": "Trojan:Win32/Pynamer!rfn",
          "target": "/malware/Trojan:Win32/Pynamer!rfn"
        },
        {
          "id": "Win64:TrojanX",
          "display_name": "Win64:TrojanX",
          "target": null
        },
        {
          "id": "VirTool:MSIL/Covent",
          "display_name": "VirTool:MSIL/Covent",
          "target": "/malware/VirTool:MSIL/Covent"
        },
        {
          "id": "#Lowfi:HSTR:MSIL/Obfuscator.Deepsea",
          "display_name": "#Lowfi:HSTR:MSIL/Obfuscator.Deepsea",
          "target": null
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Kelihos",
          "display_name": "Kelihos",
          "target": null
        },
        {
          "id": "CVE-2025-11727",
          "display_name": "CVE-2025-11727",
          "target": null
        },
        {
          "id": "Exploit:JS/CVE-2014-0322",
          "display_name": "Exploit:JS/CVE-2014-0322",
          "target": "/malware/Exploit:JS/CVE-2014-0322"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        }
      ],
      "industries": [
        "Education"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 144,
        "FileHash-SHA1": 117,
        "FileHash-SHA256": 1746,
        "URL": 5018,
        "hostname": 1827,
        "domain": 1072,
        "CVE": 3,
        "email": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9938,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "102 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e6547f22d43d6d149cac7a",
      "name": "RedCap Abuse | The 1st Pulse was deleted from OTX . AlienVault",
      "description": "Another example of target working with a hacker impersonating some7he.sje was not. The hackers had the perfect opportunity to stay attached to Dropbox, photos. microphone and highlighted heavily targets location. || Target was suspicious about several issues related to pair. Hacker has only one piece of equipment for project. Target basically had to give him all , tips, cues and direction for project. If this Pulse is deleted I don't know what to think.",
      "modified": "2024-10-15T02:02:53.504000",
      "created": "2024-09-15T03:29:03.699000",
      "tags": [
        "urls",
        "passive dns",
        "http",
        "unique",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "ip address",
        "related nids",
        "code",
        "process32nextw",
        "intel",
        "ms windows",
        "united",
        "pe32",
        "search",
        "module load",
        "t1129",
        "read c",
        "default",
        "path",
        "write",
        "malware",
        "copy",
        "win32",
        "suspicious",
        "unknown",
        "united kingdom",
        "set cookie",
        "as43350 nforce",
        "script urls",
        "as55286",
        "status",
        "cookie",
        "trojan",
        "template",
        "showing",
        "entries",
        "body",
        "ransom",
        "meta",
        "a div",
        "div div",
        "ipv4",
        "script script",
        "as16276",
        "france unknown",
        "link",
        "span a",
        "span span",
        "span",
        "class",
        "pragma",
        "servers",
        "creation date",
        "emails",
        "domain",
        "expiration date",
        "cname",
        "aaaa",
        "certificate",
        "lowfitrojan",
        "hstr",
        "jsauto25 jun",
        "pm lowfitrojan",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "endpoints all",
        "trojan features",
        "date hash",
        "as15169 google",
        "as44273 host",
        "september",
        "de indicators",
        "domains",
        "hashes",
        "dynamicloader",
        "yara detections",
        "enigmaprotector",
        "high",
        "bios",
        "dynamic",
        "filehash",
        "yaxpax",
        "yapaxi",
        "zp6axi0",
        "cuckoo",
        "name servers",
        "domains ii",
        "for privacy",
        "redacted for",
        "next",
        "domain address",
        "alienvault name",
        "server",
        "flag",
        "contacted hosts",
        "process details",
        "misc attack",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "exit node",
        "traffic group",
        "suricata",
        "overview ip",
        "address",
        "files location",
        "flag united",
        "hostname",
        "files domain",
        "months ago",
        "created",
        "email",
        "modified",
        "filehashsha1",
        "filehashsha256",
        "white cve",
        "cyber",
        "xamzexpires300",
        "twitter",
        "xor ddos",
        "xorddos",
        "hacktool",
        "bazaarloader",
        "redcap",
        "formbook",
        "locky",
        "lockbit",
        "ransomware",
        "target",
        "ebury",
        "virustotal",
        "crypter",
        "shadowpad",
        "corrupt",
        "cryptor",
        "android",
        "xrat",
        "xtrat",
        "malicious",
        "honeypot",
        "fraud",
        "already",
        "behav",
        "ragnar locker",
        "swipper",
        "n\u2205 ip",
        "write c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "delete c",
        "execution",
        "dock",
        "persistence",
        "august",
        "asnone bulgaria",
        "sales",
        "algorithm",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "whois lookups",
        "dnssec",
        "domain name",
        "abuse contact",
        "registrar abuse",
        "contact phone",
        "registrar iana",
        "date",
        "dns replication",
        "record type",
        "ttl value",
        "msms33388520",
        "data",
        "cus starizona",
        "cngo daddy",
        "authority",
        "g2 validity"
      ],
      "references": [
        "TrojanSpy:Win32/Nivdort.DE",
        "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn: FileHash-SHA256  00018d13f451300fb839123dfbf2d8607da0e7b1c89ae1bfbb9946ac79c1663c",
        "IDS Detections: Win32/Unruy Rogue Search Host Observed 1",
        "Yara Detections: Nrv2x ,  UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser",
        "Yara Detections: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser",
        "Alerts: nids_malware_alert network_icmp persistence_autorun"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Ransom:Win32/Haperlock",
          "display_name": "Ransom:Win32/Haperlock",
          "target": "/malware/Ransom:Win32/Haperlock"
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_ade36583",
          "display_name": "ALF:Trojan:Win32/Cassini_ade36583",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
          "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy!rfn",
          "target": null
        },
        {
          "id": "Ransom:Win32/Wannaren",
          "display_name": "Ransom:Win32/Wannaren",
          "target": "/malware/Ransom:Win32/Wannaren"
        },
        {
          "id": "#LowfiTrojan:JS/Auto25",
          "display_name": "#LowfiTrojan:JS/Auto25",
          "target": "/malware/#LowfiTrojan:JS/Auto25"
        },
        {
          "id": "Trojan:Win32/Startpage",
          "display_name": "Trojan:Win32/Startpage",
          "target": "/malware/Trojan:Win32/Startpage"
        },
        {
          "id": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
          "display_name": "ALF:HeraklezEval:TrojanDownloader:Win32/Unruy",
          "target": null
        },
        {
          "id": "Win.Packed.XtremeRAT-9837419-0",
          "display_name": "Win.Packed.XtremeRAT-9837419-0",
          "target": null
        },
        {
          "id": "Win.Packed.Kelios-10023944-0",
          "display_name": "Win.Packed.Kelios-10023944-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Unruy-5885",
          "display_name": "Win.Trojan.Unruy-5885",
          "target": null
        },
        {
          "id": "Ebury",
          "display_name": "Ebury",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Swipper",
          "display_name": "Swipper",
          "target": null
        },
        {
          "id": "N\u2205 IP",
          "display_name": "N\u2205 IP",
          "target": null
        },
        {
          "id": "Locky",
          "display_name": "Locky",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.DE",
          "display_name": "TrojanSpy:Win32/Nivdort.DE",
          "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [
        "Government",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4315,
        "FileHash-MD5": 573,
        "FileHash-SHA1": 550,
        "FileHash-SHA256": 4114,
        "domain": 4757,
        "hostname": 2075,
        "SSLCertFingerprint": 5,
        "email": 14,
        "CIDR": 1
      },
      "indicator_count": 16404,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://curatedlinks.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://curatedlinks.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776613119.7986445
}