{
  "type": "URL",
  "indicator": "https://de.skygo.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://de.skygo.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2926668412,
      "indicator": "https://de.skygo.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 12,
      "pulses": [
        {
          "id": "68efedf37890e1b32d60eb55",
          "name": "Assurant Insurance \u2022 Injection, Crypt , ProRat , Tofsee and a version Mirai affecting Assurant , T-Mobile & me",
          "description": "Injection, Crypt , ProRat , Tofsee and a version Mirai affecting Assurant and T-Mobile and me. There is truth to the tip I received. This is the 3rd time all of my networks went down , even my phone disconnected and phone number changed temporarily. \n\nJosh T found again. Online profile possibly staged. Stated he is a gamer , self trained in Lua, , CS major in Canada. He is a malicious hacker and streamer and probably an entity. Eric _E iCloud related. Found DoD & Mil hackers related. I haven\u2019t taken the time to authenticate.. Very malicious and talented hackers attacking. I can\u2019t ignore the .mil and DoD items that populated in previous pulses. \n \n[OTX Auto Populated-Trojan-gen-Glupteba, Danabot, Prorat, and other names have been identified as the names of those affected by the latest cyber-attack on the internet.]",
          "modified": "2025-11-14T17:02:12.746000",
          "created": "2025-10-15T18:54:43.205000",
          "tags": [
            "ipv4",
            "email abuse",
            "email info",
            "active related",
            "passive dns",
            "files related",
            "related tags",
            "none google",
            "external",
            "present aug",
            "present sep",
            "present jun",
            "present jul",
            "present oct",
            "ipv4 https",
            "crosscountry",
            "mortgagefamily",
            "port",
            "read c",
            "destination",
            "high",
            "intel",
            "ms windows",
            "stream",
            "explorer",
            "write",
            "malware",
            "united",
            "asnone",
            "et trojan",
            "windows nt",
            "suspicious",
            "win64",
            "zune",
            "et",
            "netherlands",
            "segoe ui",
            "found content",
            "length",
            "content type",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "error",
            "ip address",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "ip related",
            "pulses none",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "defense evasion",
            "ssl certificate",
            "execution",
            "path",
            "secure",
            "show technique",
            "mitre att",
            "ck matrix",
            "maxage31536000",
            "expirestue",
            "brand",
            "microsoft edge",
            "date",
            "cookie",
            "sha1",
            "ascii text",
            "sha256",
            "pattern match",
            "hybrid",
            "local",
            "click",
            "strings",
            "show process",
            "flag",
            "programfiles",
            "command decode",
            "comspec",
            "model",
            "general",
            "starfield",
            "encrypt",
            "iframe",
            "development att",
            "backdoor",
            "win32",
            "reverse dns",
            "location india",
            "india asn",
            "trojan",
            "mtb win32"
          ],
          "references": [
            "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
            "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
            "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
            "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
            "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
            "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
            "you.are.poor.i.got.trap.money?",
            "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "Romania",
            "South Africa"
          ],
          "malware_families": [
            {
              "id": "BC.Win.Packer.Troll-11",
              "display_name": "BC.Win.Packer.Troll-11",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Crypt3.BOJE",
              "display_name": "Crypt3.BOJE",
              "target": null
            },
            {
              "id": "Crypt3.BXMJ",
              "display_name": "Crypt3.BXMJ",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.OV!MTB",
              "display_name": "Trojan:Win32/Glupteba.OV!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "ProRat",
              "display_name": "ProRat",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Prorat.L",
              "display_name": "Backdoor:Win32/Prorat.L",
              "target": "/malware/Backdoor:Win32/Prorat.L"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "DanaBot",
              "display_name": "DanaBot",
              "target": null
            },
            {
              "id": "Atros3.AHFB",
              "display_name": "Atros3.AHFB",
              "target": null
            },
            {
              "id": "Crypt5.BBYH",
              "display_name": "Crypt5.BBYH",
              "target": null
            },
            {
              "id": "Crypt4.AHSW",
              "display_name": "Crypt4.AHSW",
              "target": null
            },
            {
              "id": "Crypt3.COIZ",
              "display_name": "Crypt3.COIZ",
              "target": null
            },
            {
              "id": "Crypt3.CMTM",
              "display_name": "Crypt3.CMTM",
              "target": null
            },
            {
              "id": "Crypt3.CKTO",
              "display_name": "Crypt3.CKTO",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BXGR",
              "display_name": "Crypt3.BXGR",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BOQD",
              "display_name": "Crypt3.BOQD",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "Crypt3.BOIU",
              "display_name": "Crypt3.BOIU",
              "target": null
            },
            {
              "id": "Inject2.BHBW",
              "display_name": "Inject2.BHBW",
              "target": null
            },
            {
              "id": "Inject2.BIVE",
              "display_name": "Inject2.BIVE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [
            "Telecommunications",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10010,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 144,
            "FileHash-SHA256": 2869,
            "domain": 2046,
            "email": 6,
            "hostname": 3705,
            "SSLCertFingerprint": 19
          },
          "indicator_count": 18949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68efee5ba882db423d3bad8f",
          "name": "Assurant & T-Mobile BLYP Checkin ET MALWARE TROJAN  \u2022 Kryptic",
          "description": "",
          "modified": "2025-11-14T17:02:12.746000",
          "created": "2025-10-15T18:56:27.950000",
          "tags": [
            "ipv4",
            "email abuse",
            "email info",
            "active related",
            "passive dns",
            "files related",
            "related tags",
            "none google",
            "external",
            "present aug",
            "present sep",
            "present jun",
            "present jul",
            "present oct",
            "ipv4 https",
            "crosscountry",
            "mortgagefamily",
            "port",
            "read c",
            "destination",
            "high",
            "intel",
            "ms windows",
            "stream",
            "explorer",
            "write",
            "malware",
            "united",
            "asnone",
            "et trojan",
            "windows nt",
            "suspicious",
            "win64",
            "zune",
            "et",
            "netherlands",
            "segoe ui",
            "found content",
            "length",
            "content type",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "error",
            "ip address",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "ip related",
            "pulses none",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "defense evasion",
            "ssl certificate",
            "execution",
            "path",
            "secure",
            "show technique",
            "mitre att",
            "ck matrix",
            "maxage31536000",
            "expirestue",
            "brand",
            "microsoft edge",
            "date",
            "cookie",
            "sha1",
            "ascii text",
            "sha256",
            "pattern match",
            "hybrid",
            "local",
            "click",
            "strings",
            "show process",
            "flag",
            "programfiles",
            "command decode",
            "comspec",
            "model",
            "general",
            "starfield",
            "encrypt",
            "iframe",
            "development att",
            "backdoor",
            "win32",
            "reverse dns",
            "location india",
            "india asn",
            "trojan",
            "mtb win32"
          ],
          "references": [
            "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
            "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
            "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
            "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
            "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
            "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
            "you.are.poor.i.got.trap.money?",
            "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "Romania",
            "South Africa"
          ],
          "malware_families": [
            {
              "id": "BC.Win.Packer.Troll-11",
              "display_name": "BC.Win.Packer.Troll-11",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Crypt3.BOJE",
              "display_name": "Crypt3.BOJE",
              "target": null
            },
            {
              "id": "Crypt3.BXMJ",
              "display_name": "Crypt3.BXMJ",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.OV!MTB",
              "display_name": "Trojan:Win32/Glupteba.OV!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "ProRat",
              "display_name": "ProRat",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Prorat.L",
              "display_name": "Backdoor:Win32/Prorat.L",
              "target": "/malware/Backdoor:Win32/Prorat.L"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "DanaBot",
              "display_name": "DanaBot",
              "target": null
            },
            {
              "id": "Atros3.AHFB",
              "display_name": "Atros3.AHFB",
              "target": null
            },
            {
              "id": "Crypt5.BBYH",
              "display_name": "Crypt5.BBYH",
              "target": null
            },
            {
              "id": "Crypt4.AHSW",
              "display_name": "Crypt4.AHSW",
              "target": null
            },
            {
              "id": "Crypt3.COIZ",
              "display_name": "Crypt3.COIZ",
              "target": null
            },
            {
              "id": "Crypt3.CMTM",
              "display_name": "Crypt3.CMTM",
              "target": null
            },
            {
              "id": "Crypt3.CKTO",
              "display_name": "Crypt3.CKTO",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BXGR",
              "display_name": "Crypt3.BXGR",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BOQD",
              "display_name": "Crypt3.BOQD",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "Crypt3.BOIU",
              "display_name": "Crypt3.BOIU",
              "target": null
            },
            {
              "id": "Inject2.BHBW",
              "display_name": "Inject2.BHBW",
              "target": null
            },
            {
              "id": "Inject2.BIVE",
              "display_name": "Inject2.BIVE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [
            "Telecommunications",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": "68efedf37890e1b32d60eb55",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10010,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 144,
            "FileHash-SHA256": 2869,
            "domain": 2046,
            "email": 6,
            "hostname": 3705,
            "SSLCertFingerprint": 19
          },
          "indicator_count": 18949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68eff0848071708f9ee0c0bd",
          "name": "Gamarue \u2022 G3nasom\u2022 Simda\u2022 Ganelp affecting Assurant and T-Mobile Part 3",
          "description": "",
          "modified": "2025-11-14T17:02:12.746000",
          "created": "2025-10-15T19:05:40.466000",
          "tags": [
            "ipv4",
            "email abuse",
            "email info",
            "active related",
            "passive dns",
            "files related",
            "related tags",
            "none google",
            "external",
            "present aug",
            "present sep",
            "present jun",
            "present jul",
            "present oct",
            "ipv4 https",
            "crosscountry",
            "mortgagefamily",
            "port",
            "read c",
            "destination",
            "high",
            "intel",
            "ms windows",
            "stream",
            "explorer",
            "write",
            "malware",
            "united",
            "asnone",
            "et trojan",
            "windows nt",
            "suspicious",
            "win64",
            "zune",
            "et",
            "netherlands",
            "segoe ui",
            "found content",
            "length",
            "content type",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "error",
            "ip address",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "ip related",
            "pulses none",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "defense evasion",
            "ssl certificate",
            "execution",
            "path",
            "secure",
            "show technique",
            "mitre att",
            "ck matrix",
            "maxage31536000",
            "expirestue",
            "brand",
            "microsoft edge",
            "date",
            "cookie",
            "sha1",
            "ascii text",
            "sha256",
            "pattern match",
            "hybrid",
            "local",
            "click",
            "strings",
            "show process",
            "flag",
            "programfiles",
            "command decode",
            "comspec",
            "model",
            "general",
            "starfield",
            "encrypt",
            "iframe",
            "development att",
            "backdoor",
            "win32",
            "reverse dns",
            "location india",
            "india asn",
            "trojan",
            "mtb win32"
          ],
          "references": [
            "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
            "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
            "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
            "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
            "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
            "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
            "you.are.poor.i.got.trap.money?",
            "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "Romania",
            "South Africa"
          ],
          "malware_families": [
            {
              "id": "BC.Win.Packer.Troll-11",
              "display_name": "BC.Win.Packer.Troll-11",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Crypt3.BOJE",
              "display_name": "Crypt3.BOJE",
              "target": null
            },
            {
              "id": "Crypt3.BXMJ",
              "display_name": "Crypt3.BXMJ",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.OV!MTB",
              "display_name": "Trojan:Win32/Glupteba.OV!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "ProRat",
              "display_name": "ProRat",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Prorat.L",
              "display_name": "Backdoor:Win32/Prorat.L",
              "target": "/malware/Backdoor:Win32/Prorat.L"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "DanaBot",
              "display_name": "DanaBot",
              "target": null
            },
            {
              "id": "Atros3.AHFB",
              "display_name": "Atros3.AHFB",
              "target": null
            },
            {
              "id": "Crypt5.BBYH",
              "display_name": "Crypt5.BBYH",
              "target": null
            },
            {
              "id": "Crypt4.AHSW",
              "display_name": "Crypt4.AHSW",
              "target": null
            },
            {
              "id": "Crypt3.COIZ",
              "display_name": "Crypt3.COIZ",
              "target": null
            },
            {
              "id": "Crypt3.CMTM",
              "display_name": "Crypt3.CMTM",
              "target": null
            },
            {
              "id": "Crypt3.CKTO",
              "display_name": "Crypt3.CKTO",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BXGR",
              "display_name": "Crypt3.BXGR",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BOQD",
              "display_name": "Crypt3.BOQD",
              "target": null
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "Crypt3.BOIU",
              "display_name": "Crypt3.BOIU",
              "target": null
            },
            {
              "id": "Inject2.BHBW",
              "display_name": "Inject2.BHBW",
              "target": null
            },
            {
              "id": "Inject2.BIVE",
              "display_name": "Inject2.BIVE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [
            "Telecommunications",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": "68efee5ba882db423d3bad8f",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10010,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 144,
            "FileHash-SHA256": 2869,
            "domain": 2046,
            "email": 6,
            "hostname": 3705,
            "SSLCertFingerprint": 19
          },
          "indicator_count": 18949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "157 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666d1488316880c73e04054e",
          "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
          "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
          "modified": "2024-07-15T03:03:34.888000",
          "created": "2024-06-15T04:11:52.737000",
          "tags": [
            "server",
            "hostmaster",
            "amazon legal",
            "dept",
            "amazon",
            "street",
            "stateprovince",
            "postal code",
            "view whois",
            "whois record",
            "date",
            "contact",
            "threat roundup",
            "november",
            "march",
            "december",
            "february",
            "october",
            "january",
            "highly targeted",
            "data",
            "boost mobile",
            "formbook",
            "response final",
            "url https",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ord52c2 via",
            "cloudfront",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "unknown",
            "embeddedwb",
            "windows",
            "search",
            "medium",
            "united",
            "show",
            "whitelisted",
            "shellexecuteexw",
            "msie",
            "tofsee",
            "service",
            "write",
            "win32",
            "malware",
            "copy",
            "a nxdomain",
            "passive dns",
            "domain",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "ip related",
            "process32nextw",
            "components",
            "writeconsolew",
            "copy c",
            "delete c",
            "query",
            "useruin",
            "delphi",
            "capture",
            "install",
            "prorat",
            "url http",
            "http",
            "related nids",
            "files location",
            "regsetvalueexa",
            "hx88x89",
            "regbinary",
            "x95xd3xa4",
            "x8dxb7xb7",
            "hx88x9ax1e",
            "mx81xd1r",
            "x92xac",
            "xc2x84",
            "x93xaf",
            "stream",
            "persistence",
            "execution",
            "creation date",
            "entries",
            "as44273 host",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "accept",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "path",
            "pragma",
            "name servers",
            "west domains",
            "hostname",
            "next",
            "asnone germany",
            "as21499 host",
            "singapore",
            "france",
            "object",
            "com cnt",
            "dem fin",
            "found",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "levelblue",
            "open threat",
            "meta",
            "a div",
            "div div",
            "france unknown",
            "ok server",
            "type",
            "seychelles",
            "whitesky",
            "as29182 jsc",
            "showing",
            "as24940 hetzner",
            "moved",
            "expiration date",
            "aaaa",
            "russia",
            "as15169 google",
            "germany",
            "emails",
            "germany unknown",
            "a domains",
            "body doctype",
            "html public",
            "ietfdtd html",
            "finland",
            "asnone iran",
            "iran",
            "td tr",
            "td td",
            "tbody",
            "tr tr",
            "domains",
            "backdoor",
            "apple",
            "radio hacking",
            "voicestram",
            "listening",
            "trojan",
            "twitter",
            "servers",
            "vbs",
            "data center",
            "avg clamav",
            "msdefender sep",
            "vitro mar",
            "Win32:Vitro",
            "target: tsara brashears",
            "target: brashears personal devices",
            "target: whitesky communication network",
            "target: accounting firm devices",
            "targets: intellectual property",
            "redrum",
            "open",
            "tr tbody",
            "rsa ca",
            "apache",
            "as7922 comcast",
            "pulse submit",
            "url analysis",
            "epss",
            "impact",
            "cve cve20178977",
            "exploits",
            "targeted",
            "cve overview",
            "media"
          ],
          "references": [
            "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
            "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
            "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
            "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
            "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
            "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
            "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
            "message.htm.com | Ransomware",
            "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
            "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
            "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
            "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
            "Some items found relates to research exploited against or researched by target: disabled_duck",
            "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
            "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
            "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
            "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
            "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
            "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
            "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
            "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
            "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
            "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
            "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
            "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
            "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
            "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Seychelles",
            "Netherlands",
            "France",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win32:BackdoorX-gen\\ [Trj]",
              "display_name": "Win32:BackdoorX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-6840338-0",
              "display_name": "Win.Trojan.Tofsee-6840338-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dursg.K",
              "display_name": "Trojan:Win32/Dursg.K",
              "target": "/malware/Trojan:Win32/Dursg.K"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-42770",
              "display_name": "Win.Trojan.Downloader-42770",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/Nemucod.QJ",
              "display_name": "TrojanDownloader:JS/Nemucod.QJ",
              "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "Win.Trojan.Magania-13720",
              "display_name": "Win.Trojan.Magania-13720",
              "target": null
            },
            {
              "id": "Win32:Sality",
              "display_name": "Win32:Sality",
              "target": null
            },
            {
              "id": "Win.Trojan.Swisyn-6819",
              "display_name": "Win.Trojan.Swisyn-6819",
              "target": null
            },
            {
              "id": "Win32:SaliCode",
              "display_name": "Win32:SaliCode",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1313630",
              "display_name": "Win.Trojan.Agent-1313630",
              "target": null
            },
            {
              "id": "Crypt_r.BCM",
              "display_name": "Crypt_r.BCM",
              "target": null
            },
            {
              "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [
            "Retail",
            "Technology",
            "Telecommunications",
            "Civil Society",
            "Online Shopping",
            "Legal"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1965,
            "hostname": 1378,
            "domain": 1922,
            "FileHash-SHA256": 2639,
            "FileHash-MD5": 386,
            "FileHash-SHA1": 377,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 8680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "644 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b4624c5bb71879020ceb1c",
          "name": "Spyware | Ransomware | Direct Search Network | Trellian",
          "description": "Large, hard to believe fraudulent threat network. Fraud services from private investigators to attorneys. Social engineering by phone, email, sponsored advertising, malvertizing, remote attacks. tracking, in person, emails, surveys, text, ongoing espionage campaigns, info stealing, cyber attacks, arrange in person meetings , identified as 'gang stalking' by detective, service staging. Very real. Bad actors take advantage of targets devices installing  overlays on windows,android. iOS. Targets can only see what adversary wants seen.\n\nLarge threat network in Colorado and abroad.\nScreenshot: https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://1redirc.com/r2.php\nCouldn't submit 1st pulse. contacted, spyware, phishing,trojan, registrar abuse",
          "modified": "2024-02-26T01:04:33.201000",
          "created": "2024-01-27T01:54:20.513000",
          "tags": [
            "no expiration",
            "expiration",
            "url https",
            "filehashmd5",
            "ipv4",
            "filehashsha1",
            "filehashsha256",
            "domain",
            "url http",
            "iocs",
            "next",
            "hostname",
            "scan endpoints",
            "all scoreblue",
            "pdf report",
            "pcap"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3010,
            "FileHash-MD5": 1902,
            "FileHash-SHA1": 1467,
            "FileHash-SHA256": 2664,
            "domain": 1195,
            "hostname": 1802,
            "email": 27,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 12076,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "784 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b474c9c9bed0cdd00a9480",
          "name": "Spyware | Ransomware | Threat & Direct Search Network | Trellian",
          "description": "",
          "modified": "2024-02-26T01:04:33.201000",
          "created": "2024-01-27T03:13:13.978000",
          "tags": [
            "no expiration",
            "expiration",
            "url https",
            "filehashmd5",
            "ipv4",
            "filehashsha1",
            "filehashsha256",
            "domain",
            "url http",
            "iocs",
            "next",
            "hostname",
            "scan endpoints",
            "all scoreblue",
            "pdf report",
            "pcap"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65b4624c5bb71879020ceb1c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3010,
            "FileHash-MD5": 1902,
            "FileHash-SHA1": 1467,
            "FileHash-SHA256": 2664,
            "domain": 1195,
            "hostname": 1802,
            "email": 27,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 12076,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "784 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b86568e1eaace7d9f062b4",
          "name": "Tags auto populated in original Threat Network pulse missing",
          "description": "",
          "modified": "2024-02-26T01:04:33.201000",
          "created": "2024-01-30T02:56:40.484000",
          "tags": [
            "no expiration",
            "expiration",
            "url https",
            "filehashmd5",
            "ipv4",
            "filehashsha1",
            "filehashsha256",
            "domain",
            "url http",
            "iocs",
            "next",
            "hostname",
            "scan endpoints",
            "all scoreblue",
            "pdf report",
            "pcap"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3010,
            "FileHash-MD5": 1902,
            "FileHash-SHA1": 1467,
            "FileHash-SHA256": 2664,
            "domain": 1195,
            "hostname": 1802,
            "email": 27,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 12076,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "784 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b865697c59050da541247f",
          "name": "Tags auto populated in original Threat Network pulse missing",
          "description": "",
          "modified": "2024-02-26T01:04:33.201000",
          "created": "2024-01-30T02:56:41.045000",
          "tags": [
            "no expiration",
            "expiration",
            "url https",
            "filehashmd5",
            "ipv4",
            "filehashsha1",
            "filehashsha256",
            "domain",
            "url http",
            "iocs",
            "next",
            "hostname",
            "scan endpoints",
            "all scoreblue",
            "pdf report",
            "pcap"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3010,
            "FileHash-MD5": 1902,
            "FileHash-SHA1": 1467,
            "FileHash-SHA256": 2664,
            "domain": 1195,
            "hostname": 1802,
            "email": 27,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 12076,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "784 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709fe5e685939cb8ce7486",
          "name": "Direct Search Network",
          "description": "",
          "modified": "2023-12-06T16:23:01.912000",
          "created": "2023-12-06T16:23:01.912000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1105,
            "domain": 665,
            "FileHash-SHA256": 1203,
            "URL": 2334,
            "FileHash-MD5": 384,
            "FileHash-SHA1": 62,
            "email": 2
          },
          "indicator_count": 5755,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570815337e2ab3d6e93bfe0",
          "name": "Baszas",
          "description": "",
          "modified": "2023-12-06T14:12:35.931000",
          "created": "2023-12-06T14:12:35.931000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 200,
            "FileHash-SHA256": 405,
            "domain": 132,
            "URL": 513,
            "FileHash-MD5": 154,
            "FileHash-SHA1": 150,
            "email": 2
          },
          "indicator_count": 1556,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dac57e96082bfaec2f2334",
          "name": "Direct Search Network",
          "description": "Direct Search Network - Direct Navigation Traffic\nBat Downloader, Riskware, Malware, Ransomware, AdWare spam, Bots\nMalicious Host\n\nTags:\ncve-2007-0774\ncve-2011-5007\ncve-2009-1122\nbobsoft\ncontains-embedded-js\ncontains-elf\nnsis\ncve-1999-0016\narmadillo\nattachment\ncve-2020-11899\ncve-2016-2211\ncontains-pe\ncve-2010-3281",
          "modified": "2023-09-14T15:04:53.181000",
          "created": "2023-08-15T00:23:26.018000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2552,
            "FileHash-SHA256": 2345,
            "domain": 1477,
            "email": 31,
            "URL": 5053,
            "FileHash-MD5": 544,
            "FileHash-SHA1": 79
          },
          "indicator_count": 12081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "949 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "622b365cc87152bdf07a8e59",
          "name": "Baszas",
          "description": "",
          "modified": "2022-03-11T11:45:32.618000",
          "created": "2022-03-11T11:45:32.618000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "ansi",
            "threat level",
            "runtime data",
            "date",
            "data",
            "decrypted ssl",
            "pcap",
            "sha256",
            "pcap processing",
            "size",
            "accept",
            "path",
            "patch",
            "close",
            "voice",
            "hybrid",
            "click",
            "hosts",
            "malicious",
            "general",
            "local",
            "strings",
            "suspicious",
            "indonesia",
            "http://ftp.tandberg.com/pub/software/endpoints/movi/movi4/S85000"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/82acad655176148d8d8e73df6892400f1363c648b1ab7d85a2ca81e47636eb32/606310c6f208f8755f6156cd",
            "http://ftp.tandberg.com/pub/software/endpoints/movi/movi4/S85000MCX4_2_0_10318.zi",
            "Bad Trackers",
            "CNAME"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1052.001",
              "name": "Exfiltration over USB",
              "display_name": "T1052.001 - Exfiltration over USB"
            },
            {
              "id": "T1052",
              "name": "Exfiltration Over Physical Medium",
              "display_name": "T1052 - Exfiltration Over Physical Medium"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "60644772ad65e92e7489a2ec",
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "aaduo00.",
            "id": "184573",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 513,
            "hostname": 200,
            "domain": 132,
            "FileHash-SHA256": 405,
            "email": 2,
            "FileHash-MD5": 154,
            "FileHash-SHA1": 150
          },
          "indicator_count": 1556,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 9,
          "modified_text": "1501 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "CNAME",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "http://ftp.tandberg.com/pub/software/endpoints/movi/movi4/S85000MCX4_2_0_10318.zi",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882",
        "https://hybrid-analysis.com/sample/82acad655176148d8d8e73df6892400f1363c648b1ab7d85a2ca81e47636eb32/606310c6f208f8755f6156cd",
        "you.are.poor.i.got.trap.money?",
        "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "Bad Trackers",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "message.htm.com | Ransomware",
        "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Crypt5.bbyh",
            "Win32:trojan-gen",
            "Inject2.bhbw",
            "Alf:exploit:o97m/cve-2017-8977",
            "Win.trojan.swisyn-6819",
            "Crypt3.boqd",
            "Crypt3.bxgr",
            "Alf:aggr:exploit:o97m/cve-2017-11882",
            "Win32:sality",
            "Crypt3.blxp",
            "Crypt3.boiu",
            "Crypt3.bxvc",
            "Win32:trojan",
            "Trojandownloader:js/nemucod.qj",
            "Crypt3.coiz",
            "Backdoor:win32/tofsee.t",
            "Win.trojan.downloader-42770",
            "Win32:salicode",
            "Win.trojan.magania-13720",
            "Win32:malware-gen",
            "Trojan:win32/dursg.k",
            "Win.trojan.tofsee-6840338-0",
            "Et",
            "Win.packer.pkr_ce1a-9980177-0",
            "Atros3.ahfb",
            "Danabot",
            "Inject2.bive",
            "Win32:backdoorx-gen\\ [trj]",
            "Crypt3.cmtm",
            "Bc.win.packer.troll-11",
            "Win.trojan.agent-1313630",
            "Crypt4.ahsw",
            "Win32:kamso",
            "Crypt_r.bcm",
            "Crypt3.bxmj",
            "Trojan:win32/glupteba.ov!mtb",
            "Crypt3.ckto",
            "Crypt3.boje",
            "Tofsee",
            "Backdoor:win32/prorat.l",
            "Prorat"
          ],
          "industries": [
            "Technology",
            "Retail",
            "Civil society",
            "Insurance",
            "Legal",
            "Online shopping",
            "Telecommunications"
          ],
          "unique_indicators": 42323
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/skygo.com",
    "whois": "http://whois.domaintools.com/skygo.com",
    "domain": "skygo.com",
    "hostname": "de.skygo.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 12,
  "pulses": [
    {
      "id": "68efedf37890e1b32d60eb55",
      "name": "Assurant Insurance \u2022 Injection, Crypt , ProRat , Tofsee and a version Mirai affecting Assurant , T-Mobile & me",
      "description": "Injection, Crypt , ProRat , Tofsee and a version Mirai affecting Assurant and T-Mobile and me. There is truth to the tip I received. This is the 3rd time all of my networks went down , even my phone disconnected and phone number changed temporarily. \n\nJosh T found again. Online profile possibly staged. Stated he is a gamer , self trained in Lua, , CS major in Canada. He is a malicious hacker and streamer and probably an entity. Eric _E iCloud related. Found DoD & Mil hackers related. I haven\u2019t taken the time to authenticate.. Very malicious and talented hackers attacking. I can\u2019t ignore the .mil and DoD items that populated in previous pulses. \n \n[OTX Auto Populated-Trojan-gen-Glupteba, Danabot, Prorat, and other names have been identified as the names of those affected by the latest cyber-attack on the internet.]",
      "modified": "2025-11-14T17:02:12.746000",
      "created": "2025-10-15T18:54:43.205000",
      "tags": [
        "ipv4",
        "email abuse",
        "email info",
        "active related",
        "passive dns",
        "files related",
        "related tags",
        "none google",
        "external",
        "present aug",
        "present sep",
        "present jun",
        "present jul",
        "present oct",
        "ipv4 https",
        "crosscountry",
        "mortgagefamily",
        "port",
        "read c",
        "destination",
        "high",
        "intel",
        "ms windows",
        "stream",
        "explorer",
        "write",
        "malware",
        "united",
        "asnone",
        "et trojan",
        "windows nt",
        "suspicious",
        "win64",
        "zune",
        "et",
        "netherlands",
        "segoe ui",
        "found content",
        "length",
        "content type",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "error",
        "ip address",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "ip related",
        "pulses none",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "defense evasion",
        "ssl certificate",
        "execution",
        "path",
        "secure",
        "show technique",
        "mitre att",
        "ck matrix",
        "maxage31536000",
        "expirestue",
        "brand",
        "microsoft edge",
        "date",
        "cookie",
        "sha1",
        "ascii text",
        "sha256",
        "pattern match",
        "hybrid",
        "local",
        "click",
        "strings",
        "show process",
        "flag",
        "programfiles",
        "command decode",
        "comspec",
        "model",
        "general",
        "starfield",
        "encrypt",
        "iframe",
        "development att",
        "backdoor",
        "win32",
        "reverse dns",
        "location india",
        "india asn",
        "trojan",
        "mtb win32"
      ],
      "references": [
        "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
        "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
        "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
        "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
        "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
        "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
        "you.are.poor.i.got.trap.money?",
        "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "Romania",
        "South Africa"
      ],
      "malware_families": [
        {
          "id": "BC.Win.Packer.Troll-11",
          "display_name": "BC.Win.Packer.Troll-11",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Crypt3.BOJE",
          "display_name": "Crypt3.BOJE",
          "target": null
        },
        {
          "id": "Crypt3.BXMJ",
          "display_name": "Crypt3.BXMJ",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.OV!MTB",
          "display_name": "Trojan:Win32/Glupteba.OV!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "ProRat",
          "display_name": "ProRat",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Prorat.L",
          "display_name": "Backdoor:Win32/Prorat.L",
          "target": "/malware/Backdoor:Win32/Prorat.L"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "DanaBot",
          "display_name": "DanaBot",
          "target": null
        },
        {
          "id": "Atros3.AHFB",
          "display_name": "Atros3.AHFB",
          "target": null
        },
        {
          "id": "Crypt5.BBYH",
          "display_name": "Crypt5.BBYH",
          "target": null
        },
        {
          "id": "Crypt4.AHSW",
          "display_name": "Crypt4.AHSW",
          "target": null
        },
        {
          "id": "Crypt3.COIZ",
          "display_name": "Crypt3.COIZ",
          "target": null
        },
        {
          "id": "Crypt3.CMTM",
          "display_name": "Crypt3.CMTM",
          "target": null
        },
        {
          "id": "Crypt3.CKTO",
          "display_name": "Crypt3.CKTO",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BXGR",
          "display_name": "Crypt3.BXGR",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BOQD",
          "display_name": "Crypt3.BOQD",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        },
        {
          "id": "Crypt3.BOIU",
          "display_name": "Crypt3.BOIU",
          "target": null
        },
        {
          "id": "Inject2.BHBW",
          "display_name": "Inject2.BHBW",
          "target": null
        },
        {
          "id": "Inject2.BIVE",
          "display_name": "Inject2.BIVE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [
        "Telecommunications",
        "Insurance"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10010,
        "FileHash-MD5": 150,
        "FileHash-SHA1": 144,
        "FileHash-SHA256": 2869,
        "domain": 2046,
        "email": 6,
        "hostname": 3705,
        "SSLCertFingerprint": 19
      },
      "indicator_count": 18949,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68efee5ba882db423d3bad8f",
      "name": "Assurant & T-Mobile BLYP Checkin ET MALWARE TROJAN  \u2022 Kryptic",
      "description": "",
      "modified": "2025-11-14T17:02:12.746000",
      "created": "2025-10-15T18:56:27.950000",
      "tags": [
        "ipv4",
        "email abuse",
        "email info",
        "active related",
        "passive dns",
        "files related",
        "related tags",
        "none google",
        "external",
        "present aug",
        "present sep",
        "present jun",
        "present jul",
        "present oct",
        "ipv4 https",
        "crosscountry",
        "mortgagefamily",
        "port",
        "read c",
        "destination",
        "high",
        "intel",
        "ms windows",
        "stream",
        "explorer",
        "write",
        "malware",
        "united",
        "asnone",
        "et trojan",
        "windows nt",
        "suspicious",
        "win64",
        "zune",
        "et",
        "netherlands",
        "segoe ui",
        "found content",
        "length",
        "content type",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "error",
        "ip address",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "ip related",
        "pulses none",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "defense evasion",
        "ssl certificate",
        "execution",
        "path",
        "secure",
        "show technique",
        "mitre att",
        "ck matrix",
        "maxage31536000",
        "expirestue",
        "brand",
        "microsoft edge",
        "date",
        "cookie",
        "sha1",
        "ascii text",
        "sha256",
        "pattern match",
        "hybrid",
        "local",
        "click",
        "strings",
        "show process",
        "flag",
        "programfiles",
        "command decode",
        "comspec",
        "model",
        "general",
        "starfield",
        "encrypt",
        "iframe",
        "development att",
        "backdoor",
        "win32",
        "reverse dns",
        "location india",
        "india asn",
        "trojan",
        "mtb win32"
      ],
      "references": [
        "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
        "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
        "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
        "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
        "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
        "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
        "you.are.poor.i.got.trap.money?",
        "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "Romania",
        "South Africa"
      ],
      "malware_families": [
        {
          "id": "BC.Win.Packer.Troll-11",
          "display_name": "BC.Win.Packer.Troll-11",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Crypt3.BOJE",
          "display_name": "Crypt3.BOJE",
          "target": null
        },
        {
          "id": "Crypt3.BXMJ",
          "display_name": "Crypt3.BXMJ",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.OV!MTB",
          "display_name": "Trojan:Win32/Glupteba.OV!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "ProRat",
          "display_name": "ProRat",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Prorat.L",
          "display_name": "Backdoor:Win32/Prorat.L",
          "target": "/malware/Backdoor:Win32/Prorat.L"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "DanaBot",
          "display_name": "DanaBot",
          "target": null
        },
        {
          "id": "Atros3.AHFB",
          "display_name": "Atros3.AHFB",
          "target": null
        },
        {
          "id": "Crypt5.BBYH",
          "display_name": "Crypt5.BBYH",
          "target": null
        },
        {
          "id": "Crypt4.AHSW",
          "display_name": "Crypt4.AHSW",
          "target": null
        },
        {
          "id": "Crypt3.COIZ",
          "display_name": "Crypt3.COIZ",
          "target": null
        },
        {
          "id": "Crypt3.CMTM",
          "display_name": "Crypt3.CMTM",
          "target": null
        },
        {
          "id": "Crypt3.CKTO",
          "display_name": "Crypt3.CKTO",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BXGR",
          "display_name": "Crypt3.BXGR",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BOQD",
          "display_name": "Crypt3.BOQD",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        },
        {
          "id": "Crypt3.BOIU",
          "display_name": "Crypt3.BOIU",
          "target": null
        },
        {
          "id": "Inject2.BHBW",
          "display_name": "Inject2.BHBW",
          "target": null
        },
        {
          "id": "Inject2.BIVE",
          "display_name": "Inject2.BIVE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [
        "Telecommunications",
        "Insurance"
      ],
      "TLP": "white",
      "cloned_from": "68efedf37890e1b32d60eb55",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10010,
        "FileHash-MD5": 150,
        "FileHash-SHA1": 144,
        "FileHash-SHA256": 2869,
        "domain": 2046,
        "email": 6,
        "hostname": 3705,
        "SSLCertFingerprint": 19
      },
      "indicator_count": 18949,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68eff0848071708f9ee0c0bd",
      "name": "Gamarue \u2022 G3nasom\u2022 Simda\u2022 Ganelp affecting Assurant and T-Mobile Part 3",
      "description": "",
      "modified": "2025-11-14T17:02:12.746000",
      "created": "2025-10-15T19:05:40.466000",
      "tags": [
        "ipv4",
        "email abuse",
        "email info",
        "active related",
        "passive dns",
        "files related",
        "related tags",
        "none google",
        "external",
        "present aug",
        "present sep",
        "present jun",
        "present jul",
        "present oct",
        "ipv4 https",
        "crosscountry",
        "mortgagefamily",
        "port",
        "read c",
        "destination",
        "high",
        "intel",
        "ms windows",
        "stream",
        "explorer",
        "write",
        "malware",
        "united",
        "asnone",
        "et trojan",
        "windows nt",
        "suspicious",
        "win64",
        "zune",
        "et",
        "netherlands",
        "segoe ui",
        "found content",
        "length",
        "content type",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "error",
        "ip address",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "ip related",
        "pulses none",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "defense evasion",
        "ssl certificate",
        "execution",
        "path",
        "secure",
        "show technique",
        "mitre att",
        "ck matrix",
        "maxage31536000",
        "expirestue",
        "brand",
        "microsoft edge",
        "date",
        "cookie",
        "sha1",
        "ascii text",
        "sha256",
        "pattern match",
        "hybrid",
        "local",
        "click",
        "strings",
        "show process",
        "flag",
        "programfiles",
        "command decode",
        "comspec",
        "model",
        "general",
        "starfield",
        "encrypt",
        "iframe",
        "development att",
        "backdoor",
        "win32",
        "reverse dns",
        "location india",
        "india asn",
        "trojan",
        "mtb win32"
      ],
      "references": [
        "Assurant \u2022 https://otx.alienvault.com/indicator/domain/assurant.com",
        "20.50.2.51 \u2022 https://hybrid-analysis.com/sample/903834f3326ee0dccde4c134fd51799ea728e7200e6b1d699a0500e6de276f79/68efd2a168a5e234250286cf",
        "Crypt3.BOJE \u2022 https://otx.alienvault.com/indicator/file/b7a2657fc02c6dea2c4f99c80c6a938d3b6b2b76767d27ff837276ca46851984",
        "p2d.josht.ca \u2022 test.josht.ca \u2022 josht.ca \u2022 dev.josht.ca \u2022 pma.josht.ca \u2022 staging.josht.ca \u2022 http://dev.josht.ca/",
        "http://josht.ca/portfolio/ \u2022 https://sa.josht.ca/ \u2022 https://test.josht.ca/ \u2022 https://p2d.josht.ca/api/depots/info/?depot=",
        "http://p2d.josht.ca/ \u2022 http://p2d.josht.ca/assets/content-delivery/depots/download/",
        "you.are.poor.i.got.trap.money?",
        "Assurant \u2022 BC.Win.Packer.Troll-11 \u2022 https://otx.alienvault.com/indicator/domain/assurant.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "Romania",
        "South Africa"
      ],
      "malware_families": [
        {
          "id": "BC.Win.Packer.Troll-11",
          "display_name": "BC.Win.Packer.Troll-11",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Crypt3.BOJE",
          "display_name": "Crypt3.BOJE",
          "target": null
        },
        {
          "id": "Crypt3.BXMJ",
          "display_name": "Crypt3.BXMJ",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.OV!MTB",
          "display_name": "Trojan:Win32/Glupteba.OV!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.OV!MTB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "ProRat",
          "display_name": "ProRat",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Prorat.L",
          "display_name": "Backdoor:Win32/Prorat.L",
          "target": "/malware/Backdoor:Win32/Prorat.L"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "DanaBot",
          "display_name": "DanaBot",
          "target": null
        },
        {
          "id": "Atros3.AHFB",
          "display_name": "Atros3.AHFB",
          "target": null
        },
        {
          "id": "Crypt5.BBYH",
          "display_name": "Crypt5.BBYH",
          "target": null
        },
        {
          "id": "Crypt4.AHSW",
          "display_name": "Crypt4.AHSW",
          "target": null
        },
        {
          "id": "Crypt3.COIZ",
          "display_name": "Crypt3.COIZ",
          "target": null
        },
        {
          "id": "Crypt3.CMTM",
          "display_name": "Crypt3.CMTM",
          "target": null
        },
        {
          "id": "Crypt3.CKTO",
          "display_name": "Crypt3.CKTO",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BXGR",
          "display_name": "Crypt3.BXGR",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Crypt3.BOQD",
          "display_name": "Crypt3.BOQD",
          "target": null
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        },
        {
          "id": "Crypt3.BOIU",
          "display_name": "Crypt3.BOIU",
          "target": null
        },
        {
          "id": "Inject2.BHBW",
          "display_name": "Inject2.BHBW",
          "target": null
        },
        {
          "id": "Inject2.BIVE",
          "display_name": "Inject2.BIVE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [
        "Telecommunications",
        "Insurance"
      ],
      "TLP": "white",
      "cloned_from": "68efee5ba882db423d3bad8f",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10010,
        "FileHash-MD5": 150,
        "FileHash-SHA1": 144,
        "FileHash-SHA256": 2869,
        "domain": 2046,
        "email": 6,
        "hostname": 3705,
        "SSLCertFingerprint": 19
      },
      "indicator_count": 18949,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "157 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "666d1488316880c73e04054e",
      "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
      "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
      "modified": "2024-07-15T03:03:34.888000",
      "created": "2024-06-15T04:11:52.737000",
      "tags": [
        "server",
        "hostmaster",
        "amazon legal",
        "dept",
        "amazon",
        "street",
        "stateprovince",
        "postal code",
        "view whois",
        "whois record",
        "date",
        "contact",
        "threat roundup",
        "november",
        "march",
        "december",
        "february",
        "october",
        "january",
        "highly targeted",
        "data",
        "boost mobile",
        "formbook",
        "response final",
        "url https",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "ord52c2 via",
        "cloudfront",
        "sha1",
        "pattern match",
        "ascii text",
        "document file",
        "v2 document",
        "crlf line",
        "size",
        "unicode",
        "beginstring",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "unknown",
        "embeddedwb",
        "windows",
        "search",
        "medium",
        "united",
        "show",
        "whitelisted",
        "shellexecuteexw",
        "msie",
        "tofsee",
        "service",
        "write",
        "win32",
        "malware",
        "copy",
        "a nxdomain",
        "passive dns",
        "domain",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "ip related",
        "process32nextw",
        "components",
        "writeconsolew",
        "copy c",
        "delete c",
        "query",
        "useruin",
        "delphi",
        "capture",
        "install",
        "prorat",
        "url http",
        "http",
        "related nids",
        "files location",
        "regsetvalueexa",
        "hx88x89",
        "regbinary",
        "x95xd3xa4",
        "x8dxb7xb7",
        "hx88x9ax1e",
        "mx81xd1r",
        "x92xac",
        "xc2x84",
        "x93xaf",
        "stream",
        "persistence",
        "execution",
        "creation date",
        "entries",
        "as44273 host",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "accept",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "ipv4",
        "path",
        "pragma",
        "name servers",
        "west domains",
        "hostname",
        "next",
        "asnone germany",
        "as21499 host",
        "singapore",
        "france",
        "object",
        "com cnt",
        "dem fin",
        "found",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "levelblue",
        "open threat",
        "meta",
        "a div",
        "div div",
        "france unknown",
        "ok server",
        "type",
        "seychelles",
        "whitesky",
        "as29182 jsc",
        "showing",
        "as24940 hetzner",
        "moved",
        "expiration date",
        "aaaa",
        "russia",
        "as15169 google",
        "germany",
        "emails",
        "germany unknown",
        "a domains",
        "body doctype",
        "html public",
        "ietfdtd html",
        "finland",
        "asnone iran",
        "iran",
        "td tr",
        "td td",
        "tbody",
        "tr tr",
        "domains",
        "backdoor",
        "apple",
        "radio hacking",
        "voicestram",
        "listening",
        "trojan",
        "twitter",
        "servers",
        "vbs",
        "data center",
        "avg clamav",
        "msdefender sep",
        "vitro mar",
        "Win32:Vitro",
        "target: tsara brashears",
        "target: brashears personal devices",
        "target: whitesky communication network",
        "target: accounting firm devices",
        "targets: intellectual property",
        "redrum",
        "open",
        "tr tbody",
        "rsa ca",
        "apache",
        "as7922 comcast",
        "pulse submit",
        "url analysis",
        "epss",
        "impact",
        "cve cve20178977",
        "exploits",
        "targeted",
        "cve overview",
        "media"
      ],
      "references": [
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "message.htm.com | Ransomware",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Seychelles",
        "Netherlands",
        "France",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win32:BackdoorX-gen\\ [Trj]",
          "display_name": "Win32:BackdoorX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-6840338-0",
          "display_name": "Win.Trojan.Tofsee-6840338-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Dursg.K",
          "display_name": "Trojan:Win32/Dursg.K",
          "target": "/malware/Trojan:Win32/Dursg.K"
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Downloader-42770",
          "display_name": "Win.Trojan.Downloader-42770",
          "target": null
        },
        {
          "id": "TrojanDownloader:JS/Nemucod.QJ",
          "display_name": "TrojanDownloader:JS/Nemucod.QJ",
          "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "Win.Trojan.Magania-13720",
          "display_name": "Win.Trojan.Magania-13720",
          "target": null
        },
        {
          "id": "Win32:Sality",
          "display_name": "Win32:Sality",
          "target": null
        },
        {
          "id": "Win.Trojan.Swisyn-6819",
          "display_name": "Win.Trojan.Swisyn-6819",
          "target": null
        },
        {
          "id": "Win32:SaliCode",
          "display_name": "Win32:SaliCode",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-1313630",
          "display_name": "Win.Trojan.Agent-1313630",
          "target": null
        },
        {
          "id": "Crypt_r.BCM",
          "display_name": "Crypt_r.BCM",
          "target": null
        },
        {
          "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1416",
          "name": "URI Hijacking",
          "display_name": "T1416 - URI Hijacking"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1003.005",
          "name": "Cached Domain Credentials",
          "display_name": "T1003.005 - Cached Domain Credentials"
        },
        {
          "id": "T1212",
          "name": "Exploitation for Credential Access",
          "display_name": "T1212 - Exploitation for Credential Access"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        }
      ],
      "industries": [
        "Retail",
        "Technology",
        "Telecommunications",
        "Civil Society",
        "Online Shopping",
        "Legal"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1965,
        "hostname": 1378,
        "domain": 1922,
        "FileHash-SHA256": 2639,
        "FileHash-MD5": 386,
        "FileHash-SHA1": 377,
        "email": 11,
        "CVE": 2
      },
      "indicator_count": 8680,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "644 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b4624c5bb71879020ceb1c",
      "name": "Spyware | Ransomware | Direct Search Network | Trellian",
      "description": "Large, hard to believe fraudulent threat network. Fraud services from private investigators to attorneys. Social engineering by phone, email, sponsored advertising, malvertizing, remote attacks. tracking, in person, emails, surveys, text, ongoing espionage campaigns, info stealing, cyber attacks, arrange in person meetings , identified as 'gang stalking' by detective, service staging. Very real. Bad actors take advantage of targets devices installing  overlays on windows,android. iOS. Targets can only see what adversary wants seen.\n\nLarge threat network in Colorado and abroad.\nScreenshot: https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://1redirc.com/r2.php\nCouldn't submit 1st pulse. contacted, spyware, phishing,trojan, registrar abuse",
      "modified": "2024-02-26T01:04:33.201000",
      "created": "2024-01-27T01:54:20.513000",
      "tags": [
        "no expiration",
        "expiration",
        "url https",
        "filehashmd5",
        "ipv4",
        "filehashsha1",
        "filehashsha256",
        "domain",
        "url http",
        "iocs",
        "next",
        "hostname",
        "scan endpoints",
        "all scoreblue",
        "pdf report",
        "pcap"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3010,
        "FileHash-MD5": 1902,
        "FileHash-SHA1": 1467,
        "FileHash-SHA256": 2664,
        "domain": 1195,
        "hostname": 1802,
        "email": 27,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 12076,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "784 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b474c9c9bed0cdd00a9480",
      "name": "Spyware | Ransomware | Threat & Direct Search Network | Trellian",
      "description": "",
      "modified": "2024-02-26T01:04:33.201000",
      "created": "2024-01-27T03:13:13.978000",
      "tags": [
        "no expiration",
        "expiration",
        "url https",
        "filehashmd5",
        "ipv4",
        "filehashsha1",
        "filehashsha256",
        "domain",
        "url http",
        "iocs",
        "next",
        "hostname",
        "scan endpoints",
        "all scoreblue",
        "pdf report",
        "pcap"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65b4624c5bb71879020ceb1c",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3010,
        "FileHash-MD5": 1902,
        "FileHash-SHA1": 1467,
        "FileHash-SHA256": 2664,
        "domain": 1195,
        "hostname": 1802,
        "email": 27,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 12076,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "784 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b86568e1eaace7d9f062b4",
      "name": "Tags auto populated in original Threat Network pulse missing",
      "description": "",
      "modified": "2024-02-26T01:04:33.201000",
      "created": "2024-01-30T02:56:40.484000",
      "tags": [
        "no expiration",
        "expiration",
        "url https",
        "filehashmd5",
        "ipv4",
        "filehashsha1",
        "filehashsha256",
        "domain",
        "url http",
        "iocs",
        "next",
        "hostname",
        "scan endpoints",
        "all scoreblue",
        "pdf report",
        "pcap"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3010,
        "FileHash-MD5": 1902,
        "FileHash-SHA1": 1467,
        "FileHash-SHA256": 2664,
        "domain": 1195,
        "hostname": 1802,
        "email": 27,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 12076,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "784 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b865697c59050da541247f",
      "name": "Tags auto populated in original Threat Network pulse missing",
      "description": "",
      "modified": "2024-02-26T01:04:33.201000",
      "created": "2024-01-30T02:56:41.045000",
      "tags": [
        "no expiration",
        "expiration",
        "url https",
        "filehashmd5",
        "ipv4",
        "filehashsha1",
        "filehashsha256",
        "domain",
        "url http",
        "iocs",
        "next",
        "hostname",
        "scan endpoints",
        "all scoreblue",
        "pdf report",
        "pcap"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3010,
        "FileHash-MD5": 1902,
        "FileHash-SHA1": 1467,
        "FileHash-SHA256": 2664,
        "domain": 1195,
        "hostname": 1802,
        "email": 27,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 12076,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "784 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709fe5e685939cb8ce7486",
      "name": "Direct Search Network",
      "description": "",
      "modified": "2023-12-06T16:23:01.912000",
      "created": "2023-12-06T16:23:01.912000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1105,
        "domain": 665,
        "FileHash-SHA256": 1203,
        "URL": 2334,
        "FileHash-MD5": 384,
        "FileHash-SHA1": 62,
        "email": 2
      },
      "indicator_count": 5755,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570815337e2ab3d6e93bfe0",
      "name": "Baszas",
      "description": "",
      "modified": "2023-12-06T14:12:35.931000",
      "created": "2023-12-06T14:12:35.931000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 200,
        "FileHash-SHA256": 405,
        "domain": 132,
        "URL": 513,
        "FileHash-MD5": 154,
        "FileHash-SHA1": 150,
        "email": 2
      },
      "indicator_count": 1556,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://de.skygo.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://de.skygo.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776713569.8060703
}