{
  "type": "URL",
  "indicator": "https://dev.114onca.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://dev.114onca.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4130216062,
      "indicator": "https://dev.114onca.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "68cd76f1888c22a2e105e524",
          "name": "Sign in - Google Accounts | Ransomware G3nasom",
          "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
          "modified": "2025-10-19T14:00:01.535000",
          "created": "2025-09-19T15:29:53.126000",
          "tags": [
            "sign",
            "google account",
            "email",
            "forgot email",
            "private window",
            "learn",
            "guest mode",
            "next create",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "owotrus ca",
            "limited",
            "server ca",
            "python",
            "write",
            "trojan",
            "guard",
            "win64",
            "accept",
            "updater",
            "launcher",
            "malware",
            "contacted",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "passive dns",
            "google trust",
            "ip address",
            "related nids",
            "united",
            "url http",
            "present aug",
            "present sep",
            "present jul",
            "unknown aaaa",
            "domain",
            "title",
            "body",
            "trojandropper",
            "mtb sep",
            "meta",
            "next associated",
            "win32upatre sep",
            "backdoor",
            "ipv4",
            "moved",
            "ddos",
            "data upload",
            "extraction",
            "iocs",
            "failed",
            "source url",
            "indicato",
            "mat my",
            "data",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "found",
            "command",
            "initial access",
            "spawns",
            "chrome",
            "gmt content",
            "avast avg",
            "next http",
            "ascii text",
            "size",
            "pattern match",
            "mitre att",
            "error",
            "null",
            "android",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "trident",
            "write c",
            "medium",
            "search",
            "show",
            "high",
            "push",
            "service",
            "ms defender",
            "files matching",
            "number",
            "hide samples",
            "date hash",
            "next yara",
            "emotet",
            "g3nasom",
            "entries",
            "alerts show",
            "ck technique",
            "technique id",
            "io control",
            "anomalous",
            "geofencing",
            "sha256 add",
            "pulse pulses",
            "copy"
          ],
          "references": [
            "http://accounts.google.com/v3/signin/identifier",
            "Yara Detection: Cabinet _Archive",
            "Banking Malware"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/G3nasom",
              "display_name": "ALF:Trojan:Win32/G3nasom",
              "target": null
            },
            {
              "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Backdoor:Win32/Berbew",
              "display_name": "Backdoor:Win32/Berbew",
              "target": "/malware/Backdoor:Win32/Berbew"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.KDS!MTB",
              "display_name": "Trojan:Win32/Emotet.KDS!MTB",
              "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 531,
            "FileHash-SHA256": 1069,
            "URL": 1607,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 187,
            "SSLCertFingerprint": 25,
            "domain": 188,
            "email": 2
          },
          "indicator_count": 3884,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "182 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c62306c74c7f57dc993d13",
          "name": "Predator - Dr. Jeffrey Reimer, DPT - Physical Therapist in Denver, CO | Healthgrades",
          "description": "Malware with code overlap. JSR , DPT Health Grades account has been removed. An investigator claims Reimer & family have been moved, names , career , changes years ago,  claims of government protection for him. After victims MRI JSR left town immediately. Returning in 2016 , coincidentally driving near victim location on various locations. \nIt\u2019s disgusting how technology is being used to cover up a crime instead of solve one.\n#code_overlap #malware #hosts_contacted\n#itstoolatetoapologizeitstoolate",
          "modified": "2025-10-14T01:04:58.605000",
          "created": "2025-09-14T02:05:58.793000",
          "tags": [
            "denver",
            "jeffrey reimer",
            "star rating",
            "appointment",
            "post",
            "response are",
            "listened",
            "wait",
            "reimer",
            "healthgrades",
            "reply flag",
            "doctors",
            "find",
            "jeff",
            "back",
            "aurora",
            "leave",
            "crying",
            "tips",
            "tags na",
            "utc scorecard",
            "research beacon",
            "utc yahoo",
            "dot tags",
            "united",
            "mozilla",
            "write c",
            "nsisinetc",
            "undetermined",
            "medium",
            "intel",
            "ms windows",
            "write",
            "trojan",
            "defender",
            "delphi",
            "win32",
            "malware",
            "win64",
            "local",
            "next",
            "code overlap",
            "dynamicloader",
            "as15169",
            "brazil as28604",
            "brazil as396982",
            "upatre",
            "passive dns",
            "title error",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "body",
            "script script",
            "powder sdk",
            "a domains",
            "title",
            "script",
            "certificate",
            "hostname add",
            "pulse submit",
            "meta",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "signing defense",
            "flag",
            "whois privacy",
            "service name",
            "server",
            "contacted hosts",
            "ip address",
            "process details",
            "size",
            "div id",
            "beginstring",
            "beginerror",
            "null",
            "error",
            "strings",
            "refresh",
            "tools",
            "onload",
            "click",
            "span",
            "remote access"
          ],
          "references": [
            "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler",
            "YARA: Delphi This program must be run under Win32 compilers TrojanWin32Fakemalard Ujhhd",
            "CodeOverlap | All malware listed exists",
            "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "All #tags auto populated.",
            "URL http://virii.es/M/Mobile Malware Attacks and Defense.pdf",
            "blog.manpowergroup.com.py (aww like dadvocates)",
            "https://isexychat.com/chatrooms/teen-chat/with-others/\t (sounds about right)",
            "r53lbr.run-delete-app-sa-east-1-1.run-delete-test-sa-east-1-9zt9rjv.forgeapps.ec2.aws.dev"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
              "display_name": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
              "target": null
            },
            {
              "id": "Win.Malware.Tfuvtcog-7194372-0",
              "display_name": "Win.Malware.Tfuvtcog-7194372-0",
              "target": null
            },
            {
              "id": "Trojan.Win32.Fakemalard",
              "display_name": "Trojan.Win32.Fakemalard",
              "target": null
            },
            {
              "id": "Code Overlap",
              "display_name": "Code Overlap",
              "target": null
            },
            {
              "id": "Trojan.Win32.Banload",
              "display_name": "Trojan.Win32.Banload",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "Medical",
            "Media",
            "Government."
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 609,
            "URL": 1550,
            "domain": 280,
            "FileHash-SHA256": 1428,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 115,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 4119,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c62316b24b23e6d4c579ef",
          "name": "Predator - Dr. Jeffrey Reimer, DPT - Physical Therapist in Denver, CO | Healthgrades",
          "description": "Malware with code overlap. JSR , DPT Health Grades account has been removed. An investigator claims Reimer & family have been moved, names , career , changes years ago,  claims of government protection for him. After victims MRI JSR left town immediately. Returning in 2016 , coincidentally driving near victim location on various locations. \nIt\u2019s disgusting how technology is being used to cover up a crime instead of solve one.\n#code_overlap #malware #hosts_contacted\n#itstoolatetoapologizeitstoolate",
          "modified": "2025-10-14T01:04:58.605000",
          "created": "2025-09-14T02:06:14.853000",
          "tags": [
            "denver",
            "jeffrey reimer",
            "star rating",
            "appointment",
            "post",
            "response are",
            "listened",
            "wait",
            "reimer",
            "healthgrades",
            "reply flag",
            "doctors",
            "find",
            "jeff",
            "back",
            "aurora",
            "leave",
            "crying",
            "tips",
            "tags na",
            "utc scorecard",
            "research beacon",
            "utc yahoo",
            "dot tags",
            "united",
            "mozilla",
            "write c",
            "nsisinetc",
            "undetermined",
            "medium",
            "intel",
            "ms windows",
            "write",
            "trojan",
            "defender",
            "delphi",
            "win32",
            "malware",
            "win64",
            "local",
            "next",
            "code overlap",
            "dynamicloader",
            "as15169",
            "brazil as28604",
            "brazil as396982",
            "upatre",
            "passive dns",
            "title error",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "body",
            "script script",
            "powder sdk",
            "a domains",
            "title",
            "script",
            "certificate",
            "hostname add",
            "pulse submit",
            "meta",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "signing defense",
            "flag",
            "whois privacy",
            "service name",
            "server",
            "contacted hosts",
            "ip address",
            "process details",
            "size",
            "div id",
            "beginstring",
            "beginerror",
            "null",
            "error",
            "strings",
            "refresh",
            "tools",
            "onload",
            "click",
            "span",
            "remote access"
          ],
          "references": [
            "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler",
            "YARA: Delphi This program must be run under Win32 compilers TrojanWin32Fakemalard Ujhhd",
            "CodeOverlap | All malware listed exists",
            "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "All #tags auto populated.",
            "URL http://virii.es/M/Mobile Malware Attacks and Defense.pdf",
            "blog.manpowergroup.com.py (aww like dadvocates)",
            "https://isexychat.com/chatrooms/teen-chat/with-others/\t (sounds about right)",
            "r53lbr.run-delete-app-sa-east-1-1.run-delete-test-sa-east-1-9zt9rjv.forgeapps.ec2.aws.dev"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
              "display_name": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
              "target": null
            },
            {
              "id": "Win.Malware.Tfuvtcog-7194372-0",
              "display_name": "Win.Malware.Tfuvtcog-7194372-0",
              "target": null
            },
            {
              "id": "Trojan.Win32.Fakemalard",
              "display_name": "Trojan.Win32.Fakemalard",
              "target": null
            },
            {
              "id": "Code Overlap",
              "display_name": "Code Overlap",
              "target": null
            },
            {
              "id": "Trojan.Win32.Banload",
              "display_name": "Trojan.Win32.Banload",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Too much to search for",
              "display_name": "Too much to search for",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "Medical",
            "Media",
            "Government."
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 609,
            "URL": 1550,
            "domain": 280,
            "FileHash-SHA256": 1428,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 115,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 4119,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://isexychat.com/chatrooms/teen-chat/with-others/\t (sounds about right)",
        "http://accounts.google.com/v3/signin/identifier",
        "blog.manpowergroup.com.py (aww like dadvocates)",
        "r53lbr.run-delete-app-sa-east-1-1.run-delete-test-sa-east-1-9zt9rjv.forgeapps.ec2.aws.dev",
        "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler",
        "Yara Detection: Cabinet _Archive",
        "CodeOverlap | All malware listed exists",
        "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "All #tags auto populated.",
        "Banking Malware",
        "YARA: Delphi This program must be run under Win32 compilers TrojanWin32Fakemalard Ujhhd",
        "URL http://virii.es/M/Mobile Malware Attacks and Defense.pdf"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Formbook",
            "Alf:trojan:win32/g3nasom",
            "Backdoor:win32/berbew",
            "Win.trojan.barys-10005825-0",
            "Trojan.win32.fakemalard",
            "Trojan:win32/emotet.kds!mtb",
            "Too much to search for",
            "Upatre",
            "Win.ransomware.gandcrab-10044141-0\t(renamed g3nasom)",
            "Emotet",
            "Win.malware.tfuvtcog-7194372-0",
            "Code overlap",
            "Trojan.win32.banload",
            "Trojandropper:win32/muldrop.v!mtb",
            "Malware",
            "#lowfi:aggregator:hasknownadwaredomain_nsisbundler."
          ],
          "industries": [
            "Media",
            "Medical",
            "Government."
          ],
          "unique_indicators": 7901
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/114onca.com",
    "whois": "http://whois.domaintools.com/114onca.com",
    "domain": "114onca.com",
    "hostname": "dev.114onca.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "68cd76f1888c22a2e105e524",
      "name": "Sign in - Google Accounts | Ransomware G3nasom",
      "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
      "modified": "2025-10-19T14:00:01.535000",
      "created": "2025-09-19T15:29:53.126000",
      "tags": [
        "sign",
        "google account",
        "email",
        "forgot email",
        "private window",
        "learn",
        "guest mode",
        "next create",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "owotrus ca",
        "limited",
        "server ca",
        "python",
        "write",
        "trojan",
        "guard",
        "win64",
        "accept",
        "updater",
        "launcher",
        "malware",
        "contacted",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "passive dns",
        "google trust",
        "ip address",
        "related nids",
        "united",
        "url http",
        "present aug",
        "present sep",
        "present jul",
        "unknown aaaa",
        "domain",
        "title",
        "body",
        "trojandropper",
        "mtb sep",
        "meta",
        "next associated",
        "win32upatre sep",
        "backdoor",
        "ipv4",
        "moved",
        "ddos",
        "data upload",
        "extraction",
        "iocs",
        "failed",
        "source url",
        "indicato",
        "mat my",
        "data",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "found",
        "command",
        "initial access",
        "spawns",
        "chrome",
        "gmt content",
        "avast avg",
        "next http",
        "ascii text",
        "size",
        "pattern match",
        "mitre att",
        "error",
        "null",
        "android",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "trident",
        "write c",
        "medium",
        "search",
        "show",
        "high",
        "push",
        "service",
        "ms defender",
        "files matching",
        "number",
        "hide samples",
        "date hash",
        "next yara",
        "emotet",
        "g3nasom",
        "entries",
        "alerts show",
        "ck technique",
        "technique id",
        "io control",
        "anomalous",
        "geofencing",
        "sha256 add",
        "pulse pulses",
        "copy"
      ],
      "references": [
        "http://accounts.google.com/v3/signin/identifier",
        "Yara Detection: Cabinet _Archive",
        "Banking Malware"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/G3nasom",
          "display_name": "ALF:Trojan:Win32/G3nasom",
          "target": null
        },
        {
          "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Backdoor:Win32/Berbew",
          "display_name": "Backdoor:Win32/Berbew",
          "target": "/malware/Backdoor:Win32/Berbew"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.KDS!MTB",
          "display_name": "Trojan:Win32/Emotet.KDS!MTB",
          "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 531,
        "FileHash-SHA256": 1069,
        "URL": 1607,
        "FileHash-MD5": 275,
        "FileHash-SHA1": 187,
        "SSLCertFingerprint": 25,
        "domain": 188,
        "email": 2
      },
      "indicator_count": 3884,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "182 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c62306c74c7f57dc993d13",
      "name": "Predator - Dr. Jeffrey Reimer, DPT - Physical Therapist in Denver, CO | Healthgrades",
      "description": "Malware with code overlap. JSR , DPT Health Grades account has been removed. An investigator claims Reimer & family have been moved, names , career , changes years ago,  claims of government protection for him. After victims MRI JSR left town immediately. Returning in 2016 , coincidentally driving near victim location on various locations. \nIt\u2019s disgusting how technology is being used to cover up a crime instead of solve one.\n#code_overlap #malware #hosts_contacted\n#itstoolatetoapologizeitstoolate",
      "modified": "2025-10-14T01:04:58.605000",
      "created": "2025-09-14T02:05:58.793000",
      "tags": [
        "denver",
        "jeffrey reimer",
        "star rating",
        "appointment",
        "post",
        "response are",
        "listened",
        "wait",
        "reimer",
        "healthgrades",
        "reply flag",
        "doctors",
        "find",
        "jeff",
        "back",
        "aurora",
        "leave",
        "crying",
        "tips",
        "tags na",
        "utc scorecard",
        "research beacon",
        "utc yahoo",
        "dot tags",
        "united",
        "mozilla",
        "write c",
        "nsisinetc",
        "undetermined",
        "medium",
        "intel",
        "ms windows",
        "write",
        "trojan",
        "defender",
        "delphi",
        "win32",
        "malware",
        "win64",
        "local",
        "next",
        "code overlap",
        "dynamicloader",
        "as15169",
        "brazil as28604",
        "brazil as396982",
        "upatre",
        "passive dns",
        "title error",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "body",
        "script script",
        "powder sdk",
        "a domains",
        "title",
        "script",
        "certificate",
        "hostname add",
        "pulse submit",
        "meta",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "signing defense",
        "flag",
        "whois privacy",
        "service name",
        "server",
        "contacted hosts",
        "ip address",
        "process details",
        "size",
        "div id",
        "beginstring",
        "beginerror",
        "null",
        "error",
        "strings",
        "refresh",
        "tools",
        "onload",
        "click",
        "span",
        "remote access"
      ],
      "references": [
        "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler",
        "YARA: Delphi This program must be run under Win32 compilers TrojanWin32Fakemalard Ujhhd",
        "CodeOverlap | All malware listed exists",
        "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "All #tags auto populated.",
        "URL http://virii.es/M/Mobile Malware Attacks and Defense.pdf",
        "blog.manpowergroup.com.py (aww like dadvocates)",
        "https://isexychat.com/chatrooms/teen-chat/with-others/\t (sounds about right)",
        "r53lbr.run-delete-app-sa-east-1-1.run-delete-test-sa-east-1-9zt9rjv.forgeapps.ec2.aws.dev"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
          "display_name": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
          "target": null
        },
        {
          "id": "Win.Malware.Tfuvtcog-7194372-0",
          "display_name": "Win.Malware.Tfuvtcog-7194372-0",
          "target": null
        },
        {
          "id": "Trojan.Win32.Fakemalard",
          "display_name": "Trojan.Win32.Fakemalard",
          "target": null
        },
        {
          "id": "Code Overlap",
          "display_name": "Code Overlap",
          "target": null
        },
        {
          "id": "Trojan.Win32.Banload",
          "display_name": "Trojan.Win32.Banload",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [
        "Medical",
        "Media",
        "Government."
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 609,
        "URL": 1550,
        "domain": 280,
        "FileHash-SHA256": 1428,
        "FileHash-MD5": 133,
        "FileHash-SHA1": 115,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 4119,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "187 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c62316b24b23e6d4c579ef",
      "name": "Predator - Dr. Jeffrey Reimer, DPT - Physical Therapist in Denver, CO | Healthgrades",
      "description": "Malware with code overlap. JSR , DPT Health Grades account has been removed. An investigator claims Reimer & family have been moved, names , career , changes years ago,  claims of government protection for him. After victims MRI JSR left town immediately. Returning in 2016 , coincidentally driving near victim location on various locations. \nIt\u2019s disgusting how technology is being used to cover up a crime instead of solve one.\n#code_overlap #malware #hosts_contacted\n#itstoolatetoapologizeitstoolate",
      "modified": "2025-10-14T01:04:58.605000",
      "created": "2025-09-14T02:06:14.853000",
      "tags": [
        "denver",
        "jeffrey reimer",
        "star rating",
        "appointment",
        "post",
        "response are",
        "listened",
        "wait",
        "reimer",
        "healthgrades",
        "reply flag",
        "doctors",
        "find",
        "jeff",
        "back",
        "aurora",
        "leave",
        "crying",
        "tips",
        "tags na",
        "utc scorecard",
        "research beacon",
        "utc yahoo",
        "dot tags",
        "united",
        "mozilla",
        "write c",
        "nsisinetc",
        "undetermined",
        "medium",
        "intel",
        "ms windows",
        "write",
        "trojan",
        "defender",
        "delphi",
        "win32",
        "malware",
        "win64",
        "local",
        "next",
        "code overlap",
        "dynamicloader",
        "as15169",
        "brazil as28604",
        "brazil as396982",
        "upatre",
        "passive dns",
        "title error",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "body",
        "script script",
        "powder sdk",
        "a domains",
        "title",
        "script",
        "certificate",
        "hostname add",
        "pulse submit",
        "meta",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "signing defense",
        "flag",
        "whois privacy",
        "service name",
        "server",
        "contacted hosts",
        "ip address",
        "process details",
        "size",
        "div id",
        "beginstring",
        "beginerror",
        "null",
        "error",
        "strings",
        "refresh",
        "tools",
        "onload",
        "click",
        "span",
        "remote access"
      ],
      "references": [
        "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler",
        "YARA: Delphi This program must be run under Win32 compilers TrojanWin32Fakemalard Ujhhd",
        "CodeOverlap | All malware listed exists",
        "Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "All #tags auto populated.",
        "URL http://virii.es/M/Mobile Malware Attacks and Defense.pdf",
        "blog.manpowergroup.com.py (aww like dadvocates)",
        "https://isexychat.com/chatrooms/teen-chat/with-others/\t (sounds about right)",
        "r53lbr.run-delete-app-sa-east-1-1.run-delete-test-sa-east-1-9zt9rjv.forgeapps.ec2.aws.dev"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
          "display_name": "#Lowfi:AGGREGATOR:HasKnownAdwareDomain_NsisBundler.",
          "target": null
        },
        {
          "id": "Win.Malware.Tfuvtcog-7194372-0",
          "display_name": "Win.Malware.Tfuvtcog-7194372-0",
          "target": null
        },
        {
          "id": "Trojan.Win32.Fakemalard",
          "display_name": "Trojan.Win32.Fakemalard",
          "target": null
        },
        {
          "id": "Code Overlap",
          "display_name": "Code Overlap",
          "target": null
        },
        {
          "id": "Trojan.Win32.Banload",
          "display_name": "Trojan.Win32.Banload",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Too much to search for",
          "display_name": "Too much to search for",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [
        "Medical",
        "Media",
        "Government."
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 609,
        "URL": 1550,
        "domain": 280,
        "FileHash-SHA256": 1428,
        "FileHash-MD5": 133,
        "FileHash-SHA1": 115,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 4119,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "187 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://dev.114onca.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://dev.114onca.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631572.3772233
}