{
  "type": "URL",
  "indicator": "https://downloadingdoc.infinityfreeapp.com/filedwn.php",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://downloadingdoc.infinityfreeapp.com/filedwn.php",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3805357166,
      "indicator": "https://downloadingdoc.infinityfreeapp.com/filedwn.php",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 17,
      "pulses": [
        {
          "id": "6579b53c00375a2dcfaaf952",
          "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
          "description": "Researchers have uncovered a sophisticated Russian state-sponsored cyber-attack that leverages legitimate documents to deliver Headlace malware to victims of the Israel-Hamas conflict, primarily based in Europe.",
          "modified": "2025-09-26T12:33:49.381000",
          "created": "2023-12-13T13:44:27.660000",
          "tags": [
            "itg05",
            "september",
            "ukraine",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "belarus",
            "service",
            "winrar",
            "nishang",
            "graphite",
            "credomap",
            "gootloader",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 400,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 3
          },
          "indicator_count": 70,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 377606,
          "modified_text": "205 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6675c61d2a8e4554b9985027",
          "name": "BLOCK_2024",
          "description": "",
          "modified": "2026-02-04T19:03:11.880000",
          "created": "2024-06-21T18:27:41.885000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e899612f5527bad9d4e5a8",
          "export_count": 6867256,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2306,
            "FileHash-MD5": 4833,
            "URL": 1674,
            "hostname": 1302,
            "FileHash-SHA256": 6371,
            "FileHash-SHA1": 4014,
            "IPv4": 3524,
            "CIDR": 19,
            "email": 190,
            "CVE": 4
          },
          "indicator_count": 24237,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 108,
          "modified_text": "74 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69404b09d8296388596ecfa9",
          "name": "BLOCK_2025_DIC",
          "description": "",
          "modified": "2025-12-24T16:04:11.529000",
          "created": "2025-12-15T17:53:13.004000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2300,
            "FileHash-MD5": 4833,
            "URL": 1673,
            "hostname": 1297,
            "FileHash-SHA256": 6371,
            "FileHash-SHA1": 4014,
            "IPv4": 3235,
            "CIDR": 19,
            "email": 170,
            "CVE": 4
          },
          "indicator_count": 23916,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 79,
          "modified_text": "116 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c34e7efa40976a9dd655b",
          "name": "SOC2023",
          "description": "",
          "modified": "2025-08-17T17:03:38.868000",
          "created": "2023-11-09T01:24:55.160000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65491efbfc3d9479076431bb",
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1714,
            "FileHash-MD5": 3448,
            "URL": 727,
            "hostname": 912,
            "FileHash-SHA256": 4539,
            "FileHash-SHA1": 2696,
            "IPv4": 276,
            "CIDR": 10,
            "email": 28
          },
          "indicator_count": 14350,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "245 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "679c246da161670e959a9eec",
          "name": "2024-blocking-soc-ene25",
          "description": "",
          "modified": "2025-02-15T00:01:08.338000",
          "created": "2025-01-31T01:16:29.608000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2045,
            "FileHash-MD5": 4426,
            "URL": 1463,
            "hostname": 1231,
            "FileHash-SHA256": 5892,
            "FileHash-SHA1": 3625,
            "IPv4": 189,
            "CIDR": 6,
            "email": 163
          },
          "indicator_count": 19040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "679c246c8bf7850b5096828e",
          "name": "2024-blocking-soc-ene25",
          "description": "",
          "modified": "2025-02-15T00:01:08.338000",
          "created": "2025-01-31T01:16:28.004000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2045,
            "FileHash-MD5": 4426,
            "URL": 1463,
            "hostname": 1231,
            "FileHash-SHA256": 5892,
            "FileHash-SHA1": 3625,
            "IPv4": 189,
            "CIDR": 6,
            "email": 163
          },
          "indicator_count": 19040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6765eebf9ec06704f3a6ea68",
          "name": "CLON IPIF",
          "description": "",
          "modified": "2025-01-09T23:04:00.232000",
          "created": "2024-12-20T22:25:03.407000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2031,
            "FileHash-MD5": 4171,
            "URL": 1324,
            "hostname": 1222,
            "FileHash-SHA256": 5634,
            "FileHash-SHA1": 3368,
            "IPv4": 189,
            "CIDR": 6,
            "email": 162
          },
          "indicator_count": 18107,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "465 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6758ebc2472100ac75acad69",
          "name": "2024-DIC-10-Clon",
          "description": "",
          "modified": "2025-01-09T23:04:00.232000",
          "created": "2024-12-11T01:32:50.260000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2030,
            "FileHash-MD5": 4171,
            "URL": 1324,
            "hostname": 1222,
            "FileHash-SHA256": 5634,
            "FileHash-SHA1": 3368,
            "IPv4": 189,
            "CIDR": 6,
            "email": 162
          },
          "indicator_count": 18106,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "465 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6732a0b6cc4c5356a823de37",
          "name": "_CLON_2024_NOV11",
          "description": "",
          "modified": "2024-12-11T00:00:21.805000",
          "created": "2024-11-12T00:26:30.524000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1795,
            "FileHash-MD5": 3724,
            "URL": 1028,
            "hostname": 1096,
            "FileHash-SHA256": 5030,
            "FileHash-SHA1": 2927,
            "IPv4": 189,
            "CIDR": 6,
            "email": 28
          },
          "indicator_count": 15823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "495 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65fc23e4c36f0715310e1d95",
          "name": "SOC_BLOCK_NEW",
          "description": "",
          "modified": "2024-03-21T12:11:41.190000",
          "created": "2024-03-21T12:11:16.345000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e899612f5527bad9d4e5a8",
          "export_count": 275,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": true,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "fencesense",
            "id": "255590",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1715,
            "FileHash-MD5": 3498,
            "URL": 729,
            "hostname": 911,
            "FileHash-SHA256": 4590,
            "FileHash-SHA1": 2746,
            "IPv4": 189,
            "CIDR": 6,
            "email": 28
          },
          "indicator_count": 14412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 25,
          "modified_text": "759 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657aedc85e6c28f5a6c9203f",
          "name": "APT28 and UAC-0050 Utilize Phishing Techniques for Cyberattacks",
          "description": "The full list of results from the first round of the 2017 World Cup, which takes place on Tuesday, has been released by the International Olympic Committee (IOC) in Rio de Janeiro, Brazil.",
          "modified": "2024-01-13T11:00:47.221000",
          "created": "2023-12-14T11:58:00.371000",
          "tags": [
            "hash sha256"
          ],
          "references": [
            "244 APT28 and UAC-0050 Utilize Phishing.txt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ESFBSOCTCR",
            "id": "200541",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 28,
            "FileHash-SHA1": 28,
            "FileHash-SHA256": 34,
            "URL": 8,
            "domain": 1,
            "hostname": 3
          },
          "indicator_count": 102,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 87,
          "modified_text": "827 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6585c1fbb01e2efe07097c81",
          "name": " ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
          "description": "",
          "modified": "2023-12-22T17:06:03.020000",
          "created": "2023-12-22T17:06:03.020000",
          "tags": [
            "nation-state attacks",
            "x-force",
            "ibm x-force research",
            "security intelligence & analytics",
            "security intelligence",
            "data security",
            "malware",
            "itg05",
            "headlace",
            "september",
            "ukraine",
            "united",
            "republic",
            "december",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "xforce",
            "bank",
            "belarus",
            "scroll",
            "service",
            "later",
            "august",
            "winrar",
            "mission",
            "main",
            "nishang",
            "graphite",
            "credomap",
            "install",
            "mocky api",
            ".cmd",
            "gootloader",
            "headlace cmd",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": ".CMD",
              "display_name": ".CMD",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "Headlace CMD",
              "display_name": "Headlace CMD",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": "65796f389815733da2b2bb91",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "feisty-swim1410",
            "id": "217462",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 71,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "849 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657ae05eb2f6cd248eae7bcf",
          "name": "Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign",
          "description": "The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the delivery of a custom backdoor called HeadLace.\n\nIBM X-Force is tracking the adversary under the name ITG05, which is also known as BlueDelta, Fancy Bear, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, Sednit, Sofacy, and TA422.\n\n\"The newly discovered campaign is directed against targets based in at least 13 nations worldwide and leverages authentic documents created by academic, finance and diplomatic centers,\" security researchers Golo M\u00fchr, Claire Zaboeva, and Joe Fasulo said.",
          "modified": "2023-12-14T11:00:46.240000",
          "created": "2023-12-14T11:00:46.240000",
          "tags": [
            "malware",
            "x-force",
            "ibm x-force research",
            "nation-state attacks",
            "security intelligence",
            "security intelligence & analytics",
            "data security",
            "itg05",
            "headlace",
            "september",
            "ukraine",
            "united",
            "republic",
            "december",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "xforce",
            "bank",
            "belarus",
            "scroll",
            "service",
            "later",
            "august",
            "winrar",
            "mission",
            "main",
            "nishang",
            "graphite",
            "credomap",
            "install",
            "mocky api",
            ".cmd",
            "gootloader",
            "headlace cmd",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/",
            "https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": ".CMD",
              "display_name": ".CMD",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "Headlace CMD",
              "display_name": "Headlace CMD",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 328,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dekaRituraj",
            "id": "99856",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_99856/resized/80/avatar_0e93d502b7.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 36,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 129,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 438,
          "modified_text": "857 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6579e0a24d6227b1f66c23c8",
          "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malwar",
          "description": "",
          "modified": "2023-12-13T16:49:38.756000",
          "created": "2023-12-13T16:49:38.756000",
          "tags": [
            "itg05",
            "september",
            "ukraine",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "belarus",
            "service",
            "winrar",
            "nishang",
            "graphite",
            "credomap",
            "gootloader",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": "6579b53c00375a2dcfaaf952",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "burtcha15",
            "id": "207697",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 71,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 54,
          "modified_text": "858 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65796f389815733da2b2bb91",
          "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
          "description": "IBM X-Force has uncovered a sophisticated Russian state-sponsored cyber-attack that leverages legitimate documents to deliver Headlace malware to victims of the Israel-Hamas conflict, primarily based in Europe.",
          "modified": "2023-12-13T08:45:44.647000",
          "created": "2023-12-13T08:45:44.647000",
          "tags": [
            "nation-state attacks",
            "x-force",
            "ibm x-force research",
            "security intelligence & analytics",
            "security intelligence",
            "data security",
            "malware",
            "itg05",
            "headlace",
            "september",
            "ukraine",
            "united",
            "republic",
            "december",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "xforce",
            "bank",
            "belarus",
            "scroll",
            "service",
            "later",
            "august",
            "winrar",
            "mission",
            "main",
            "nishang",
            "graphite",
            "credomap",
            "install",
            "mocky api",
            ".cmd",
            "gootloader",
            "headlace cmd",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": ".CMD",
              "display_name": ".CMD",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "Headlace CMD",
              "display_name": "Headlace CMD",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunter_NL",
            "id": "171283",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 71,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 847,
          "modified_text": "858 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65796449e312061668a5aec0",
          "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
          "description": "",
          "modified": "2023-12-13T07:59:05.896000",
          "created": "2023-12-13T07:59:05.896000",
          "tags": [
            "malware",
            "security intelligence & analytics",
            "data security",
            "security intelligence",
            "x-force",
            "ibm x-force research",
            "nation-state attacks",
            "itg05",
            "headlace",
            "september",
            "ukraine",
            "united",
            "republic",
            "december",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "xforce",
            "bank",
            "belarus",
            "scroll",
            "service",
            "later",
            "august",
            "winrar",
            "mission",
            "main",
            "nishang",
            "graphite",
            "credomap",
            "install",
            "mocky api",
            ".cmd",
            "gootloader",
            "headlace cmd",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": ".CMD",
              "display_name": ".CMD",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "Headlace CMD",
              "display_name": "Headlace CMD",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": "657881ca690a24eeff3b9ade",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tr2222200",
            "id": "207905",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 71,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 184,
          "modified_text": "858 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657881ca690a24eeff3b9ade",
          "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
          "description": "The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the delivery of a custom backdoor called HeadLace.\n\nIBM X-Force is tracking the adversary under the name ITG05, which is also known as BlueDelta, Fancy Bear, Forest Blizzard (formerly Strontium), FROZENLAKE, Iron Twilight, Sednit, Sofacy, and TA422.\n\n\"The newly discovered campaign is directed against targets based in at least 13 nations worldwide and leverages authentic documents created by academic, finance and diplomatic centers,\" security researchers Golo M\u00fchr, Claire Zaboeva, and Joe Fasulo said.\n\n\"ITG05's infrastructure ensures only targets from a single specific country can receive the malware, indicating the highly targeted nature of the campaign.\"",
          "modified": "2023-12-12T15:52:42.298000",
          "created": "2023-12-12T15:52:42.298000",
          "tags": [
            "malware",
            "security intelligence & analytics",
            "data security",
            "security intelligence",
            "x-force",
            "ibm x-force research",
            "nation-state attacks",
            "itg05",
            "headlace",
            "september",
            "ukraine",
            "united",
            "republic",
            "december",
            "azerbaijan",
            "israel",
            "razumkov centre",
            "xforce",
            "bank",
            "belarus",
            "scroll",
            "service",
            "later",
            "august",
            "winrar",
            "mission",
            "main",
            "nishang",
            "graphite",
            "credomap",
            "install",
            "mocky api",
            ".cmd",
            "gootloader",
            "headlace cmd",
            "wailingcrab",
            "mocky"
          ],
          "references": [
            "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Ukraine",
            "Hungary",
            "Poland",
            "Belgium",
            "Germany",
            "Azerbaijan",
            "Saudi Arabia",
            "Kazakhstan",
            "Australia",
            "Italy",
            "Latvia",
            "Romania",
            "Austria",
            "Israel",
            "Russian Federation",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mocky API",
              "display_name": "Mocky API",
              "target": null
            },
            {
              "id": ".CMD",
              "display_name": ".CMD",
              "target": null
            },
            {
              "id": "Gootloader",
              "display_name": "Gootloader",
              "target": null
            },
            {
              "id": "Headlace CMD",
              "display_name": "Headlace CMD",
              "target": null
            },
            {
              "id": "WailingCrab",
              "display_name": "WailingCrab",
              "target": null
            },
            {
              "id": "Mocky",
              "display_name": "Mocky",
              "target": null
            },
            {
              "id": "Headlace",
              "display_name": "Headlace",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1530",
              "name": "Data from Cloud Storage Object",
              "display_name": "T1530 - Data from Cloud Storage Object"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BITSecurity",
            "id": "103352",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_103352/resized/80/avatar_1540652530.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 36,
            "URL": 13,
            "domain": 2,
            "hostname": 4
          },
          "indicator_count": 71,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 248,
          "modified_text": "859 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/",
        "244 APT28 and UAC-0050 Utilize Phishing.txt",
        "https://thehackernews.com/2023/12/russian-apt28-hackers-targeting-13.html"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [
            "Gootloader",
            "Wailingcrab",
            "Mocky api",
            "Mocky",
            "Headlace"
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "unique_indicators": 70
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Headlace cmd",
            "Gootloader",
            "Wailingcrab",
            "Mocky api",
            "Mocky",
            ".cmd",
            "Headlace"
          ],
          "industries": [
            "Finance",
            "Government",
            "Diplomatic"
          ],
          "unique_indicators": 23409
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/infinityfreeapp.com",
    "whois": "http://whois.domaintools.com/infinityfreeapp.com",
    "domain": "infinityfreeapp.com",
    "hostname": "downloadingdoc.infinityfreeapp.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 17,
  "pulses": [
    {
      "id": "6579b53c00375a2dcfaaf952",
      "name": "ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware",
      "description": "Researchers have uncovered a sophisticated Russian state-sponsored cyber-attack that leverages legitimate documents to deliver Headlace malware to victims of the Israel-Hamas conflict, primarily based in Europe.",
      "modified": "2025-09-26T12:33:49.381000",
      "created": "2023-12-13T13:44:27.660000",
      "tags": [
        "itg05",
        "september",
        "ukraine",
        "azerbaijan",
        "israel",
        "razumkov centre",
        "belarus",
        "service",
        "winrar",
        "nishang",
        "graphite",
        "credomap",
        "gootloader",
        "wailingcrab",
        "mocky"
      ],
      "references": [
        "https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Ukraine",
        "Hungary",
        "Poland",
        "Belgium",
        "Germany",
        "Azerbaijan",
        "Saudi Arabia",
        "Kazakhstan",
        "Australia",
        "Italy",
        "Latvia",
        "Romania",
        "Austria",
        "Israel",
        "Russian Federation",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mocky API",
          "display_name": "Mocky API",
          "target": null
        },
        {
          "id": "Gootloader",
          "display_name": "Gootloader",
          "target": null
        },
        {
          "id": "WailingCrab",
          "display_name": "WailingCrab",
          "target": null
        },
        {
          "id": "Mocky",
          "display_name": "Mocky",
          "target": null
        },
        {
          "id": "Headlace",
          "display_name": "Headlace",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1530",
          "name": "Data from Cloud Storage Object",
          "display_name": "T1530 - Data from Cloud Storage Object"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Finance",
        "Government",
        "Diplomatic"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 400,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "FileHash-MD5": 7,
        "FileHash-SHA1": 7,
        "FileHash-SHA256": 36,
        "URL": 13,
        "domain": 2,
        "hostname": 3
      },
      "indicator_count": 70,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 377606,
      "modified_text": "205 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6675c61d2a8e4554b9985027",
      "name": "BLOCK_2024",
      "description": "",
      "modified": "2026-02-04T19:03:11.880000",
      "created": "2024-06-21T18:27:41.885000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e899612f5527bad9d4e5a8",
      "export_count": 6867256,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2306,
        "FileHash-MD5": 4833,
        "URL": 1674,
        "hostname": 1302,
        "FileHash-SHA256": 6371,
        "FileHash-SHA1": 4014,
        "IPv4": 3524,
        "CIDR": 19,
        "email": 190,
        "CVE": 4
      },
      "indicator_count": 24237,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 108,
      "modified_text": "74 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69404b09d8296388596ecfa9",
      "name": "BLOCK_2025_DIC",
      "description": "",
      "modified": "2025-12-24T16:04:11.529000",
      "created": "2025-12-15T17:53:13.004000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2300,
        "FileHash-MD5": 4833,
        "URL": 1673,
        "hostname": 1297,
        "FileHash-SHA256": 6371,
        "FileHash-SHA1": 4014,
        "IPv4": 3235,
        "CIDR": 19,
        "email": 170,
        "CVE": 4
      },
      "indicator_count": 23916,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 79,
      "modified_text": "116 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c34e7efa40976a9dd655b",
      "name": "SOC2023",
      "description": "",
      "modified": "2025-08-17T17:03:38.868000",
      "created": "2023-11-09T01:24:55.160000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65491efbfc3d9479076431bb",
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1714,
        "FileHash-MD5": 3448,
        "URL": 727,
        "hostname": 912,
        "FileHash-SHA256": 4539,
        "FileHash-SHA1": 2696,
        "IPv4": 276,
        "CIDR": 10,
        "email": 28
      },
      "indicator_count": 14350,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 91,
      "modified_text": "245 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "679c246da161670e959a9eec",
      "name": "2024-blocking-soc-ene25",
      "description": "",
      "modified": "2025-02-15T00:01:08.338000",
      "created": "2025-01-31T01:16:29.608000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2045,
        "FileHash-MD5": 4426,
        "URL": 1463,
        "hostname": 1231,
        "FileHash-SHA256": 5892,
        "FileHash-SHA1": 3625,
        "IPv4": 189,
        "CIDR": 6,
        "email": 163
      },
      "indicator_count": 19040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "429 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "679c246c8bf7850b5096828e",
      "name": "2024-blocking-soc-ene25",
      "description": "",
      "modified": "2025-02-15T00:01:08.338000",
      "created": "2025-01-31T01:16:28.004000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2045,
        "FileHash-MD5": 4426,
        "URL": 1463,
        "hostname": 1231,
        "FileHash-SHA256": 5892,
        "FileHash-SHA1": 3625,
        "IPv4": 189,
        "CIDR": 6,
        "email": 163
      },
      "indicator_count": 19040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "429 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6765eebf9ec06704f3a6ea68",
      "name": "CLON IPIF",
      "description": "",
      "modified": "2025-01-09T23:04:00.232000",
      "created": "2024-12-20T22:25:03.407000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2031,
        "FileHash-MD5": 4171,
        "URL": 1324,
        "hostname": 1222,
        "FileHash-SHA256": 5634,
        "FileHash-SHA1": 3368,
        "IPv4": 189,
        "CIDR": 6,
        "email": 162
      },
      "indicator_count": 18107,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "465 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6758ebc2472100ac75acad69",
      "name": "2024-DIC-10-Clon",
      "description": "",
      "modified": "2025-01-09T23:04:00.232000",
      "created": "2024-12-11T01:32:50.260000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2030,
        "FileHash-MD5": 4171,
        "URL": 1324,
        "hostname": 1222,
        "FileHash-SHA256": 5634,
        "FileHash-SHA1": 3368,
        "IPv4": 189,
        "CIDR": 6,
        "email": 162
      },
      "indicator_count": 18106,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "465 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6732a0b6cc4c5356a823de37",
      "name": "_CLON_2024_NOV11",
      "description": "",
      "modified": "2024-12-11T00:00:21.805000",
      "created": "2024-11-12T00:26:30.524000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1795,
        "FileHash-MD5": 3724,
        "URL": 1028,
        "hostname": 1096,
        "FileHash-SHA256": 5030,
        "FileHash-SHA1": 2927,
        "IPv4": 189,
        "CIDR": 6,
        "email": 28
      },
      "indicator_count": 15823,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "495 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65fc23e4c36f0715310e1d95",
      "name": "SOC_BLOCK_NEW",
      "description": "",
      "modified": "2024-03-21T12:11:41.190000",
      "created": "2024-03-21T12:11:16.345000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e899612f5527bad9d4e5a8",
      "export_count": 275,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": true,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "fencesense",
        "id": "255590",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1715,
        "FileHash-MD5": 3498,
        "URL": 729,
        "hostname": 911,
        "FileHash-SHA256": 4590,
        "FileHash-SHA1": 2746,
        "IPv4": 189,
        "CIDR": 6,
        "email": 28
      },
      "indicator_count": 14412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 25,
      "modified_text": "759 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://downloadingdoc.infinityfreeapp.com/filedwn.php",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://downloadingdoc.infinityfreeapp.com/filedwn.php",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776661480.8608603
}