{
  "type": "URL",
  "indicator": "https://dusee05.devtest.call2.team",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://dusee05.devtest.call2.team",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3657688135,
      "indicator": "https://dusee05.devtest.call2.team",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "69c1bd40f81db45dc044697c",
          "name": "Masterkey Clone By CallmeDoris",
          "description": "",
          "modified": "2026-03-23T22:22:56.940000",
          "created": "2026-03-23T22:22:56.940000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "642db7b656049e54b2f71c20",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "28 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "671fd3afa974b93284d6bac1",
          "name": "dragonforce.io",
          "description": "Throw your MacBook in the trash, where the hackers belong.",
          "modified": "2024-11-27T17:01:13.516000",
          "created": "2024-10-28T18:10:55.712000",
          "tags": [
            "copyright",
            "apple computer",
            "tcpip",
            "supported",
            "quantum",
            "postfix",
            "mail",
            "aliases",
            "postfix version",
            "restrict",
            "wietse venema",
            "sample",
            "note",
            "person",
            "basic system",
            "general",
            "column",
            "tiff",
            "linus walleij",
            "triad",
            "greg roelofs",
            "html",
            "daniel quinlan",
            "aiff",
            "music",
            "wave",
            "formats",
            "magic",
            "form",
            "crunch",
            "freeze",
            "maker",
            "format",
            "postscript",
            "this",
            "ifmodule",
            "include",
            "virtualhost",
            "directory",
            "require",
            "serverroot",
            "listen",
            "ifdefine",
            "loadmodule",
            "errordocument",
            "apache",
            "win32",
            "example",
            "main",
            "webdav",
            "internet",
            "mime type",
            "xlm xla",
            "xlc xlt",
            "xlam",
            "xlsb",
            "xlsm",
            "xltm",
            "z7 z8",
            "xhtml xht",
            "addiconbytype",
            "adddescription",
            "fancyindexed",
            "gzip",
            "indexignore",
            "indexes",
            "versionsort",
            "fancyindexing",
            "alias icons",
            "full",
            "minrate500",
            "keepalive",
            "prod",
            "email",
            "apache http",
            "server",
            "timeout",
            "number",
            "minimal",
            "major",
            "addlanguage",
            "addcharset",
            "defaultlanguage",
            "fallback",
            "polish",
            "addlanguage pl",
            "catalan",
            "english",
            "greekmodern",
            "korean",
            "turkish",
            "browsermatch",
            "davlockdb",
            "requireany",
            "usergroup",
            "alias",
            "authtype digest",
            "davupload admin",
            "authuserfile",
            "errorhttp",
            "http",
            "yourincludepath",
            "apache version",
            "serversignature",
            "alias error",
            "addhandler",
            "threadsperchild",
            "startservers",
            "minsparethreads",
            "maxsparethreads",
            "maximum number",
            "pidfile",
            "mpms",
            "threadstacksize",
            "extendedstatus",
            "change",
            "sethandler",
            "require host",
            "get information",
            "allow server",
            "allow",
            "userdir sites",
            "control access",
            "userdir",
            "sslsessioncache",
            "configure",
            "ocsp stapling",
            "ssl engine",
            "sslrequire",
            "ssltls standard",
            "prng",
            "sslrandomseed",
            "openssl",
            "high",
            "first",
            "refer",
            "servername",
            "virtualhost 80",
            "serveradmin",
            "documentroot",
            "errorlog",
            "customlog",
            "hosts",
            "please",
            "almost",
            "loadfile c",
            "proxyhtmllinks",
            "ascii",
            "unicode",
            "windows",
            "must",
            "location",
            "w3c html",
            "directoryindex",
            "allowoverride",
            "manual",
            "provide access",
            "options indexes",
            "files",
            "removetype tr",
            "traditionally",
            "addlanguage da",
            "addtype",
            "a facility",
            "claim",
            "file",
            "level error",
            "sender",
            "store",
            "level",
            "facility",
            "category",
            "time",
            "host",
            "threadid",
            "function",
            "line",
            "message",
            "guest",
            "access",
            "kernel",
            "usereventagent",
            "springboard",
            "message sep",
            "message mc",
            "message secure",
            "ca message",
            "multitouchhid",
            "use directory",
            "home autohome",
            "automounter map",
            "get home",
            "ps1h",
            "make bash",
            "s checkwinsize",
            "etcbashrc",
            "termprogram",
            "level info",
            "broadcast",
            "ignore",
            "rules",
            "true",
            "t option",
            "mount",
            "force",
            "environment",
            "automountdenv",
            "promptcommand",
            "shellsessiondir",
            "histfile",
            "histfilesize",
            "terminal",
            "myvar",
            "histtimeformat",
            "arrange",
            "bashrematch",
            "tell",
            "limit",
            "order deny",
            "authtype",
            "default require",
            "require user",
            "owner",
            "authkey",
            "lpadmin",
            "order",
            "system",
            "local",
            "cups scheduler",
            "list",
            "synconclose no",
            "default user",
            "user lp",
            "group lp",
            "group value",
            "restrict access",
            "cups",
            "inpck",
            "nnnbaud",
            "berkeley",
            "parity",
            "pc entry",
            "pass8",
            "parenb istrip",
            "fixed speed",
            "entry",
            "clocal mode",
            "host database",
            "maxhistsize",
            "promptmode",
            "verbose end",
            "etcirbrcloaded",
            "default",
            "setup",
            "history file",
            "readline",
            "error",
            "searchpaths",
            "freebsd",
            "tmpdir",
            "fcodes",
            "prunepaths",
            "vartmp",
            "prunedirs",
            "filesystems",
            "status mailfrom",
            "returnpath via",
            "open directory",
            "jabber",
            "group database",
            "cyrus",
            "calendar",
            "dovecot",
            "postfix scsd",
            "networkd",
            "nroff",
            "manpath",
            "uncomment",
            "manpager",
            "whatispager",
            "manlocale",
            "every",
            "manpath optman",
            "maybe",
            "troff",
            "flags",
            "bcgjnuwz",
            "d0 j",
            "ldap defaults",
            "base dcexample",
            "uri ldap",
            "sizelimit",
            "timelimit",
            "deref",
            "syntax",
            "kerberos",
            "name",
            "corba object",
            "desc",
            "schema",
            "openldap",
            "redistribution",
            "public license",
            "license",
            "collective",
            "shall not",
            "ldap",
            "co llective",
            "equality",
            "sup name",
            "structural must",
            "singlevalue",
            "auxiliary must",
            "auxiliary may",
            "guid",
            "desc account",
            "desc mount",
            "desc password",
            "service",
            "info",
            "tiger",
            "multi",
            "d esc",
            "rfc1274",
            "structural may",
            "quality",
            "substr caseigno",
            "corba",
            "ldap directory",
            "reserved",
            "ldap server",
            "dynamic group",
            "netscape",
            "not recommended",
            "for production",
            "attribute",
            "name managedby",
            "name leaf",
            "duas",
            "internetdrafts",
            "coast",
            "project",
            "java object",
            "java class",
            "de sc",
            "pkcs",
            "inetorgperson",
            "rfc2798",
            "signeddata",
            "smime",
            "openldap note",
            "hold",
            "code",
            "java",
            "jndi reference",
            "jndi",
            "with syntax",
            "definitions",
            "kerberos v",
            "kdc schema",
            "oid base",
            "size",
            "subclass of",
            "may contain",
            "objectclass",
            "must contain",
            "matches for",
            "obsolete",
            "des c",
            "abstract must",
            "sup person",
            "microsoft",
            "advanced server",
            "schema mapping",
            "netinfo",
            "config",
            "groups",
            "netinfo preset",
            "crypt",
            "netinfo rpcs",
            "rpcs number",
            "oncrpcnumber",
            "ipnetmasknumber",
            "assistant",
            "may description",
            "rfc2307",
            "rfc2252",
            "match syntax",
            "openldaproot",
            "openldaporg",
            "openldapou",
            "equal ity",
            "kind",
            "rule",
            "attcertpath",
            "rolesyntax",
            "ldif",
            "blank",
            "ldap entry",
            "spaces",
            "cosine pilot",
            "directory forum",
            "password policy",
            "false",
            "april",
            "auxiliary",
            "passwd",
            "account",
            "desc pool",
            "unix",
            "structural",
            "sup rpcentry",
            "sup container",
            "abstract may",
            "sup ipsecbase",
            "Chelsea Manning Help Me",
            "Aishah Siti Lazim",
            "Aishah Lazim",
            "194 Green Street",
            "Human Subjects",
            "cybernetic",
            "RNA molecule",
            "matches",
            "postfix smtp",
            "domain",
            "ipv6 host",
            "reject",
            "reply",
            "prior",
            "bugs",
            "reject empty",
            "canonical",
            "tables",
            "post",
            "replace user",
            "address",
            "generic",
            "smtp",
            "isp mail",
            "mail delivery",
            "charset",
            "report",
            "postfix dsn",
            "mail returned",
            "only",
            "mime",
            "headerchecks",
            "readme files",
            "filters while",
            "posix",
            "empty",
            "body",
            "pass",
            "write",
            "date",
            "program",
            "agreement",
            "contributor",
            "recipient",
            "contribution",
            "the program",
            "corporation",
            "contributors",
            "product x",
            "as expressly",
            "arch",
            "arch x8664",
            "pipe wall",
            "wimplicit",
            "ranlib",
            "warn",
            "switch",
            "start",
            "systype",
            "smtp server",
            "specify",
            "mx host",
            "unix password",
            "user unknown",
            "pathbin",
            "postfix queue",
            "path",
            "beware",
            "class",
            "uucp",
            "shell",
            "outlook",
            "postfix master",
            "begin",
            "server admin",
            "mail backend",
            "modern smtp",
            "iana",
            "many",
            "postfix pipe",
            "recent cyrus",
            "amos gouaux",
            "old example",
            "update",
            "usrsbin",
            "file format",
            "no group",
            "daemondirectory",
            "relocated",
            "matches user",
            "synopsis",
            "or even",
            "lutz jaenicke",
            "technology",
            "cottbus",
            "germany",
            "openssl package",
            "openssl project",
            "europe",
            "remember that",
            "use of",
            "virtual",
            "virtual alias",
            "redirect mail",
            "deliver mail",
            "transport",
            "description",
            "result format",
            "bashno",
            "r etcbashrc",
            "protocol",
            "ipv6",
            "icmp",
            "cisco",
            "monitoring",
            "argus",
            "chaos",
            "rsvp",
            "encapsulation",
            "aris",
            "isis",
            "kame",
            "id key",
            "specification",
            "auto exit",
            "vpn socket",
            "networkup",
            "term",
            "devnull",
            "common setup",
            "set command",
            "sunnet manager",
            "rpcsrc",
            "netlicense",
            "apple",
            "netbootmount",
            "netbootshadow",
            "computername",
            "localonly",
            "localnetbootdir",
            "netboot",
            "define",
            "purpose",
            "networkonly",
            "waiting",
            "auditing",
            "solaris",
            "openbsm",
            "secsrvr",
            "allocation",
            "bsm event",
            "solaris kernel",
            "openbsm kernel",
            "solaris auemac",
            "solaris umount",
            "integer",
            "array",
            "data",
            "state",
            "opendirectoryd",
            "ipv4",
            "plist",
            "dict",
            "session",
            "commcenter",
            "airport",
            "cfbasichash",
            "thread",
            "cfrunloop",
            "cfrunloopmode",
            "usrbinsudo",
            "usrsbinnetbiosd",
            "removed"
          ],
          "references": [
            "afpovertcp.cfg",
            "aliases",
            "magic",
            "httpd.conf",
            "mime.types",
            "httpd-autoindex.conf",
            "httpd-default.conf",
            "httpd-languages.conf",
            "httpd-dav.conf",
            "httpd-multilang-errordoc.conf",
            "httpd-mpm.conf",
            "httpd-info.conf",
            "httpd-userdir.conf",
            "httpd-ssl.conf",
            "httpd-vhosts.conf",
            "proxy-html.conf",
            "httpd-manual.conf",
            "php7.conf",
            "mpm.conf",
            "com.apple.eventmonitor",
            "com.apple.authd",
            "com.apple.cdscheduler",
            "com.apple.contacts.ContactsAutocomplete",
            "com.apple.install",
            "com.apple.coreduetd",
            "com.apple.login.guest",
            "com.apple.mkb",
            "com.apple.mail",
            "com.apple.MessageTracer",
            "com.apple.mkb.internal",
            "com.apple.iokit.power",
            "com.apple.performance",
            "com.apple.networking.boringssl",
            "auto_master",
            "auto_home",
            "bashrc",
            "asl.conf",
            "autofs.conf",
            "bashrc_Apple_Terminal",
            "csh.cshrc",
            "csh.logout",
            "com.apple.screensharing.agent.launchd",
            "csh.login",
            "cupsd.conf",
            "cups-files.conf.default",
            "cupsd.conf.O",
            "cupsd.conf.default",
            "cups-files.conf",
            "snmp.conf",
            "snmp.conf.default",
            "dragonforce.io",
            "find.codes",
            "ftpusers",
            "hosts.equiv",
            "gettytab",
            "hosts",
            "kern_loader.conf",
            "irbrc",
            "locate.rc",
            "mail.rc",
            "group",
            "man.conf",
            "networks",
            "manpaths",
            "newsyslog.conf",
            "com.apple.slapconfig.conf",
            "files.conf",
            "com.apple.xscertd.conf",
            "wifi.conf",
            "com.apple.slapd.conf",
            "nfs.conf",
            "ntp.conf",
            "notify.conf",
            "ntp_opendirectory.conf",
            "AppleOpenLDAP.plist",
            "ldap.conf",
            "ldap.conf.default",
            "apple_auxillary.schema",
            "corba.ldif",
            "collective.schema",
            "collective.ldif",
            "core.ldif",
            "apple.schema",
            "cosine.ldif",
            "core.schema",
            "corba.schema",
            "duaconf.ldif",
            "dyngroup.ldif",
            "fmserver.schema",
            "duaconf.schema",
            "java.ldif",
            "inetorgperson.schema",
            "inetorgperson.ldif",
            "java.schema",
            "krb5-kdc.schema",
            "cosine.schema",
            "misc.ldif",
            "microsoft.std.schema",
            "misc.schema",
            "netinfo.schema",
            "nis.schema",
            "nis.ldif",
            "openldap.schema",
            "dyngroup.schema",
            "pmi.ldif",
            "ppolicy.ldif",
            "pmi.schema",
            "openldap.ldif",
            "README",
            "ppolicy.schema",
            "samba.schema",
            "microsoft.schema",
            "access",
            "custom_header_checks",
            "canonical",
            "generic",
            "bounce.cf.default",
            "header_checks",
            "LICENSE",
            "makedefs.out",
            "main.cf",
            "master.cf.default",
            "master.cf",
            "main.cf.proto",
            "master.cf.proto",
            "postfix-files",
            "relocated",
            "TLS_LICENSE",
            "virtual",
            "main.cf.default",
            "transport",
            "profile",
            "protocols",
            "racoon.conf",
            "rmtab",
            "rc.common",
            "rpc",
            "rtadvd.conf",
            "rc.netboot",
            "audit_class",
            "audit_warn",
            "audit_event",
            "audit_control"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Bahrain",
            "Israel",
            "India"
          ],
          "malware_families": [
            {
              "id": "DirectoryIndex",
              "display_name": "DirectoryIndex",
              "target": null
            },
            {
              "id": "AllowOverride",
              "display_name": "AllowOverride",
              "target": null
            },
            {
              "id": "Malaysia, Truly Asia",
              "display_name": "Malaysia, Truly Asia",
              "target": null
            },
            {
              "id": "9002 RAT",
              "display_name": "9002 RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/PSMPC_386",
              "display_name": "Virus:DOS/PSMPC_386",
              "target": "/malware/Virus:DOS/PSMPC_386"
            },
            {
              "id": "TEL:TrojanSpy:Win32/KediRat",
              "display_name": "TEL:TrojanSpy:Win32/KediRat",
              "target": null
            },
            {
              "id": "TrojanSpy:iOS/XcodeGhost",
              "display_name": "TrojanSpy:iOS/XcodeGhost",
              "target": "/malware/TrojanSpy:iOS/XcodeGhost"
            },
            {
              "id": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
              "display_name": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
              "target": null
            },
            {
              "id": "Ultra VNC",
              "display_name": "Ultra VNC",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Bridge",
              "display_name": "TrojanDownloader:Win32/Bridge",
              "target": "/malware/TrojanDownloader:Win32/Bridge"
            },
            {
              "id": "Virus:DOS/Cyberwar_5300",
              "display_name": "Virus:DOS/Cyberwar_5300",
              "target": "/malware/Virus:DOS/Cyberwar_5300"
            },
            {
              "id": "Backdoor:Win32/Espion",
              "display_name": "Backdoor:Win32/Espion",
              "target": "/malware/Backdoor:Win32/Espion"
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus for Android - S0316",
              "display_name": "Pegasus for Android - S0316",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
              "display_name": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:BackdoorLinux/Mirai",
              "display_name": "ALF:HeraklezEval:BackdoorLinux/Mirai",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
              "display_name": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1404",
              "name": "Exploit OS Vulnerability",
              "display_name": "T1404 - Exploit OS Vulnerability"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1001.002",
              "name": "Steganography",
              "display_name": "T1001.002 - Steganography"
            },
            {
              "id": "T1003.004",
              "name": "LSA Secrets",
              "display_name": "T1003.004 - LSA Secrets"
            },
            {
              "id": "T1001.001",
              "name": "Junk Data",
              "display_name": "T1001.001 - Junk Data"
            },
            {
              "id": "T1003.001",
              "name": "LSASS Memory",
              "display_name": "T1003.001 - LSASS Memory"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1026",
              "name": "Multiband Communication",
              "display_name": "T1026 - Multiband Communication"
            },
            {
              "id": "T1562.004",
              "name": "Disable or Modify System Firewall",
              "display_name": "T1562.004 - Disable or Modify System Firewall"
            },
            {
              "id": "T1025",
              "name": "Data from Removable Media",
              "display_name": "T1025 - Data from Removable Media"
            },
            {
              "id": "T1055.002",
              "name": "Portable Executable Injection",
              "display_name": "T1055.002 - Portable Executable Injection"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1021.006",
              "name": "Windows Remote Management",
              "display_name": "T1021.006 - Windows Remote Management"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            }
          ],
          "industries": [
            "Media",
            "LGBTQ+ Activists",
            "Technology",
            "Telecommunications",
            "Hospitality",
            "Energy",
            "NGO",
            "Semiconductor",
            "Human Subjects"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ravescoutllc.",
            "id": "288912",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 669,
            "URL": 1976,
            "email": 21,
            "hostname": 1198,
            "FileHash-SHA256": 277,
            "CVE": 2,
            "CIDR": 3
          },
          "indicator_count": 4146,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 33,
          "modified_text": "509 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "671fd3b07ffb71116f2db7fa",
          "name": "dragonforce.io",
          "description": "Throw your MacBook in the trash, where the hackers belong.",
          "modified": "2024-11-27T17:01:13.516000",
          "created": "2024-10-28T18:10:56.355000",
          "tags": [
            "copyright",
            "apple computer",
            "tcpip",
            "supported",
            "quantum",
            "postfix",
            "mail",
            "aliases",
            "postfix version",
            "restrict",
            "wietse venema",
            "sample",
            "note",
            "person",
            "basic system",
            "general",
            "column",
            "tiff",
            "linus walleij",
            "triad",
            "greg roelofs",
            "html",
            "daniel quinlan",
            "aiff",
            "music",
            "wave",
            "formats",
            "magic",
            "form",
            "crunch",
            "freeze",
            "maker",
            "format",
            "postscript",
            "this",
            "ifmodule",
            "include",
            "virtualhost",
            "directory",
            "require",
            "serverroot",
            "listen",
            "ifdefine",
            "loadmodule",
            "errordocument",
            "apache",
            "win32",
            "example",
            "main",
            "webdav",
            "internet",
            "mime type",
            "xlm xla",
            "xlc xlt",
            "xlam",
            "xlsb",
            "xlsm",
            "xltm",
            "z7 z8",
            "xhtml xht",
            "addiconbytype",
            "adddescription",
            "fancyindexed",
            "gzip",
            "indexignore",
            "indexes",
            "versionsort",
            "fancyindexing",
            "alias icons",
            "full",
            "minrate500",
            "keepalive",
            "prod",
            "email",
            "apache http",
            "server",
            "timeout",
            "number",
            "minimal",
            "major",
            "addlanguage",
            "addcharset",
            "defaultlanguage",
            "fallback",
            "polish",
            "addlanguage pl",
            "catalan",
            "english",
            "greekmodern",
            "korean",
            "turkish",
            "browsermatch",
            "davlockdb",
            "requireany",
            "usergroup",
            "alias",
            "authtype digest",
            "davupload admin",
            "authuserfile",
            "errorhttp",
            "http",
            "yourincludepath",
            "apache version",
            "serversignature",
            "alias error",
            "addhandler",
            "threadsperchild",
            "startservers",
            "minsparethreads",
            "maxsparethreads",
            "maximum number",
            "pidfile",
            "mpms",
            "threadstacksize",
            "extendedstatus",
            "change",
            "sethandler",
            "require host",
            "get information",
            "allow server",
            "allow",
            "userdir sites",
            "control access",
            "userdir",
            "sslsessioncache",
            "configure",
            "ocsp stapling",
            "ssl engine",
            "sslrequire",
            "ssltls standard",
            "prng",
            "sslrandomseed",
            "openssl",
            "high",
            "first",
            "refer",
            "servername",
            "virtualhost 80",
            "serveradmin",
            "documentroot",
            "errorlog",
            "customlog",
            "hosts",
            "please",
            "almost",
            "loadfile c",
            "proxyhtmllinks",
            "ascii",
            "unicode",
            "windows",
            "must",
            "location",
            "w3c html",
            "directoryindex",
            "allowoverride",
            "manual",
            "provide access",
            "options indexes",
            "files",
            "removetype tr",
            "traditionally",
            "addlanguage da",
            "addtype",
            "a facility",
            "claim",
            "file",
            "level error",
            "sender",
            "store",
            "level",
            "facility",
            "category",
            "time",
            "host",
            "threadid",
            "function",
            "line",
            "message",
            "guest",
            "access",
            "kernel",
            "usereventagent",
            "springboard",
            "message sep",
            "message mc",
            "message secure",
            "ca message",
            "multitouchhid",
            "use directory",
            "home autohome",
            "automounter map",
            "get home",
            "ps1h",
            "make bash",
            "s checkwinsize",
            "etcbashrc",
            "termprogram",
            "level info",
            "broadcast",
            "ignore",
            "rules",
            "true",
            "t option",
            "mount",
            "force",
            "environment",
            "automountdenv",
            "promptcommand",
            "shellsessiondir",
            "histfile",
            "histfilesize",
            "terminal",
            "myvar",
            "histtimeformat",
            "arrange",
            "bashrematch",
            "tell",
            "limit",
            "order deny",
            "authtype",
            "default require",
            "require user",
            "owner",
            "authkey",
            "lpadmin",
            "order",
            "system",
            "local",
            "cups scheduler",
            "list",
            "synconclose no",
            "default user",
            "user lp",
            "group lp",
            "group value",
            "restrict access",
            "cups",
            "inpck",
            "nnnbaud",
            "berkeley",
            "parity",
            "pc entry",
            "pass8",
            "parenb istrip",
            "fixed speed",
            "entry",
            "clocal mode",
            "host database",
            "maxhistsize",
            "promptmode",
            "verbose end",
            "etcirbrcloaded",
            "default",
            "setup",
            "history file",
            "readline",
            "error",
            "searchpaths",
            "freebsd",
            "tmpdir",
            "fcodes",
            "prunepaths",
            "vartmp",
            "prunedirs",
            "filesystems",
            "status mailfrom",
            "returnpath via",
            "open directory",
            "jabber",
            "group database",
            "cyrus",
            "calendar",
            "dovecot",
            "postfix scsd",
            "networkd",
            "nroff",
            "manpath",
            "uncomment",
            "manpager",
            "whatispager",
            "manlocale",
            "every",
            "manpath optman",
            "maybe",
            "troff",
            "flags",
            "bcgjnuwz",
            "d0 j",
            "ldap defaults",
            "base dcexample",
            "uri ldap",
            "sizelimit",
            "timelimit",
            "deref",
            "syntax",
            "kerberos",
            "name",
            "corba object",
            "desc",
            "schema",
            "openldap",
            "redistribution",
            "public license",
            "license",
            "collective",
            "shall not",
            "ldap",
            "co llective",
            "equality",
            "sup name",
            "structural must",
            "singlevalue",
            "auxiliary must",
            "auxiliary may",
            "guid",
            "desc account",
            "desc mount",
            "desc password",
            "service",
            "info",
            "tiger",
            "multi",
            "d esc",
            "rfc1274",
            "structural may",
            "quality",
            "substr caseigno",
            "corba",
            "ldap directory",
            "reserved",
            "ldap server",
            "dynamic group",
            "netscape",
            "not recommended",
            "for production",
            "attribute",
            "name managedby",
            "name leaf",
            "duas",
            "internetdrafts",
            "coast",
            "project",
            "java object",
            "java class",
            "de sc",
            "pkcs",
            "inetorgperson",
            "rfc2798",
            "signeddata",
            "smime",
            "openldap note",
            "hold",
            "code",
            "java",
            "jndi reference",
            "jndi",
            "with syntax",
            "definitions",
            "kerberos v",
            "kdc schema",
            "oid base",
            "size",
            "subclass of",
            "may contain",
            "objectclass",
            "must contain",
            "matches for",
            "obsolete",
            "des c",
            "abstract must",
            "sup person",
            "microsoft",
            "advanced server",
            "schema mapping",
            "netinfo",
            "config",
            "groups",
            "netinfo preset",
            "crypt",
            "netinfo rpcs",
            "rpcs number",
            "oncrpcnumber",
            "ipnetmasknumber",
            "assistant",
            "may description",
            "rfc2307",
            "rfc2252",
            "match syntax",
            "openldaproot",
            "openldaporg",
            "openldapou",
            "equal ity",
            "kind",
            "rule",
            "attcertpath",
            "rolesyntax",
            "ldif",
            "blank",
            "ldap entry",
            "spaces",
            "cosine pilot",
            "directory forum",
            "password policy",
            "false",
            "april",
            "auxiliary",
            "passwd",
            "account",
            "desc pool",
            "unix",
            "structural",
            "sup rpcentry",
            "sup container",
            "abstract may",
            "sup ipsecbase",
            "Chelsea Manning Help Me",
            "Aishah Siti Lazim",
            "Aishah Lazim",
            "194 Green Street",
            "Human Subjects",
            "cybernetic",
            "RNA molecule",
            "matches",
            "postfix smtp",
            "domain",
            "ipv6 host",
            "reject",
            "reply",
            "prior",
            "bugs",
            "reject empty",
            "canonical",
            "tables",
            "post",
            "replace user",
            "address",
            "generic",
            "smtp",
            "isp mail",
            "mail delivery",
            "charset",
            "report",
            "postfix dsn",
            "mail returned",
            "only",
            "mime",
            "headerchecks",
            "readme files",
            "filters while",
            "posix",
            "empty",
            "body",
            "pass",
            "write",
            "date",
            "program",
            "agreement",
            "contributor",
            "recipient",
            "contribution",
            "the program",
            "corporation",
            "contributors",
            "product x",
            "as expressly",
            "arch",
            "arch x8664",
            "pipe wall",
            "wimplicit",
            "ranlib",
            "warn",
            "switch",
            "start",
            "systype",
            "smtp server",
            "specify",
            "mx host",
            "unix password",
            "user unknown",
            "pathbin",
            "postfix queue",
            "path",
            "beware",
            "class",
            "uucp",
            "shell",
            "outlook",
            "postfix master",
            "begin",
            "server admin",
            "mail backend",
            "modern smtp",
            "iana",
            "many",
            "postfix pipe",
            "recent cyrus",
            "amos gouaux",
            "old example",
            "update",
            "usrsbin",
            "file format",
            "no group",
            "daemondirectory",
            "relocated",
            "matches user",
            "synopsis",
            "or even",
            "lutz jaenicke",
            "technology",
            "cottbus",
            "germany",
            "openssl package",
            "openssl project",
            "europe",
            "remember that",
            "use of",
            "virtual",
            "virtual alias",
            "redirect mail",
            "deliver mail",
            "transport",
            "description",
            "result format",
            "bashno",
            "r etcbashrc",
            "protocol",
            "ipv6",
            "icmp",
            "cisco",
            "monitoring",
            "argus",
            "chaos",
            "rsvp",
            "encapsulation",
            "aris",
            "isis",
            "kame",
            "id key",
            "specification",
            "auto exit",
            "vpn socket",
            "networkup",
            "term",
            "devnull",
            "common setup",
            "set command",
            "sunnet manager",
            "rpcsrc",
            "netlicense",
            "apple",
            "netbootmount",
            "netbootshadow",
            "computername",
            "localonly",
            "localnetbootdir",
            "netboot",
            "define",
            "purpose",
            "networkonly",
            "waiting",
            "auditing",
            "solaris",
            "openbsm",
            "secsrvr",
            "allocation",
            "bsm event",
            "solaris kernel",
            "openbsm kernel",
            "solaris auemac",
            "solaris umount",
            "integer",
            "array",
            "data",
            "state",
            "opendirectoryd",
            "ipv4",
            "plist",
            "dict",
            "session",
            "commcenter",
            "airport",
            "cfbasichash",
            "thread",
            "cfrunloop",
            "cfrunloopmode",
            "usrbinsudo",
            "usrsbinnetbiosd",
            "removed"
          ],
          "references": [
            "afpovertcp.cfg",
            "aliases",
            "magic",
            "httpd.conf",
            "mime.types",
            "httpd-autoindex.conf",
            "httpd-default.conf",
            "httpd-languages.conf",
            "httpd-dav.conf",
            "httpd-multilang-errordoc.conf",
            "httpd-mpm.conf",
            "httpd-info.conf",
            "httpd-userdir.conf",
            "httpd-ssl.conf",
            "httpd-vhosts.conf",
            "proxy-html.conf",
            "httpd-manual.conf",
            "php7.conf",
            "mpm.conf",
            "com.apple.eventmonitor",
            "com.apple.authd",
            "com.apple.cdscheduler",
            "com.apple.contacts.ContactsAutocomplete",
            "com.apple.install",
            "com.apple.coreduetd",
            "com.apple.login.guest",
            "com.apple.mkb",
            "com.apple.mail",
            "com.apple.MessageTracer",
            "com.apple.mkb.internal",
            "com.apple.iokit.power",
            "com.apple.performance",
            "com.apple.networking.boringssl",
            "auto_master",
            "auto_home",
            "bashrc",
            "asl.conf",
            "autofs.conf",
            "bashrc_Apple_Terminal",
            "csh.cshrc",
            "csh.logout",
            "com.apple.screensharing.agent.launchd",
            "csh.login",
            "cupsd.conf",
            "cups-files.conf.default",
            "cupsd.conf.O",
            "cupsd.conf.default",
            "cups-files.conf",
            "snmp.conf",
            "snmp.conf.default",
            "dragonforce.io",
            "find.codes",
            "ftpusers",
            "hosts.equiv",
            "gettytab",
            "hosts",
            "kern_loader.conf",
            "irbrc",
            "locate.rc",
            "mail.rc",
            "group",
            "man.conf",
            "networks",
            "manpaths",
            "newsyslog.conf",
            "com.apple.slapconfig.conf",
            "files.conf",
            "com.apple.xscertd.conf",
            "wifi.conf",
            "com.apple.slapd.conf",
            "nfs.conf",
            "ntp.conf",
            "notify.conf",
            "ntp_opendirectory.conf",
            "AppleOpenLDAP.plist",
            "ldap.conf",
            "ldap.conf.default",
            "apple_auxillary.schema",
            "corba.ldif",
            "collective.schema",
            "collective.ldif",
            "core.ldif",
            "apple.schema",
            "cosine.ldif",
            "core.schema",
            "corba.schema",
            "duaconf.ldif",
            "dyngroup.ldif",
            "fmserver.schema",
            "duaconf.schema",
            "java.ldif",
            "inetorgperson.schema",
            "inetorgperson.ldif",
            "java.schema",
            "krb5-kdc.schema",
            "cosine.schema",
            "misc.ldif",
            "microsoft.std.schema",
            "misc.schema",
            "netinfo.schema",
            "nis.schema",
            "nis.ldif",
            "openldap.schema",
            "dyngroup.schema",
            "pmi.ldif",
            "ppolicy.ldif",
            "pmi.schema",
            "openldap.ldif",
            "README",
            "ppolicy.schema",
            "samba.schema",
            "microsoft.schema",
            "access",
            "custom_header_checks",
            "canonical",
            "generic",
            "bounce.cf.default",
            "header_checks",
            "LICENSE",
            "makedefs.out",
            "main.cf",
            "master.cf.default",
            "master.cf",
            "main.cf.proto",
            "master.cf.proto",
            "postfix-files",
            "relocated",
            "TLS_LICENSE",
            "virtual",
            "main.cf.default",
            "transport",
            "profile",
            "protocols",
            "racoon.conf",
            "rmtab",
            "rc.common",
            "rpc",
            "rtadvd.conf",
            "rc.netboot",
            "audit_class",
            "audit_warn",
            "audit_event",
            "audit_control"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Bahrain",
            "Israel",
            "India"
          ],
          "malware_families": [
            {
              "id": "DirectoryIndex",
              "display_name": "DirectoryIndex",
              "target": null
            },
            {
              "id": "AllowOverride",
              "display_name": "AllowOverride",
              "target": null
            },
            {
              "id": "Malaysia, Truly Asia",
              "display_name": "Malaysia, Truly Asia",
              "target": null
            },
            {
              "id": "9002 RAT",
              "display_name": "9002 RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/PSMPC_386",
              "display_name": "Virus:DOS/PSMPC_386",
              "target": "/malware/Virus:DOS/PSMPC_386"
            },
            {
              "id": "TEL:TrojanSpy:Win32/KediRat",
              "display_name": "TEL:TrojanSpy:Win32/KediRat",
              "target": null
            },
            {
              "id": "TrojanSpy:iOS/XcodeGhost",
              "display_name": "TrojanSpy:iOS/XcodeGhost",
              "target": "/malware/TrojanSpy:iOS/XcodeGhost"
            },
            {
              "id": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
              "display_name": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
              "target": null
            },
            {
              "id": "Ultra VNC",
              "display_name": "Ultra VNC",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Bridge",
              "display_name": "TrojanDownloader:Win32/Bridge",
              "target": "/malware/TrojanDownloader:Win32/Bridge"
            },
            {
              "id": "Virus:DOS/Cyberwar_5300",
              "display_name": "Virus:DOS/Cyberwar_5300",
              "target": "/malware/Virus:DOS/Cyberwar_5300"
            },
            {
              "id": "Backdoor:Win32/Espion",
              "display_name": "Backdoor:Win32/Espion",
              "target": "/malware/Backdoor:Win32/Espion"
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            },
            {
              "id": "Pegasus for Android - S0316",
              "display_name": "Pegasus for Android - S0316",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
              "display_name": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:BackdoorLinux/Mirai",
              "display_name": "ALF:HeraklezEval:BackdoorLinux/Mirai",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
              "display_name": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1404",
              "name": "Exploit OS Vulnerability",
              "display_name": "T1404 - Exploit OS Vulnerability"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1001.002",
              "name": "Steganography",
              "display_name": "T1001.002 - Steganography"
            },
            {
              "id": "T1003.004",
              "name": "LSA Secrets",
              "display_name": "T1003.004 - LSA Secrets"
            },
            {
              "id": "T1001.001",
              "name": "Junk Data",
              "display_name": "T1001.001 - Junk Data"
            },
            {
              "id": "T1003.001",
              "name": "LSASS Memory",
              "display_name": "T1003.001 - LSASS Memory"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1026",
              "name": "Multiband Communication",
              "display_name": "T1026 - Multiband Communication"
            },
            {
              "id": "T1562.004",
              "name": "Disable or Modify System Firewall",
              "display_name": "T1562.004 - Disable or Modify System Firewall"
            },
            {
              "id": "T1025",
              "name": "Data from Removable Media",
              "display_name": "T1025 - Data from Removable Media"
            },
            {
              "id": "T1055.002",
              "name": "Portable Executable Injection",
              "display_name": "T1055.002 - Portable Executable Injection"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1021.006",
              "name": "Windows Remote Management",
              "display_name": "T1021.006 - Windows Remote Management"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            }
          ],
          "industries": [
            "Media",
            "LGBTQ+ Activists",
            "Technology",
            "Telecommunications",
            "Hospitality",
            "Energy",
            "NGO",
            "Semiconductor",
            "Human Subjects"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ravescoutllc.",
            "id": "288912",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 669,
            "URL": 1976,
            "email": 21,
            "hostname": 1198,
            "FileHash-SHA256": 277,
            "CVE": 2,
            "CIDR": 3
          },
          "indicator_count": 4146,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 35,
          "modified_text": "509 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709929c16e0817dea8f7ff",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-12-06T15:54:17.119000",
          "created": "2023-12-06T15:54:17.119000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 963,
            "domain": 255,
            "hostname": 730,
            "URL": 2400,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50,
            "email": 1
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "866 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6431d1244a8ae763a8d5ed74",
          "name": "http://hm732.com/ - v2 all and sundrie",
          "description": "",
          "modified": "2023-05-08T20:02:01.231000",
          "created": "2023-04-08T20:40:04.099000",
          "tags": [
            "trojan",
            "chromeua",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "unicode",
            "optin",
            "edgeua",
            "span",
            "error",
            "win64",
            "date",
            "format",
            "addressbar",
            "generator",
            "path",
            "template",
            "suspicious",
            "unknown",
            "void",
            "desktop",
            "dark",
            "light",
            "mozilla",
            "this",
            "cookie",
            "meta",
            "iframe",
            "window",
            "legend",
            "null",
            "wind",
            "strings",
            "qakbot",
            "http://hm732.com/"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/bca1a3df6a236ec7870fbae8a5d5c5597347dad17f9b00e49c05ab1eb8e87f83/64319a805d10c703330b366e"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2345,
            "hostname": 951,
            "domain": 405,
            "FileHash-SHA256": 82,
            "FileHash-MD5": 63,
            "FileHash-SHA1": 61,
            "email": 5
          },
          "indicator_count": 3912,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1078 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642fbeba84c7b4cbee43200a",
          "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
          "description": "",
          "modified": "2023-05-07T00:00:36.624000",
          "created": "2023-04-07T06:56:58.157000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "chromeua",
            "ansi",
            "dropped file",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "optin",
            "edgeua",
            "unicode",
            "span",
            "error",
            "generator",
            "void",
            "august",
            "body",
            "path",
            "close",
            "format",
            "template",
            "suspicious",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "meta",
            "chat",
            "this",
            "small",
            "june",
            "footer",
            "window",
            "legend",
            "hybrid",
            "click",
            "null",
            "april",
            "general",
            "strings",
            "qakbot"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2400,
            "hostname": 730,
            "domain": 255,
            "FileHash-SHA256": 963,
            "email": 1,
            "FileHash-MD5": 50,
            "FileHash-SHA1": 50
          },
          "indicator_count": 4449,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "1079 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642db7b656049e54b2f71c20",
          "name": "masterkey.com.ua/download/MKClientSetup.exe - hybrid 100/100",
          "description": "The entire \"Ad\" eco system is compromised via all main channels , ie google, bing, msn etc utilising many top level domains and brands, its truly the biggest suppky chain attack ever known. So enormously thats its unbelievable and I guess many peeps just cant see it because its simply to overwhelming to consider a reality p plus many perhaps cant digest the advanced use of AI and self repairing neural networks along that are designed to work on standard default configs. its not till you step out of the defaults that you start to see nefariousness",
          "modified": "2023-05-05T16:00:23.366000",
          "created": "2023-04-05T18:02:30.403000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1081 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "642c3e46df286e02b6685576",
          "name": "http://mat8a.xyz/ - IRAN",
          "description": "",
          "modified": "2023-05-04T14:02:11.229000",
          "created": "2023-04-04T15:12:06.538000",
          "tags": [
            "malware",
            "trojan",
            "dropped file",
            "ansi",
            "chromeua",
            "optout",
            "runtime data",
            "object",
            "drmedgeua",
            "edgeua",
            "optin",
            "unicode",
            "error",
            "generator",
            "span",
            "win64",
            "void",
            "entropy",
            "date",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "cookie",
            "cray",
            "smwg",
            "legend",
            "eret",
            "nuke",
            "lion",
            "ahav",
            "core",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "javascript",
            "http://mat8a.xyz/"
          ],
          "references": [
            "http://mat8a.xyz/",
            "https://hybrid-analysis.com/sample/aae2d9c3cce607a9fef69337ac7924d67daa2eef5a385540445636a4e6f89bc3/6426fb0cd69b3b6b7e02b588"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2512,
            "hostname": 835,
            "domain": 233,
            "FileHash-SHA256": 118,
            "FileHash-MD5": 60,
            "FileHash-SHA1": 54,
            "email": 2
          },
          "indicator_count": 3814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1082 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "main.cf.default",
        "https://hybrid-analysis.com/sample/bca1a3df6a236ec7870fbae8a5d5c5597347dad17f9b00e49c05ab1eb8e87f83/64319a805d10c703330b366e",
        "apple.schema",
        "httpd-default.conf",
        "rc.common",
        "hosts.equiv",
        "rtadvd.conf",
        "snmp.conf",
        "TLS_LICENSE",
        "inetorgperson.ldif",
        "httpd-mpm.conf",
        "virtual",
        "openldap.ldif",
        "com.apple.mkb.internal",
        "ftpusers",
        "com.apple.authd",
        "files.conf",
        "header_checks",
        "cosine.schema",
        "nfs.conf",
        "com.apple.MessageTracer",
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d",
        "httpd-vhosts.conf",
        "ntp_opendirectory.conf",
        "apple_auxillary.schema",
        "http://mat8a.xyz/",
        "httpd-dav.conf",
        "autofs.conf",
        "gettytab",
        "httpd-multilang-errordoc.conf",
        "snmp.conf.default",
        "dyngroup.ldif",
        "ppolicy.schema",
        "auto_home",
        "java.ldif",
        "locate.rc",
        "misc.schema",
        "LICENSE",
        "networks",
        "httpd-autoindex.conf",
        "mpm.conf",
        "postfix-files",
        "cosine.ldif",
        "httpd-info.conf",
        "racoon.conf",
        "rc.netboot",
        "duaconf.schema",
        "hosts",
        "master.cf",
        "microsoft.schema",
        "csh.cshrc",
        "AppleOpenLDAP.plist",
        "https://hybrid-analysis.com/sample/aae2d9c3cce607a9fef69337ac7924d67daa2eef5a385540445636a4e6f89bc3/6426fb0cd69b3b6b7e02b588",
        "java.schema",
        "com.apple.iokit.power",
        "collective.ldif",
        "cupsd.conf.O",
        "microsoft.std.schema",
        "ppolicy.ldif",
        "makedefs.out",
        "mail.rc",
        "nis.schema",
        "pmi.schema",
        "csh.logout",
        "dragonforce.io",
        "com.apple.mail",
        "com.apple.screensharing.agent.launchd",
        "main.cf.proto",
        "csh.login",
        "notify.conf",
        "com.apple.slapconfig.conf",
        "canonical",
        "httpd-userdir.conf",
        "pmi.ldif",
        "kern_loader.conf",
        "com.apple.performance",
        "ldap.conf",
        "audit_warn",
        "custom_header_checks",
        "com.apple.xscertd.conf",
        "rmtab",
        "man.conf",
        "httpd-manual.conf",
        "fmserver.schema",
        "nis.ldif",
        "newsyslog.conf",
        "collective.schema",
        "php7.conf",
        "afpovertcp.cfg",
        "httpd-ssl.conf",
        "audit_event",
        "inetorgperson.schema",
        "manpaths",
        "com.apple.contacts.ContactsAutocomplete",
        "audit_class",
        "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225",
        "main.cf",
        "asl.conf",
        "krb5-kdc.schema",
        "generic",
        "proxy-html.conf",
        "cupsd.conf.default",
        "dyngroup.schema",
        "irbrc",
        "bounce.cf.default",
        "rpc",
        "ntp.conf",
        "com.apple.mkb",
        "com.apple.slapd.conf",
        "core.schema",
        "duaconf.ldif",
        "bashrc",
        "group",
        "com.apple.login.guest",
        "master.cf.default",
        "profile",
        "mime.types",
        "master.cf.proto",
        "samba.schema",
        "cups-files.conf.default",
        "com.apple.networking.boringssl",
        "cupsd.conf",
        "transport",
        "auto_master",
        "com.apple.install",
        "audit_control",
        "httpd-languages.conf",
        "bashrc_Apple_Terminal",
        "find.codes",
        "magic",
        "httpd.conf",
        "com.apple.cdscheduler",
        "openldap.schema",
        "wifi.conf",
        "com.apple.eventmonitor",
        "misc.ldif",
        "corba.schema",
        "ldap.conf.default",
        "cups-files.conf",
        "aliases",
        "com.apple.coreduetd",
        "netinfo.schema",
        "README",
        "core.ldif",
        "access",
        "relocated",
        "corba.ldif",
        "protocols"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Allowoverride",
            "Pegasus for ios - s0289",
            "Backdoor:win32/espion",
            "Malaysia, truly asia",
            "Pegasus - mob-s0005",
            "Trojandownloader:win32/bridge",
            "Alf:heraklezeval:backdoor:linux/mirai",
            "Virus:dos/psmpc_386",
            "Pegasus for android - s0316",
            "Tel:trojanspy:win32/kedirat",
            "9002 rat",
            "Trojanspy:ios/xcodeghost",
            "Virus:dos/cyberwar_5300",
            "Alf:heraklezeval:backdoor:linux/tsunami",
            "Alf:heraklezeval:backdoorlinux/mirai",
            "Ultra vnc",
            "Directoryindex",
            "Alf:hstr:trojanspy:msil/keylogger"
          ],
          "industries": [
            "Ngo",
            "Hospitality",
            "Energy",
            "Telecommunications",
            "Media",
            "Human subjects",
            "Lgbtq+ activists",
            "Technology",
            "Semiconductor"
          ],
          "unique_indicators": 17125
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/call2.team",
    "whois": "http://whois.domaintools.com/call2.team",
    "domain": "call2.team",
    "hostname": "dusee05.devtest.call2.team"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "69c1bd40f81db45dc044697c",
      "name": "Masterkey Clone By CallmeDoris",
      "description": "",
      "modified": "2026-03-23T22:22:56.940000",
      "created": "2026-03-23T22:22:56.940000",
      "tags": [
        "dropped file",
        "chromeua",
        "runtime data",
        "drmedgeua",
        "edgeua",
        "generator",
        "win64",
        "null",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "iframe",
        "cookie",
        "meta",
        "body",
        "legend",
        "dwis",
        "core",
        "tear",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "://masterkey.com.ua/download/MKClientSetup.exe"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "642db7b656049e54b2f71c20",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 949,
        "URL": 5642,
        "CVE": 2,
        "domain": 509,
        "FileHash-SHA256": 293,
        "FileHash-MD5": 550,
        "FileHash-SHA1": 60,
        "email": 5
      },
      "indicator_count": 8010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "28 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "671fd3afa974b93284d6bac1",
      "name": "dragonforce.io",
      "description": "Throw your MacBook in the trash, where the hackers belong.",
      "modified": "2024-11-27T17:01:13.516000",
      "created": "2024-10-28T18:10:55.712000",
      "tags": [
        "copyright",
        "apple computer",
        "tcpip",
        "supported",
        "quantum",
        "postfix",
        "mail",
        "aliases",
        "postfix version",
        "restrict",
        "wietse venema",
        "sample",
        "note",
        "person",
        "basic system",
        "general",
        "column",
        "tiff",
        "linus walleij",
        "triad",
        "greg roelofs",
        "html",
        "daniel quinlan",
        "aiff",
        "music",
        "wave",
        "formats",
        "magic",
        "form",
        "crunch",
        "freeze",
        "maker",
        "format",
        "postscript",
        "this",
        "ifmodule",
        "include",
        "virtualhost",
        "directory",
        "require",
        "serverroot",
        "listen",
        "ifdefine",
        "loadmodule",
        "errordocument",
        "apache",
        "win32",
        "example",
        "main",
        "webdav",
        "internet",
        "mime type",
        "xlm xla",
        "xlc xlt",
        "xlam",
        "xlsb",
        "xlsm",
        "xltm",
        "z7 z8",
        "xhtml xht",
        "addiconbytype",
        "adddescription",
        "fancyindexed",
        "gzip",
        "indexignore",
        "indexes",
        "versionsort",
        "fancyindexing",
        "alias icons",
        "full",
        "minrate500",
        "keepalive",
        "prod",
        "email",
        "apache http",
        "server",
        "timeout",
        "number",
        "minimal",
        "major",
        "addlanguage",
        "addcharset",
        "defaultlanguage",
        "fallback",
        "polish",
        "addlanguage pl",
        "catalan",
        "english",
        "greekmodern",
        "korean",
        "turkish",
        "browsermatch",
        "davlockdb",
        "requireany",
        "usergroup",
        "alias",
        "authtype digest",
        "davupload admin",
        "authuserfile",
        "errorhttp",
        "http",
        "yourincludepath",
        "apache version",
        "serversignature",
        "alias error",
        "addhandler",
        "threadsperchild",
        "startservers",
        "minsparethreads",
        "maxsparethreads",
        "maximum number",
        "pidfile",
        "mpms",
        "threadstacksize",
        "extendedstatus",
        "change",
        "sethandler",
        "require host",
        "get information",
        "allow server",
        "allow",
        "userdir sites",
        "control access",
        "userdir",
        "sslsessioncache",
        "configure",
        "ocsp stapling",
        "ssl engine",
        "sslrequire",
        "ssltls standard",
        "prng",
        "sslrandomseed",
        "openssl",
        "high",
        "first",
        "refer",
        "servername",
        "virtualhost 80",
        "serveradmin",
        "documentroot",
        "errorlog",
        "customlog",
        "hosts",
        "please",
        "almost",
        "loadfile c",
        "proxyhtmllinks",
        "ascii",
        "unicode",
        "windows",
        "must",
        "location",
        "w3c html",
        "directoryindex",
        "allowoverride",
        "manual",
        "provide access",
        "options indexes",
        "files",
        "removetype tr",
        "traditionally",
        "addlanguage da",
        "addtype",
        "a facility",
        "claim",
        "file",
        "level error",
        "sender",
        "store",
        "level",
        "facility",
        "category",
        "time",
        "host",
        "threadid",
        "function",
        "line",
        "message",
        "guest",
        "access",
        "kernel",
        "usereventagent",
        "springboard",
        "message sep",
        "message mc",
        "message secure",
        "ca message",
        "multitouchhid",
        "use directory",
        "home autohome",
        "automounter map",
        "get home",
        "ps1h",
        "make bash",
        "s checkwinsize",
        "etcbashrc",
        "termprogram",
        "level info",
        "broadcast",
        "ignore",
        "rules",
        "true",
        "t option",
        "mount",
        "force",
        "environment",
        "automountdenv",
        "promptcommand",
        "shellsessiondir",
        "histfile",
        "histfilesize",
        "terminal",
        "myvar",
        "histtimeformat",
        "arrange",
        "bashrematch",
        "tell",
        "limit",
        "order deny",
        "authtype",
        "default require",
        "require user",
        "owner",
        "authkey",
        "lpadmin",
        "order",
        "system",
        "local",
        "cups scheduler",
        "list",
        "synconclose no",
        "default user",
        "user lp",
        "group lp",
        "group value",
        "restrict access",
        "cups",
        "inpck",
        "nnnbaud",
        "berkeley",
        "parity",
        "pc entry",
        "pass8",
        "parenb istrip",
        "fixed speed",
        "entry",
        "clocal mode",
        "host database",
        "maxhistsize",
        "promptmode",
        "verbose end",
        "etcirbrcloaded",
        "default",
        "setup",
        "history file",
        "readline",
        "error",
        "searchpaths",
        "freebsd",
        "tmpdir",
        "fcodes",
        "prunepaths",
        "vartmp",
        "prunedirs",
        "filesystems",
        "status mailfrom",
        "returnpath via",
        "open directory",
        "jabber",
        "group database",
        "cyrus",
        "calendar",
        "dovecot",
        "postfix scsd",
        "networkd",
        "nroff",
        "manpath",
        "uncomment",
        "manpager",
        "whatispager",
        "manlocale",
        "every",
        "manpath optman",
        "maybe",
        "troff",
        "flags",
        "bcgjnuwz",
        "d0 j",
        "ldap defaults",
        "base dcexample",
        "uri ldap",
        "sizelimit",
        "timelimit",
        "deref",
        "syntax",
        "kerberos",
        "name",
        "corba object",
        "desc",
        "schema",
        "openldap",
        "redistribution",
        "public license",
        "license",
        "collective",
        "shall not",
        "ldap",
        "co llective",
        "equality",
        "sup name",
        "structural must",
        "singlevalue",
        "auxiliary must",
        "auxiliary may",
        "guid",
        "desc account",
        "desc mount",
        "desc password",
        "service",
        "info",
        "tiger",
        "multi",
        "d esc",
        "rfc1274",
        "structural may",
        "quality",
        "substr caseigno",
        "corba",
        "ldap directory",
        "reserved",
        "ldap server",
        "dynamic group",
        "netscape",
        "not recommended",
        "for production",
        "attribute",
        "name managedby",
        "name leaf",
        "duas",
        "internetdrafts",
        "coast",
        "project",
        "java object",
        "java class",
        "de sc",
        "pkcs",
        "inetorgperson",
        "rfc2798",
        "signeddata",
        "smime",
        "openldap note",
        "hold",
        "code",
        "java",
        "jndi reference",
        "jndi",
        "with syntax",
        "definitions",
        "kerberos v",
        "kdc schema",
        "oid base",
        "size",
        "subclass of",
        "may contain",
        "objectclass",
        "must contain",
        "matches for",
        "obsolete",
        "des c",
        "abstract must",
        "sup person",
        "microsoft",
        "advanced server",
        "schema mapping",
        "netinfo",
        "config",
        "groups",
        "netinfo preset",
        "crypt",
        "netinfo rpcs",
        "rpcs number",
        "oncrpcnumber",
        "ipnetmasknumber",
        "assistant",
        "may description",
        "rfc2307",
        "rfc2252",
        "match syntax",
        "openldaproot",
        "openldaporg",
        "openldapou",
        "equal ity",
        "kind",
        "rule",
        "attcertpath",
        "rolesyntax",
        "ldif",
        "blank",
        "ldap entry",
        "spaces",
        "cosine pilot",
        "directory forum",
        "password policy",
        "false",
        "april",
        "auxiliary",
        "passwd",
        "account",
        "desc pool",
        "unix",
        "structural",
        "sup rpcentry",
        "sup container",
        "abstract may",
        "sup ipsecbase",
        "Chelsea Manning Help Me",
        "Aishah Siti Lazim",
        "Aishah Lazim",
        "194 Green Street",
        "Human Subjects",
        "cybernetic",
        "RNA molecule",
        "matches",
        "postfix smtp",
        "domain",
        "ipv6 host",
        "reject",
        "reply",
        "prior",
        "bugs",
        "reject empty",
        "canonical",
        "tables",
        "post",
        "replace user",
        "address",
        "generic",
        "smtp",
        "isp mail",
        "mail delivery",
        "charset",
        "report",
        "postfix dsn",
        "mail returned",
        "only",
        "mime",
        "headerchecks",
        "readme files",
        "filters while",
        "posix",
        "empty",
        "body",
        "pass",
        "write",
        "date",
        "program",
        "agreement",
        "contributor",
        "recipient",
        "contribution",
        "the program",
        "corporation",
        "contributors",
        "product x",
        "as expressly",
        "arch",
        "arch x8664",
        "pipe wall",
        "wimplicit",
        "ranlib",
        "warn",
        "switch",
        "start",
        "systype",
        "smtp server",
        "specify",
        "mx host",
        "unix password",
        "user unknown",
        "pathbin",
        "postfix queue",
        "path",
        "beware",
        "class",
        "uucp",
        "shell",
        "outlook",
        "postfix master",
        "begin",
        "server admin",
        "mail backend",
        "modern smtp",
        "iana",
        "many",
        "postfix pipe",
        "recent cyrus",
        "amos gouaux",
        "old example",
        "update",
        "usrsbin",
        "file format",
        "no group",
        "daemondirectory",
        "relocated",
        "matches user",
        "synopsis",
        "or even",
        "lutz jaenicke",
        "technology",
        "cottbus",
        "germany",
        "openssl package",
        "openssl project",
        "europe",
        "remember that",
        "use of",
        "virtual",
        "virtual alias",
        "redirect mail",
        "deliver mail",
        "transport",
        "description",
        "result format",
        "bashno",
        "r etcbashrc",
        "protocol",
        "ipv6",
        "icmp",
        "cisco",
        "monitoring",
        "argus",
        "chaos",
        "rsvp",
        "encapsulation",
        "aris",
        "isis",
        "kame",
        "id key",
        "specification",
        "auto exit",
        "vpn socket",
        "networkup",
        "term",
        "devnull",
        "common setup",
        "set command",
        "sunnet manager",
        "rpcsrc",
        "netlicense",
        "apple",
        "netbootmount",
        "netbootshadow",
        "computername",
        "localonly",
        "localnetbootdir",
        "netboot",
        "define",
        "purpose",
        "networkonly",
        "waiting",
        "auditing",
        "solaris",
        "openbsm",
        "secsrvr",
        "allocation",
        "bsm event",
        "solaris kernel",
        "openbsm kernel",
        "solaris auemac",
        "solaris umount",
        "integer",
        "array",
        "data",
        "state",
        "opendirectoryd",
        "ipv4",
        "plist",
        "dict",
        "session",
        "commcenter",
        "airport",
        "cfbasichash",
        "thread",
        "cfrunloop",
        "cfrunloopmode",
        "usrbinsudo",
        "usrsbinnetbiosd",
        "removed"
      ],
      "references": [
        "afpovertcp.cfg",
        "aliases",
        "magic",
        "httpd.conf",
        "mime.types",
        "httpd-autoindex.conf",
        "httpd-default.conf",
        "httpd-languages.conf",
        "httpd-dav.conf",
        "httpd-multilang-errordoc.conf",
        "httpd-mpm.conf",
        "httpd-info.conf",
        "httpd-userdir.conf",
        "httpd-ssl.conf",
        "httpd-vhosts.conf",
        "proxy-html.conf",
        "httpd-manual.conf",
        "php7.conf",
        "mpm.conf",
        "com.apple.eventmonitor",
        "com.apple.authd",
        "com.apple.cdscheduler",
        "com.apple.contacts.ContactsAutocomplete",
        "com.apple.install",
        "com.apple.coreduetd",
        "com.apple.login.guest",
        "com.apple.mkb",
        "com.apple.mail",
        "com.apple.MessageTracer",
        "com.apple.mkb.internal",
        "com.apple.iokit.power",
        "com.apple.performance",
        "com.apple.networking.boringssl",
        "auto_master",
        "auto_home",
        "bashrc",
        "asl.conf",
        "autofs.conf",
        "bashrc_Apple_Terminal",
        "csh.cshrc",
        "csh.logout",
        "com.apple.screensharing.agent.launchd",
        "csh.login",
        "cupsd.conf",
        "cups-files.conf.default",
        "cupsd.conf.O",
        "cupsd.conf.default",
        "cups-files.conf",
        "snmp.conf",
        "snmp.conf.default",
        "dragonforce.io",
        "find.codes",
        "ftpusers",
        "hosts.equiv",
        "gettytab",
        "hosts",
        "kern_loader.conf",
        "irbrc",
        "locate.rc",
        "mail.rc",
        "group",
        "man.conf",
        "networks",
        "manpaths",
        "newsyslog.conf",
        "com.apple.slapconfig.conf",
        "files.conf",
        "com.apple.xscertd.conf",
        "wifi.conf",
        "com.apple.slapd.conf",
        "nfs.conf",
        "ntp.conf",
        "notify.conf",
        "ntp_opendirectory.conf",
        "AppleOpenLDAP.plist",
        "ldap.conf",
        "ldap.conf.default",
        "apple_auxillary.schema",
        "corba.ldif",
        "collective.schema",
        "collective.ldif",
        "core.ldif",
        "apple.schema",
        "cosine.ldif",
        "core.schema",
        "corba.schema",
        "duaconf.ldif",
        "dyngroup.ldif",
        "fmserver.schema",
        "duaconf.schema",
        "java.ldif",
        "inetorgperson.schema",
        "inetorgperson.ldif",
        "java.schema",
        "krb5-kdc.schema",
        "cosine.schema",
        "misc.ldif",
        "microsoft.std.schema",
        "misc.schema",
        "netinfo.schema",
        "nis.schema",
        "nis.ldif",
        "openldap.schema",
        "dyngroup.schema",
        "pmi.ldif",
        "ppolicy.ldif",
        "pmi.schema",
        "openldap.ldif",
        "README",
        "ppolicy.schema",
        "samba.schema",
        "microsoft.schema",
        "access",
        "custom_header_checks",
        "canonical",
        "generic",
        "bounce.cf.default",
        "header_checks",
        "LICENSE",
        "makedefs.out",
        "main.cf",
        "master.cf.default",
        "master.cf",
        "main.cf.proto",
        "master.cf.proto",
        "postfix-files",
        "relocated",
        "TLS_LICENSE",
        "virtual",
        "main.cf.default",
        "transport",
        "profile",
        "protocols",
        "racoon.conf",
        "rmtab",
        "rc.common",
        "rpc",
        "rtadvd.conf",
        "rc.netboot",
        "audit_class",
        "audit_warn",
        "audit_event",
        "audit_control"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Bahrain",
        "Israel",
        "India"
      ],
      "malware_families": [
        {
          "id": "DirectoryIndex",
          "display_name": "DirectoryIndex",
          "target": null
        },
        {
          "id": "AllowOverride",
          "display_name": "AllowOverride",
          "target": null
        },
        {
          "id": "Malaysia, Truly Asia",
          "display_name": "Malaysia, Truly Asia",
          "target": null
        },
        {
          "id": "9002 RAT",
          "display_name": "9002 RAT",
          "target": null
        },
        {
          "id": "Virus:DOS/PSMPC_386",
          "display_name": "Virus:DOS/PSMPC_386",
          "target": "/malware/Virus:DOS/PSMPC_386"
        },
        {
          "id": "TEL:TrojanSpy:Win32/KediRat",
          "display_name": "TEL:TrojanSpy:Win32/KediRat",
          "target": null
        },
        {
          "id": "TrojanSpy:iOS/XcodeGhost",
          "display_name": "TrojanSpy:iOS/XcodeGhost",
          "target": "/malware/TrojanSpy:iOS/XcodeGhost"
        },
        {
          "id": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
          "display_name": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
          "target": null
        },
        {
          "id": "Ultra VNC",
          "display_name": "Ultra VNC",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Bridge",
          "display_name": "TrojanDownloader:Win32/Bridge",
          "target": "/malware/TrojanDownloader:Win32/Bridge"
        },
        {
          "id": "Virus:DOS/Cyberwar_5300",
          "display_name": "Virus:DOS/Cyberwar_5300",
          "target": "/malware/Virus:DOS/Cyberwar_5300"
        },
        {
          "id": "Backdoor:Win32/Espion",
          "display_name": "Backdoor:Win32/Espion",
          "target": "/malware/Backdoor:Win32/Espion"
        },
        {
          "id": "Pegasus for iOS - S0289",
          "display_name": "Pegasus for iOS - S0289",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        },
        {
          "id": "Pegasus for Android - S0316",
          "display_name": "Pegasus for Android - S0316",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
          "display_name": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:BackdoorLinux/Mirai",
          "display_name": "ALF:HeraklezEval:BackdoorLinux/Mirai",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
          "display_name": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1404",
          "name": "Exploit OS Vulnerability",
          "display_name": "T1404 - Exploit OS Vulnerability"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1001.002",
          "name": "Steganography",
          "display_name": "T1001.002 - Steganography"
        },
        {
          "id": "T1003.004",
          "name": "LSA Secrets",
          "display_name": "T1003.004 - LSA Secrets"
        },
        {
          "id": "T1001.001",
          "name": "Junk Data",
          "display_name": "T1001.001 - Junk Data"
        },
        {
          "id": "T1003.001",
          "name": "LSASS Memory",
          "display_name": "T1003.001 - LSASS Memory"
        },
        {
          "id": "T1003.005",
          "name": "Cached Domain Credentials",
          "display_name": "T1003.005 - Cached Domain Credentials"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1026",
          "name": "Multiband Communication",
          "display_name": "T1026 - Multiband Communication"
        },
        {
          "id": "T1562.004",
          "name": "Disable or Modify System Firewall",
          "display_name": "T1562.004 - Disable or Modify System Firewall"
        },
        {
          "id": "T1025",
          "name": "Data from Removable Media",
          "display_name": "T1025 - Data from Removable Media"
        },
        {
          "id": "T1055.002",
          "name": "Portable Executable Injection",
          "display_name": "T1055.002 - Portable Executable Injection"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1021.006",
          "name": "Windows Remote Management",
          "display_name": "T1021.006 - Windows Remote Management"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        }
      ],
      "industries": [
        "Media",
        "LGBTQ+ Activists",
        "Technology",
        "Telecommunications",
        "Hospitality",
        "Energy",
        "NGO",
        "Semiconductor",
        "Human Subjects"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 34,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ravescoutllc.",
        "id": "288912",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 669,
        "URL": 1976,
        "email": 21,
        "hostname": 1198,
        "FileHash-SHA256": 277,
        "CVE": 2,
        "CIDR": 3
      },
      "indicator_count": 4146,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 33,
      "modified_text": "509 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "671fd3b07ffb71116f2db7fa",
      "name": "dragonforce.io",
      "description": "Throw your MacBook in the trash, where the hackers belong.",
      "modified": "2024-11-27T17:01:13.516000",
      "created": "2024-10-28T18:10:56.355000",
      "tags": [
        "copyright",
        "apple computer",
        "tcpip",
        "supported",
        "quantum",
        "postfix",
        "mail",
        "aliases",
        "postfix version",
        "restrict",
        "wietse venema",
        "sample",
        "note",
        "person",
        "basic system",
        "general",
        "column",
        "tiff",
        "linus walleij",
        "triad",
        "greg roelofs",
        "html",
        "daniel quinlan",
        "aiff",
        "music",
        "wave",
        "formats",
        "magic",
        "form",
        "crunch",
        "freeze",
        "maker",
        "format",
        "postscript",
        "this",
        "ifmodule",
        "include",
        "virtualhost",
        "directory",
        "require",
        "serverroot",
        "listen",
        "ifdefine",
        "loadmodule",
        "errordocument",
        "apache",
        "win32",
        "example",
        "main",
        "webdav",
        "internet",
        "mime type",
        "xlm xla",
        "xlc xlt",
        "xlam",
        "xlsb",
        "xlsm",
        "xltm",
        "z7 z8",
        "xhtml xht",
        "addiconbytype",
        "adddescription",
        "fancyindexed",
        "gzip",
        "indexignore",
        "indexes",
        "versionsort",
        "fancyindexing",
        "alias icons",
        "full",
        "minrate500",
        "keepalive",
        "prod",
        "email",
        "apache http",
        "server",
        "timeout",
        "number",
        "minimal",
        "major",
        "addlanguage",
        "addcharset",
        "defaultlanguage",
        "fallback",
        "polish",
        "addlanguage pl",
        "catalan",
        "english",
        "greekmodern",
        "korean",
        "turkish",
        "browsermatch",
        "davlockdb",
        "requireany",
        "usergroup",
        "alias",
        "authtype digest",
        "davupload admin",
        "authuserfile",
        "errorhttp",
        "http",
        "yourincludepath",
        "apache version",
        "serversignature",
        "alias error",
        "addhandler",
        "threadsperchild",
        "startservers",
        "minsparethreads",
        "maxsparethreads",
        "maximum number",
        "pidfile",
        "mpms",
        "threadstacksize",
        "extendedstatus",
        "change",
        "sethandler",
        "require host",
        "get information",
        "allow server",
        "allow",
        "userdir sites",
        "control access",
        "userdir",
        "sslsessioncache",
        "configure",
        "ocsp stapling",
        "ssl engine",
        "sslrequire",
        "ssltls standard",
        "prng",
        "sslrandomseed",
        "openssl",
        "high",
        "first",
        "refer",
        "servername",
        "virtualhost 80",
        "serveradmin",
        "documentroot",
        "errorlog",
        "customlog",
        "hosts",
        "please",
        "almost",
        "loadfile c",
        "proxyhtmllinks",
        "ascii",
        "unicode",
        "windows",
        "must",
        "location",
        "w3c html",
        "directoryindex",
        "allowoverride",
        "manual",
        "provide access",
        "options indexes",
        "files",
        "removetype tr",
        "traditionally",
        "addlanguage da",
        "addtype",
        "a facility",
        "claim",
        "file",
        "level error",
        "sender",
        "store",
        "level",
        "facility",
        "category",
        "time",
        "host",
        "threadid",
        "function",
        "line",
        "message",
        "guest",
        "access",
        "kernel",
        "usereventagent",
        "springboard",
        "message sep",
        "message mc",
        "message secure",
        "ca message",
        "multitouchhid",
        "use directory",
        "home autohome",
        "automounter map",
        "get home",
        "ps1h",
        "make bash",
        "s checkwinsize",
        "etcbashrc",
        "termprogram",
        "level info",
        "broadcast",
        "ignore",
        "rules",
        "true",
        "t option",
        "mount",
        "force",
        "environment",
        "automountdenv",
        "promptcommand",
        "shellsessiondir",
        "histfile",
        "histfilesize",
        "terminal",
        "myvar",
        "histtimeformat",
        "arrange",
        "bashrematch",
        "tell",
        "limit",
        "order deny",
        "authtype",
        "default require",
        "require user",
        "owner",
        "authkey",
        "lpadmin",
        "order",
        "system",
        "local",
        "cups scheduler",
        "list",
        "synconclose no",
        "default user",
        "user lp",
        "group lp",
        "group value",
        "restrict access",
        "cups",
        "inpck",
        "nnnbaud",
        "berkeley",
        "parity",
        "pc entry",
        "pass8",
        "parenb istrip",
        "fixed speed",
        "entry",
        "clocal mode",
        "host database",
        "maxhistsize",
        "promptmode",
        "verbose end",
        "etcirbrcloaded",
        "default",
        "setup",
        "history file",
        "readline",
        "error",
        "searchpaths",
        "freebsd",
        "tmpdir",
        "fcodes",
        "prunepaths",
        "vartmp",
        "prunedirs",
        "filesystems",
        "status mailfrom",
        "returnpath via",
        "open directory",
        "jabber",
        "group database",
        "cyrus",
        "calendar",
        "dovecot",
        "postfix scsd",
        "networkd",
        "nroff",
        "manpath",
        "uncomment",
        "manpager",
        "whatispager",
        "manlocale",
        "every",
        "manpath optman",
        "maybe",
        "troff",
        "flags",
        "bcgjnuwz",
        "d0 j",
        "ldap defaults",
        "base dcexample",
        "uri ldap",
        "sizelimit",
        "timelimit",
        "deref",
        "syntax",
        "kerberos",
        "name",
        "corba object",
        "desc",
        "schema",
        "openldap",
        "redistribution",
        "public license",
        "license",
        "collective",
        "shall not",
        "ldap",
        "co llective",
        "equality",
        "sup name",
        "structural must",
        "singlevalue",
        "auxiliary must",
        "auxiliary may",
        "guid",
        "desc account",
        "desc mount",
        "desc password",
        "service",
        "info",
        "tiger",
        "multi",
        "d esc",
        "rfc1274",
        "structural may",
        "quality",
        "substr caseigno",
        "corba",
        "ldap directory",
        "reserved",
        "ldap server",
        "dynamic group",
        "netscape",
        "not recommended",
        "for production",
        "attribute",
        "name managedby",
        "name leaf",
        "duas",
        "internetdrafts",
        "coast",
        "project",
        "java object",
        "java class",
        "de sc",
        "pkcs",
        "inetorgperson",
        "rfc2798",
        "signeddata",
        "smime",
        "openldap note",
        "hold",
        "code",
        "java",
        "jndi reference",
        "jndi",
        "with syntax",
        "definitions",
        "kerberos v",
        "kdc schema",
        "oid base",
        "size",
        "subclass of",
        "may contain",
        "objectclass",
        "must contain",
        "matches for",
        "obsolete",
        "des c",
        "abstract must",
        "sup person",
        "microsoft",
        "advanced server",
        "schema mapping",
        "netinfo",
        "config",
        "groups",
        "netinfo preset",
        "crypt",
        "netinfo rpcs",
        "rpcs number",
        "oncrpcnumber",
        "ipnetmasknumber",
        "assistant",
        "may description",
        "rfc2307",
        "rfc2252",
        "match syntax",
        "openldaproot",
        "openldaporg",
        "openldapou",
        "equal ity",
        "kind",
        "rule",
        "attcertpath",
        "rolesyntax",
        "ldif",
        "blank",
        "ldap entry",
        "spaces",
        "cosine pilot",
        "directory forum",
        "password policy",
        "false",
        "april",
        "auxiliary",
        "passwd",
        "account",
        "desc pool",
        "unix",
        "structural",
        "sup rpcentry",
        "sup container",
        "abstract may",
        "sup ipsecbase",
        "Chelsea Manning Help Me",
        "Aishah Siti Lazim",
        "Aishah Lazim",
        "194 Green Street",
        "Human Subjects",
        "cybernetic",
        "RNA molecule",
        "matches",
        "postfix smtp",
        "domain",
        "ipv6 host",
        "reject",
        "reply",
        "prior",
        "bugs",
        "reject empty",
        "canonical",
        "tables",
        "post",
        "replace user",
        "address",
        "generic",
        "smtp",
        "isp mail",
        "mail delivery",
        "charset",
        "report",
        "postfix dsn",
        "mail returned",
        "only",
        "mime",
        "headerchecks",
        "readme files",
        "filters while",
        "posix",
        "empty",
        "body",
        "pass",
        "write",
        "date",
        "program",
        "agreement",
        "contributor",
        "recipient",
        "contribution",
        "the program",
        "corporation",
        "contributors",
        "product x",
        "as expressly",
        "arch",
        "arch x8664",
        "pipe wall",
        "wimplicit",
        "ranlib",
        "warn",
        "switch",
        "start",
        "systype",
        "smtp server",
        "specify",
        "mx host",
        "unix password",
        "user unknown",
        "pathbin",
        "postfix queue",
        "path",
        "beware",
        "class",
        "uucp",
        "shell",
        "outlook",
        "postfix master",
        "begin",
        "server admin",
        "mail backend",
        "modern smtp",
        "iana",
        "many",
        "postfix pipe",
        "recent cyrus",
        "amos gouaux",
        "old example",
        "update",
        "usrsbin",
        "file format",
        "no group",
        "daemondirectory",
        "relocated",
        "matches user",
        "synopsis",
        "or even",
        "lutz jaenicke",
        "technology",
        "cottbus",
        "germany",
        "openssl package",
        "openssl project",
        "europe",
        "remember that",
        "use of",
        "virtual",
        "virtual alias",
        "redirect mail",
        "deliver mail",
        "transport",
        "description",
        "result format",
        "bashno",
        "r etcbashrc",
        "protocol",
        "ipv6",
        "icmp",
        "cisco",
        "monitoring",
        "argus",
        "chaos",
        "rsvp",
        "encapsulation",
        "aris",
        "isis",
        "kame",
        "id key",
        "specification",
        "auto exit",
        "vpn socket",
        "networkup",
        "term",
        "devnull",
        "common setup",
        "set command",
        "sunnet manager",
        "rpcsrc",
        "netlicense",
        "apple",
        "netbootmount",
        "netbootshadow",
        "computername",
        "localonly",
        "localnetbootdir",
        "netboot",
        "define",
        "purpose",
        "networkonly",
        "waiting",
        "auditing",
        "solaris",
        "openbsm",
        "secsrvr",
        "allocation",
        "bsm event",
        "solaris kernel",
        "openbsm kernel",
        "solaris auemac",
        "solaris umount",
        "integer",
        "array",
        "data",
        "state",
        "opendirectoryd",
        "ipv4",
        "plist",
        "dict",
        "session",
        "commcenter",
        "airport",
        "cfbasichash",
        "thread",
        "cfrunloop",
        "cfrunloopmode",
        "usrbinsudo",
        "usrsbinnetbiosd",
        "removed"
      ],
      "references": [
        "afpovertcp.cfg",
        "aliases",
        "magic",
        "httpd.conf",
        "mime.types",
        "httpd-autoindex.conf",
        "httpd-default.conf",
        "httpd-languages.conf",
        "httpd-dav.conf",
        "httpd-multilang-errordoc.conf",
        "httpd-mpm.conf",
        "httpd-info.conf",
        "httpd-userdir.conf",
        "httpd-ssl.conf",
        "httpd-vhosts.conf",
        "proxy-html.conf",
        "httpd-manual.conf",
        "php7.conf",
        "mpm.conf",
        "com.apple.eventmonitor",
        "com.apple.authd",
        "com.apple.cdscheduler",
        "com.apple.contacts.ContactsAutocomplete",
        "com.apple.install",
        "com.apple.coreduetd",
        "com.apple.login.guest",
        "com.apple.mkb",
        "com.apple.mail",
        "com.apple.MessageTracer",
        "com.apple.mkb.internal",
        "com.apple.iokit.power",
        "com.apple.performance",
        "com.apple.networking.boringssl",
        "auto_master",
        "auto_home",
        "bashrc",
        "asl.conf",
        "autofs.conf",
        "bashrc_Apple_Terminal",
        "csh.cshrc",
        "csh.logout",
        "com.apple.screensharing.agent.launchd",
        "csh.login",
        "cupsd.conf",
        "cups-files.conf.default",
        "cupsd.conf.O",
        "cupsd.conf.default",
        "cups-files.conf",
        "snmp.conf",
        "snmp.conf.default",
        "dragonforce.io",
        "find.codes",
        "ftpusers",
        "hosts.equiv",
        "gettytab",
        "hosts",
        "kern_loader.conf",
        "irbrc",
        "locate.rc",
        "mail.rc",
        "group",
        "man.conf",
        "networks",
        "manpaths",
        "newsyslog.conf",
        "com.apple.slapconfig.conf",
        "files.conf",
        "com.apple.xscertd.conf",
        "wifi.conf",
        "com.apple.slapd.conf",
        "nfs.conf",
        "ntp.conf",
        "notify.conf",
        "ntp_opendirectory.conf",
        "AppleOpenLDAP.plist",
        "ldap.conf",
        "ldap.conf.default",
        "apple_auxillary.schema",
        "corba.ldif",
        "collective.schema",
        "collective.ldif",
        "core.ldif",
        "apple.schema",
        "cosine.ldif",
        "core.schema",
        "corba.schema",
        "duaconf.ldif",
        "dyngroup.ldif",
        "fmserver.schema",
        "duaconf.schema",
        "java.ldif",
        "inetorgperson.schema",
        "inetorgperson.ldif",
        "java.schema",
        "krb5-kdc.schema",
        "cosine.schema",
        "misc.ldif",
        "microsoft.std.schema",
        "misc.schema",
        "netinfo.schema",
        "nis.schema",
        "nis.ldif",
        "openldap.schema",
        "dyngroup.schema",
        "pmi.ldif",
        "ppolicy.ldif",
        "pmi.schema",
        "openldap.ldif",
        "README",
        "ppolicy.schema",
        "samba.schema",
        "microsoft.schema",
        "access",
        "custom_header_checks",
        "canonical",
        "generic",
        "bounce.cf.default",
        "header_checks",
        "LICENSE",
        "makedefs.out",
        "main.cf",
        "master.cf.default",
        "master.cf",
        "main.cf.proto",
        "master.cf.proto",
        "postfix-files",
        "relocated",
        "TLS_LICENSE",
        "virtual",
        "main.cf.default",
        "transport",
        "profile",
        "protocols",
        "racoon.conf",
        "rmtab",
        "rc.common",
        "rpc",
        "rtadvd.conf",
        "rc.netboot",
        "audit_class",
        "audit_warn",
        "audit_event",
        "audit_control"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Bahrain",
        "Israel",
        "India"
      ],
      "malware_families": [
        {
          "id": "DirectoryIndex",
          "display_name": "DirectoryIndex",
          "target": null
        },
        {
          "id": "AllowOverride",
          "display_name": "AllowOverride",
          "target": null
        },
        {
          "id": "Malaysia, Truly Asia",
          "display_name": "Malaysia, Truly Asia",
          "target": null
        },
        {
          "id": "9002 RAT",
          "display_name": "9002 RAT",
          "target": null
        },
        {
          "id": "Virus:DOS/PSMPC_386",
          "display_name": "Virus:DOS/PSMPC_386",
          "target": "/malware/Virus:DOS/PSMPC_386"
        },
        {
          "id": "TEL:TrojanSpy:Win32/KediRat",
          "display_name": "TEL:TrojanSpy:Win32/KediRat",
          "target": null
        },
        {
          "id": "TrojanSpy:iOS/XcodeGhost",
          "display_name": "TrojanSpy:iOS/XcodeGhost",
          "target": "/malware/TrojanSpy:iOS/XcodeGhost"
        },
        {
          "id": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
          "display_name": "ALF:HSTR:TrojanSpy:MSIL/KeyLogger",
          "target": null
        },
        {
          "id": "Ultra VNC",
          "display_name": "Ultra VNC",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Bridge",
          "display_name": "TrojanDownloader:Win32/Bridge",
          "target": "/malware/TrojanDownloader:Win32/Bridge"
        },
        {
          "id": "Virus:DOS/Cyberwar_5300",
          "display_name": "Virus:DOS/Cyberwar_5300",
          "target": "/malware/Virus:DOS/Cyberwar_5300"
        },
        {
          "id": "Backdoor:Win32/Espion",
          "display_name": "Backdoor:Win32/Espion",
          "target": "/malware/Backdoor:Win32/Espion"
        },
        {
          "id": "Pegasus for iOS - S0289",
          "display_name": "Pegasus for iOS - S0289",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        },
        {
          "id": "Pegasus for Android - S0316",
          "display_name": "Pegasus for Android - S0316",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
          "display_name": "ALF:HeraklezEval:Backdoor:Linux/Mirai",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:BackdoorLinux/Mirai",
          "display_name": "ALF:HeraklezEval:BackdoorLinux/Mirai",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
          "display_name": "ALF:HeraklezEval:Backdoor:Linux/Tsunami",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1404",
          "name": "Exploit OS Vulnerability",
          "display_name": "T1404 - Exploit OS Vulnerability"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1001.002",
          "name": "Steganography",
          "display_name": "T1001.002 - Steganography"
        },
        {
          "id": "T1003.004",
          "name": "LSA Secrets",
          "display_name": "T1003.004 - LSA Secrets"
        },
        {
          "id": "T1001.001",
          "name": "Junk Data",
          "display_name": "T1001.001 - Junk Data"
        },
        {
          "id": "T1003.001",
          "name": "LSASS Memory",
          "display_name": "T1003.001 - LSASS Memory"
        },
        {
          "id": "T1003.005",
          "name": "Cached Domain Credentials",
          "display_name": "T1003.005 - Cached Domain Credentials"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1026",
          "name": "Multiband Communication",
          "display_name": "T1026 - Multiband Communication"
        },
        {
          "id": "T1562.004",
          "name": "Disable or Modify System Firewall",
          "display_name": "T1562.004 - Disable or Modify System Firewall"
        },
        {
          "id": "T1025",
          "name": "Data from Removable Media",
          "display_name": "T1025 - Data from Removable Media"
        },
        {
          "id": "T1055.002",
          "name": "Portable Executable Injection",
          "display_name": "T1055.002 - Portable Executable Injection"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1021.006",
          "name": "Windows Remote Management",
          "display_name": "T1021.006 - Windows Remote Management"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        }
      ],
      "industries": [
        "Media",
        "LGBTQ+ Activists",
        "Technology",
        "Telecommunications",
        "Hospitality",
        "Energy",
        "NGO",
        "Semiconductor",
        "Human Subjects"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ravescoutllc.",
        "id": "288912",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 669,
        "URL": 1976,
        "email": 21,
        "hostname": 1198,
        "FileHash-SHA256": 277,
        "CVE": 2,
        "CIDR": 3
      },
      "indicator_count": 4146,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 35,
      "modified_text": "509 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709929c16e0817dea8f7ff",
      "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
      "description": "",
      "modified": "2023-12-06T15:54:17.119000",
      "created": "2023-12-06T15:54:17.119000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 963,
        "domain": 255,
        "hostname": 730,
        "URL": 2400,
        "FileHash-MD5": 50,
        "FileHash-SHA1": 50,
        "email": 1
      },
      "indicator_count": 4449,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "866 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6431d1244a8ae763a8d5ed74",
      "name": "http://hm732.com/ - v2 all and sundrie",
      "description": "",
      "modified": "2023-05-08T20:02:01.231000",
      "created": "2023-04-08T20:40:04.099000",
      "tags": [
        "trojan",
        "chromeua",
        "dropped file",
        "optout",
        "runtime data",
        "object",
        "drmedgeua",
        "unicode",
        "optin",
        "edgeua",
        "span",
        "error",
        "win64",
        "date",
        "format",
        "addressbar",
        "generator",
        "path",
        "template",
        "suspicious",
        "unknown",
        "void",
        "desktop",
        "dark",
        "light",
        "mozilla",
        "this",
        "cookie",
        "meta",
        "iframe",
        "window",
        "legend",
        "null",
        "wind",
        "strings",
        "qakbot",
        "http://hm732.com/"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/bca1a3df6a236ec7870fbae8a5d5c5597347dad17f9b00e49c05ab1eb8e87f83/64319a805d10c703330b366e"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2345,
        "hostname": 951,
        "domain": 405,
        "FileHash-SHA256": 82,
        "FileHash-MD5": 63,
        "FileHash-SHA1": 61,
        "email": 5
      },
      "indicator_count": 3912,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 92,
      "modified_text": "1078 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "642fbeba84c7b4cbee43200a",
      "name": "https://www.microsoft.com/en-US/servicesagreement/upcoming-faq.aspx",
      "description": "",
      "modified": "2023-05-07T00:00:36.624000",
      "created": "2023-04-07T06:56:58.157000",
      "tags": [
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "chromeua",
        "ansi",
        "dropped file",
        "optout",
        "runtime data",
        "object",
        "drmedgeua",
        "optin",
        "edgeua",
        "unicode",
        "span",
        "error",
        "generator",
        "void",
        "august",
        "body",
        "path",
        "close",
        "format",
        "template",
        "suspicious",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "meta",
        "chat",
        "this",
        "small",
        "june",
        "footer",
        "window",
        "legend",
        "hybrid",
        "click",
        "null",
        "april",
        "general",
        "strings",
        "qakbot"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/9318798ecf1cf2d52d10ec99e821454ff81196ced4cb4337dcab41b79dcca0ec/642ecd01f0ad4977b40ce225"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2400,
        "hostname": 730,
        "domain": 255,
        "FileHash-SHA256": 963,
        "email": 1,
        "FileHash-MD5": 50,
        "FileHash-SHA1": 50
      },
      "indicator_count": 4449,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 91,
      "modified_text": "1079 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "642db7b656049e54b2f71c20",
      "name": "masterkey.com.ua/download/MKClientSetup.exe - hybrid 100/100",
      "description": "The entire \"Ad\" eco system is compromised via all main channels , ie google, bing, msn etc utilising many top level domains and brands, its truly the biggest suppky chain attack ever known. So enormously thats its unbelievable and I guess many peeps just cant see it because its simply to overwhelming to consider a reality p plus many perhaps cant digest the advanced use of AI and self repairing neural networks along that are designed to work on standard default configs. its not till you step out of the defaults that you start to see nefariousness",
      "modified": "2023-05-05T16:00:23.366000",
      "created": "2023-04-05T18:02:30.403000",
      "tags": [
        "dropped file",
        "chromeua",
        "runtime data",
        "drmedgeua",
        "edgeua",
        "generator",
        "win64",
        "null",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "iframe",
        "cookie",
        "meta",
        "body",
        "legend",
        "dwis",
        "core",
        "tear",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "://masterkey.com.ua/download/MKClientSetup.exe"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 949,
        "URL": 5642,
        "CVE": 2,
        "domain": 509,
        "FileHash-SHA256": 293,
        "FileHash-MD5": 550,
        "FileHash-SHA1": 60,
        "email": 5
      },
      "indicator_count": 8010,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 92,
      "modified_text": "1081 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "642c3e46df286e02b6685576",
      "name": "http://mat8a.xyz/ - IRAN",
      "description": "",
      "modified": "2023-05-04T14:02:11.229000",
      "created": "2023-04-04T15:12:06.538000",
      "tags": [
        "malware",
        "trojan",
        "dropped file",
        "ansi",
        "chromeua",
        "optout",
        "runtime data",
        "object",
        "drmedgeua",
        "edgeua",
        "optin",
        "unicode",
        "error",
        "generator",
        "span",
        "win64",
        "void",
        "entropy",
        "date",
        "template",
        "unknown",
        "critical",
        "addressbar",
        "desktop",
        "dark",
        "light",
        "cookie",
        "cray",
        "smwg",
        "legend",
        "eret",
        "nuke",
        "lion",
        "ahav",
        "core",
        "malicious",
        "mozilla",
        "strings",
        "qakbot",
        "javascript",
        "http://mat8a.xyz/"
      ],
      "references": [
        "http://mat8a.xyz/",
        "https://hybrid-analysis.com/sample/aae2d9c3cce607a9fef69337ac7924d67daa2eef5a385540445636a4e6f89bc3/6426fb0cd69b3b6b7e02b588"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2512,
        "hostname": 835,
        "domain": 233,
        "FileHash-SHA256": 118,
        "FileHash-MD5": 60,
        "FileHash-SHA1": 54,
        "email": 2
      },
      "indicator_count": 3814,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 90,
      "modified_text": "1082 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://dusee05.devtest.call2.team",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://dusee05.devtest.call2.team",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776723798.3121562
}