{
  "type": "URL",
  "indicator": "https://ethmon.net/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ethmon.net/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3753525236,
      "indicator": "https://ethmon.net/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "697cdce9ec418c422eee2054",
          "name": "Device Isolation: Lumen Technologies | Palantir and \u2018Boots on the Ground Operations\u2019",
          "description": "Device Isolation: Lumen Technologies (formerly CenturyLink) deployed as an admin on iOS devices. Standard factory resets may prove ineffective. Complete hardware \"air-gap\" or clean devices that have never touched your home network may be best option for deeply monitored targets.\n\nSummary of the Campaign:\nThe involvement of Lumen Technologies (as an unwanted admin), Foundry (Palantir) for data mapping, and Mirai Botnet for network disruption represents a \"scorched earth\" approach to digital destruction. Target treated  as a criminal through Cellebrite, implicates specific attackers attempted to legalize what was actually a predatory stalking campaign/s.\n\n\nSurveillance Overlap: The use of  Lumen Technologies and Palantir, tools allows for real-time tracking of a target's physical location\u2014explains how \u2018boots on the ground\u2019 offenders can stalk , surveillance , confront, assault  and engage in various damaging attacks of specific monitored targets.",
          "modified": "2026-03-01T16:05:57.375000",
          "created": "2026-01-30T16:31:37.011000",
          "tags": [
            "url https",
            "url http",
            "tlsv1",
            "whitelisted",
            "united",
            "read c",
            "as15169",
            "stcalifornia",
            "execution",
            "dock",
            "write",
            "persistence",
            "malware",
            "encrypt",
            "active",
            "lumen technologies",
            "number",
            "error",
            "regexp",
            "sxa0",
            "amptoken",
            "optout",
            "retrieving",
            "notfound",
            "unknown",
            "form",
            "flash",
            "backdoor",
            "writeconsolew",
            "yara detections",
            "command line",
            "pdb path",
            "pe resource",
            "internalname",
            "windows command",
            "A",
            "aws",
            "name servers",
            "url analysis",
            "passive dns",
            "urls",
            "data upload",
            "extraction",
            "palantir",
            "c2",
            "aerospace",
            "tracking",
            "spywatchdog",
            "palapa-c2",
            "communications satellite",
            "amazon",
            "hughesnet",
            "icmp traffic",
            "washington c",
            "washington ou",
            "mopr",
            "mon jul",
            "local",
            "dynamic",
            "apple",
            "network",
            "t1057",
            "discovery",
            "t1069",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1480",
            "guardrails",
            "t1566",
            "present jan",
            "unknown ns",
            "ip address",
            "dnssec",
            "domain",
            "dynamic dns",
            "government",
            "pcup",
            "germany unknown",
            "link",
            "dns hosting",
            "cloudns",
            "cloud dns",
            "a domains",
            "ipv4 add",
            "title",
            "meta",
            "class",
            "servers",
            "present aug",
            "aaaa",
            "present sep",
            "present nov",
            "present jul",
            "present may",
            "moved",
            "canada unknown",
            "begin",
            "record value",
            "gmt content",
            "type",
            "hostname add",
            "files",
            "ascii text",
            "pattern match",
            "href",
            "mitre att",
            "ck id",
            "ck matrix",
            "network traffic",
            "et info",
            "general",
            "path",
            "click",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "input url",
            "defense evasion",
            "france",
            "ireland",
            "netherlands",
            "denmark",
            "united kingdom",
            "type indicator",
            "role title",
            "added active",
            "savvis",
            "centurylinktechnology",
            "hybrid analysis",
            "monitoring tools",
            "monitored target",
            "triangulation",
            "worm",
            "intel",
            "ms windows",
            "pe32",
            "write c",
            "delete c",
            "show",
            "russia as47764",
            "unix",
            "lsan jose",
            "odigicert inc",
            "markus",
            "url add",
            "http",
            "related nids",
            "files location",
            "russia flag",
            "russia hostname",
            "russia",
            "russia unknown",
            "hosting",
            "federation flag",
            "body",
            "gmt vary",
            "accept encoding",
            "gmt cache",
            "certificate",
            "pulse submit",
            "unknown aaaa",
            "search",
            "entries",
            "script domains",
            "script urls",
            "pdx cf"
          ],
          "references": [
            "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
            "Yare: compromised_site_redirector_fromcharcode",
            "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
            "Alerts: console_output has_pdb pe_unknown_resource_name",
            "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
            "Tipped: A targets AI and other cyber research findings.",
            "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
            "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
            "https://palapa.c.id\t (c.id)",
            "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
            "cedevice.io  \u2022 decagonsoftware.com",
            "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
            "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
            "pcup.gov.ph:",
            "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
            "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
            "https://elegantcosmedampyeah.pages.dev/",
            "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
            "inst.govelopscold.com",
            "https://feedback.ptv.vic.gov.au/360",
            "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
            "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
            "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
            "https://brand.centurylinktechnology.com",
            "https://prod.centurylinktechnology.com",
            "https://brand2.centurylinktechnology.com",
            "https://mobile-pocket-guide.centurylinktechnology.com",
            "UPX_OEP_place",
            "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
            "ASP. NET",
            "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
            "7box.vip"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan.Tofsee/Botx",
              "display_name": "Trojan.Tofsee/Botx",
              "target": null
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "PWS:Win32/Axespec.A",
              "display_name": "PWS:Win32/Axespec.A",
              "target": "/malware/PWS:Win32/Axespec.A"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1078.004",
              "name": "Cloud Accounts",
              "display_name": "T1078.004 - Cloud Accounts"
            },
            {
              "id": "T1069.003",
              "name": "Cloud Groups",
              "display_name": "T1069.003 - Cloud Groups"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 102,
            "FileHash-SHA1": 59,
            "FileHash-SHA256": 1929,
            "domain": 854,
            "hostname": 2156,
            "URL": 4475,
            "SSLCertFingerprint": 9,
            "email": 7,
            "CVE": 1
          },
          "indicator_count": 9592,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "49 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68b60cdecf42fb532f2ceb12",
          "name": "U of A DataBreach Update - 11.13.25",
          "description": "Domain Analysis that serves as evidence of an on-going DataBreaches at the University of Alberta with associated references.\nAnalysis demonstrates abused critical infrastructure in the Province of Alberta stemming from UAlberta as detailed in this Pulse.",
          "modified": "2025-12-13T22:01:27.739000",
          "created": "2025-09-01T21:15:10.117000",
          "tags": [
            "as16509",
            "amazon02",
            "redirect",
            "tags",
            "as14618",
            "amazonaes",
            "search",
            "public",
            "search live",
            "api blog",
            "patch http",
            "please",
            "javascript",
            "url",
            "website",
            "web",
            "scanner",
            "analyze",
            "analyzer",
            "search api",
            "make sure",
            "domain",
            "and not",
            "page",
            "home search",
            "live api",
            "blog docs",
            "pricing login",
            "greynoise",
            "visualizer skip",
            "service status",
            "company blog",
            "us careers",
            "policies vpat",
            "slo privacy",
            "cookie patent",
            "copyright",
            "google privacy",
            "sandbox",
            "reputation",
            "phishing",
            "malware",
            "amazon web",
            "services",
            "warning icon",
            "share report",
            "systems",
            "cloudflare",
            "varnish",
            "nginx",
            "apache",
            "write",
            "virus",
            "trojan",
            "ransomware",
            "static",
            "analysis",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "online",
            "submit",
            "sample",
            "download",
            "platform",
            "course",
            "program",
            "vxstream",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "UAlberta"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/iocs",
            "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/summary",
            "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
            "https://viz.greynoise.io/ip/analysis/d90b0bd7-aaa1-4ea6-93c1-92bfd2d8f930",
            "https://urlquery.net/report/e9f9c430-fb2f-4166-8bfb-500339fdb9c0",
            "https://www.filescan.io/uploads/68b608d639a6221faa7935aa/reports/dd218cea-f81d-43ed-97fe-dd8c5aec52a3/ioc",
            "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43",
            "https://viz.greynoise.io/query/AS3359",
            "https://www.virustotal.com/graph/embed/g4022b02acb3b46ddb4b24043845853d9f56a84d80b5849188fee79c90217d4ca?theme=dark",
            "http://ci-www.threatcrowd.org/domain.php?domain=ualberta.ca",
            "https://www.urlvoid.com/dns-records-lookup/",
            "https://www.shodan.io/search?query=ualberta.ca",
            "https://dnsdumpster.com/",
            "https://bgpview.io/asn/3359#whois",
            "https://centralops.net/co/",
            "https://app.netlas.io/domains/stats/?facets=domain&indices=&q=domain%3A%2A.ualberta.ca&size=1100",
            "09.10.25 - https://viz.greynoise.io/ip/analysis/df2c8c37-f8f2-4398-b709-7c716b03b697",
            "09.10.25 - https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
            "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43/680e723df123be6c63004290",
            "https://www.criminalip.io/asset/search?query=ualberta.ca",
            "09.20.25 - https://urlscan.io/search/#page.domain%3Aualberta.ca",
            "https://app.threat.zone/submission/c70698bf-881e-491a-a582-eee634b4bf73/url-analysis-report",
            "https://whois.domaintools.com/ualberta.ca",
            "https://research.domaintools.com/research/whois-history/search/?q=ualberta.ca",
            "https://viewdns.info/iphistory/?domain=ualberta.ca",
            "https://viewdns.info/portscan/?host=ualberta.ca",
            "https://whois.easycounter.com/ualberta.ca",
            "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=ualberta.ca",
            "https://who.is/whois/ualberta.ca",
            "https://www.robtex.com/en/dns-lookup/ca/ualberta",
            "https://www.whoxy.com/ualberta.ca",
            "https://reverseip.domaintools.com/search/?q=ualberta.ca",
            "https://bgp.he.net/dns/ualberta.ca",
            "https://intelx.io/?s=ualberta.ca",
            "https://pulsedive.com/indicator/?indicator=ualberta.ca",
            "https://web.archive.org/web/20250000000000*/ualberta.ca",
            "https://crt.sh/?q=ualberta.ca&exclude=expired&group=none",
            "https://viewdns.info/traceroute/?domain=ualberta.ca",
            "https://centralops.net/co/DomainDossier.aspx",
            "https://search.odin.io/hosts?query=ualberta.ca",
            "https://www.merklemap.com/search?query=ualberta.ca&page=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9901,
            "domain": 790,
            "email": 982,
            "hostname": 10520,
            "FileHash-MD5": 550,
            "FileHash-SHA256": 1726,
            "FileHash-SHA1": 519,
            "SSLCertFingerprint": 64,
            "CIDR": 26,
            "CVE": 12
          },
          "indicator_count": 25090,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "126 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d30048b95aaba628a5ee7",
          "name": "Working on it\u2026\u2026",
          "description": "\u2022 Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\n(onyx-ware.com)\nNS1.ENDGAME.COM\n(endgames.us)\nNS1.ENDGAME.COM\n#deadmau5 #janskyofficial #idk #soundcloud",
          "modified": "2025-08-19T17:00:59.379000",
          "created": "2025-07-20T18:05:56.587000",
          "tags": [
            "dynamicloader",
            "united",
            "as15169",
            "medium",
            "search",
            "show",
            "write c",
            "whitelisted",
            "brazil as396982",
            "high",
            "themida",
            "write",
            "delphi",
            "copy",
            "upatre",
            "encrypt",
            "june",
            "win32",
            "malware",
            "win64",
            "windows nt",
            "directui",
            "element",
            "classinfobase",
            "value",
            "hwndhost",
            "sapeav12",
            "delete c",
            "worm",
            "explorer",
            "insert",
            "movie",
            "alerts",
            "windows",
            "installs",
            "filehash",
            "sha256 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "passive dns",
            "urls",
            "http",
            "ip address",
            "related nids",
            "files location",
            "spain flag",
            "spain domain",
            "files related",
            "spain",
            "entries",
            "next associated",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "filehashsha256",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "url http",
            "filehashmd5",
            "showing",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "iocs",
            "learn more",
            "filehashsha1",
            "types of",
            "united kingdom",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "t1082",
            "t1119",
            "t1129",
            "modules",
            "t1143",
            "soundcloud",
            "created",
            "hour ago",
            "facebook",
            "twitter",
            "victims website",
            "youtube",
            "jansky",
            "trojandropper",
            "pulses url"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2012,
            "FileHash-MD5": 140,
            "FileHash-SHA1": 129,
            "FileHash-SHA256": 1348,
            "SSLCertFingerprint": 3,
            "domain": 288,
            "hostname": 812
          },
          "indicator_count": 4732,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "243 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "678dd7c763b29de06765fb52",
          "name": "hxxps://www[.]unitedconservative[.]ca/ - 01.19.25",
          "description": "Alberta UCP Compromise (i.e. potential evidence of active foreign interference).\n\nhttps://www.virustotal.com/graph/embed/g3fdc926b2208411e8b138e8bd7069b721b2586a3a1b3445aa4f70a932701ccbe?theme=dark",
          "modified": "2025-02-19T05:02:21.540000",
          "created": "2025-01-20T04:57:43.300000",
          "tags": [
            "pentester",
            "javascript",
            "completed",
            "risk",
            "load",
            "web application",
            "firewall",
            "google search",
            "ssl certificate",
            "http",
            "create account",
            "critical",
            "malware",
            "virus",
            "trojan",
            "ransomware",
            "static",
            "analysis",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "online",
            "submit",
            "sample",
            "download",
            "platform",
            "eci3",
            "eci4",
            "p1737345680749",
            "gaz1",
            "uaax86",
            "uab64",
            "sid1737345681",
            "sct1",
            "seg0",
            "nsi1",
            "url",
            "sandbox",
            "scanner",
            "reputation",
            "phishing",
            "hash",
            "miss",
            "eval",
            "first seen",
            "fastly",
            "gmt file",
            "linux x8664",
            "accept",
            "fingerprint",
            "loading",
            "path",
            "patch",
            "write",
            "vxstream",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please"
          ],
          "references": [
            "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
            "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
            "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
            "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe",
            "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 734,
            "domain": 486,
            "email": 8,
            "hostname": 346,
            "FileHash-SHA256": 1814,
            "FileHash-MD5": 363,
            "FileHash-SHA1": 361,
            "SSLCertFingerprint": 24
          },
          "indicator_count": 4136,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 129,
          "modified_text": "424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653e5c98b16bb2c8d16342f6",
          "name": "Vonteera PUA Installed",
          "description": "*Win32:Evo-gen\\ [Susp]\n\n*LZMA\nUWVS|$D$tD$s$B\u0004D$x\u0001\u000fJ\u0002IL$l\u000fJ\u0001HD$h$\u000f2ED$`\u0003t$dD$\\\u0001D$X\u0001D$T\u0001D$P\u0001\u000fJ\u0001\u00036\u00079L$ts\u000eD$xf\u0004\u0002",
          "modified": "2023-11-28T12:02:42.639000",
          "created": "2023-10-29T13:22:32.074000",
          "tags": [
            "sha1",
            "pehash",
            "highest f",
            "daily tn",
            "regsetvalueexa",
            "entries",
            "create tr",
            "search",
            "read c",
            "regdword",
            "noodle",
            "newsfeed",
            "malware",
            "copy",
            "write",
            "next",
            "win32",
            "tools",
            "vonteera",
            "useragent",
            "malware cve",
            "tls handshake",
            "failure",
            "vonteera pua",
            "malware install",
            "activity beacon",
            "http request",
            "less related",
            "pulses otx",
            "pulses",
            "shellexecuteexw",
            "delete tn",
            "onidle tn",
            "update",
            "scheduledscan",
            "dock",
            "nids",
            "united",
            "show",
            "crlf line",
            "unicode text",
            "lzma uwvs",
            "pj69l",
            "alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 236,
            "FileHash-SHA1": 214,
            "FileHash-SHA256": 1280,
            "hostname": 210,
            "URL": 395,
            "SSLCertFingerprint": 2,
            "domain": 58
          },
          "indicator_count": 2395,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f0382b35bbb50ddd70190",
          "name": "Vonteera PUA Installed",
          "description": "",
          "modified": "2023-11-28T12:02:42.639000",
          "created": "2023-10-30T01:14:42.967000",
          "tags": [
            "sha1",
            "pehash",
            "highest f",
            "daily tn",
            "regsetvalueexa",
            "entries",
            "create tr",
            "search",
            "read c",
            "regdword",
            "noodle",
            "newsfeed",
            "malware",
            "copy",
            "write",
            "next",
            "win32",
            "tools",
            "vonteera",
            "useragent",
            "malware cve",
            "tls handshake",
            "failure",
            "vonteera pua",
            "malware install",
            "activity beacon",
            "http request",
            "less related",
            "pulses otx",
            "pulses",
            "shellexecuteexw",
            "delete tn",
            "onidle tn",
            "update",
            "scheduledscan",
            "dock",
            "nids",
            "united",
            "show",
            "crlf line",
            "unicode text",
            "lzma uwvs",
            "pj69l",
            "alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653e5c98b16bb2c8d16342f6",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 236,
            "FileHash-SHA1": 214,
            "FileHash-SHA256": 1280,
            "hostname": 210,
            "URL": 395,
            "SSLCertFingerprint": 2,
            "domain": 58
          },
          "indicator_count": 2395,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://intelx.io/?s=ualberta.ca",
        "09.10.25 - https://viz.greynoise.io/ip/analysis/df2c8c37-f8f2-4398-b709-7c716b03b697",
        "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
        "https://www.shodan.io/search?query=ualberta.ca",
        "https://app.netlas.io/domains/stats/?facets=domain&indices=&q=domain%3A%2A.ualberta.ca&size=1100",
        "cedevice.io  \u2022 decagonsoftware.com",
        "https://dnsdumpster.com/",
        "https://www.robtex.com/en/dns-lookup/ca/ualberta",
        "https://urlquery.net/report/e9f9c430-fb2f-4166-8bfb-500339fdb9c0",
        "https://bgp.he.net/dns/ualberta.ca",
        "https://www.urlvoid.com/dns-records-lookup/",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43",
        "https://viewdns.info/portscan/?host=ualberta.ca",
        "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
        "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
        "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=ualberta.ca",
        "https://viz.greynoise.io/query/AS3359",
        "https://centralops.net/co/DomainDossier.aspx",
        "pcup.gov.ph:",
        "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/iocs",
        "https://www.filescan.io/uploads/68b608d639a6221faa7935aa/reports/dd218cea-f81d-43ed-97fe-dd8c5aec52a3/ioc",
        "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
        "ASP. NET",
        "https://www.criminalip.io/asset/search?query=ualberta.ca",
        "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
        "https://brand2.centurylinktechnology.com",
        "https://mobile-pocket-guide.centurylinktechnology.com",
        "https://www.virustotal.com/graph/embed/g4022b02acb3b46ddb4b24043845853d9f56a84d80b5849188fee79c90217d4ca?theme=dark",
        "https://search.odin.io/hosts?query=ualberta.ca",
        "Tipped: A targets AI and other cyber research findings.",
        "09.10.25 - https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "https://crt.sh/?q=ualberta.ca&exclude=expired&group=none",
        "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
        "https://viewdns.info/traceroute/?domain=ualberta.ca",
        "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
        "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43/680e723df123be6c63004290",
        "https://whois.domaintools.com/ualberta.ca",
        "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "https://whois.easycounter.com/ualberta.ca",
        "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
        "https://viz.greynoise.io/ip/analysis/d90b0bd7-aaa1-4ea6-93c1-92bfd2d8f930",
        "https://who.is/whois/ualberta.ca",
        "09.20.25 - https://urlscan.io/search/#page.domain%3Aualberta.ca",
        "https://research.domaintools.com/research/whois-history/search/?q=ualberta.ca",
        "inst.govelopscold.com",
        "https://prod.centurylinktechnology.com",
        "https://viewdns.info/iphistory/?domain=ualberta.ca",
        "https://palapa.c.id\t (c.id)",
        "https://brand.centurylinktechnology.com",
        "UPX_OEP_place",
        "https://bgpview.io/asn/3359#whois",
        "7box.vip",
        "https://reverseip.domaintools.com/search/?q=ualberta.ca",
        "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
        "Yare: compromised_site_redirector_fromcharcode",
        "https://centralops.net/co/",
        "Alerts: console_output has_pdb pe_unknown_resource_name",
        "https://elegantcosmedampyeah.pages.dev/",
        "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
        "https://www.whoxy.com/ualberta.ca",
        "https://web.archive.org/web/20250000000000*/ualberta.ca",
        "https://feedback.ptv.vic.gov.au/360",
        "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250",
        "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
        "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
        "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
        "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
        "https://www.merklemap.com/search?query=ualberta.ca&page=0",
        "https://app.threat.zone/submission/c70698bf-881e-491a-a582-eee634b4bf73/url-analysis-report",
        "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
        "https://pulsedive.com/indicator/?indicator=ualberta.ca",
        "http://ci-www.threatcrowd.org/domain.php?domain=ualberta.ca",
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/summary",
        "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
        "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
        "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Nids",
            "Trojan.tofsee/botx",
            "Pws:win32/axespec.a",
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Worm:win32/lightmoon.h"
          ],
          "industries": [
            "Education",
            "Government",
            "Technology"
          ],
          "unique_indicators": 29828
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/ethmon.net",
    "whois": "http://whois.domaintools.com/ethmon.net",
    "domain": "ethmon.net",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "697cdce9ec418c422eee2054",
      "name": "Device Isolation: Lumen Technologies | Palantir and \u2018Boots on the Ground Operations\u2019",
      "description": "Device Isolation: Lumen Technologies (formerly CenturyLink) deployed as an admin on iOS devices. Standard factory resets may prove ineffective. Complete hardware \"air-gap\" or clean devices that have never touched your home network may be best option for deeply monitored targets.\n\nSummary of the Campaign:\nThe involvement of Lumen Technologies (as an unwanted admin), Foundry (Palantir) for data mapping, and Mirai Botnet for network disruption represents a \"scorched earth\" approach to digital destruction. Target treated  as a criminal through Cellebrite, implicates specific attackers attempted to legalize what was actually a predatory stalking campaign/s.\n\n\nSurveillance Overlap: The use of  Lumen Technologies and Palantir, tools allows for real-time tracking of a target's physical location\u2014explains how \u2018boots on the ground\u2019 offenders can stalk , surveillance , confront, assault  and engage in various damaging attacks of specific monitored targets.",
      "modified": "2026-03-01T16:05:57.375000",
      "created": "2026-01-30T16:31:37.011000",
      "tags": [
        "url https",
        "url http",
        "tlsv1",
        "whitelisted",
        "united",
        "read c",
        "as15169",
        "stcalifornia",
        "execution",
        "dock",
        "write",
        "persistence",
        "malware",
        "encrypt",
        "active",
        "lumen technologies",
        "number",
        "error",
        "regexp",
        "sxa0",
        "amptoken",
        "optout",
        "retrieving",
        "notfound",
        "unknown",
        "form",
        "flash",
        "backdoor",
        "writeconsolew",
        "yara detections",
        "command line",
        "pdb path",
        "pe resource",
        "internalname",
        "windows command",
        "A",
        "aws",
        "name servers",
        "url analysis",
        "passive dns",
        "urls",
        "data upload",
        "extraction",
        "palantir",
        "c2",
        "aerospace",
        "tracking",
        "spywatchdog",
        "palapa-c2",
        "communications satellite",
        "amazon",
        "hughesnet",
        "icmp traffic",
        "washington c",
        "washington ou",
        "mopr",
        "mon jul",
        "local",
        "dynamic",
        "apple",
        "network",
        "t1057",
        "discovery",
        "t1069",
        "t1071",
        "protocol",
        "t1105",
        "tool transfer",
        "t1480",
        "guardrails",
        "t1566",
        "present jan",
        "unknown ns",
        "ip address",
        "dnssec",
        "domain",
        "dynamic dns",
        "government",
        "pcup",
        "germany unknown",
        "link",
        "dns hosting",
        "cloudns",
        "cloud dns",
        "a domains",
        "ipv4 add",
        "title",
        "meta",
        "class",
        "servers",
        "present aug",
        "aaaa",
        "present sep",
        "present nov",
        "present jul",
        "present may",
        "moved",
        "canada unknown",
        "begin",
        "record value",
        "gmt content",
        "type",
        "hostname add",
        "files",
        "ascii text",
        "pattern match",
        "href",
        "mitre att",
        "ck id",
        "ck matrix",
        "network traffic",
        "et info",
        "general",
        "path",
        "click",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "input url",
        "defense evasion",
        "france",
        "ireland",
        "netherlands",
        "denmark",
        "united kingdom",
        "type indicator",
        "role title",
        "added active",
        "savvis",
        "centurylinktechnology",
        "hybrid analysis",
        "monitoring tools",
        "monitored target",
        "triangulation",
        "worm",
        "intel",
        "ms windows",
        "pe32",
        "write c",
        "delete c",
        "show",
        "russia as47764",
        "unix",
        "lsan jose",
        "odigicert inc",
        "markus",
        "url add",
        "http",
        "related nids",
        "files location",
        "russia flag",
        "russia hostname",
        "russia",
        "russia unknown",
        "hosting",
        "federation flag",
        "body",
        "gmt vary",
        "accept encoding",
        "gmt cache",
        "certificate",
        "pulse submit",
        "unknown aaaa",
        "search",
        "entries",
        "script domains",
        "script urls",
        "pdx cf"
      ],
      "references": [
        "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
        "Yare: compromised_site_redirector_fromcharcode",
        "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
        "Alerts: console_output has_pdb pe_unknown_resource_name",
        "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
        "Tipped: A targets AI and other cyber research findings.",
        "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
        "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
        "https://palapa.c.id\t (c.id)",
        "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
        "cedevice.io  \u2022 decagonsoftware.com",
        "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
        "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
        "pcup.gov.ph:",
        "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
        "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
        "https://elegantcosmedampyeah.pages.dev/",
        "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
        "inst.govelopscold.com",
        "https://feedback.ptv.vic.gov.au/360",
        "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
        "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
        "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
        "https://brand.centurylinktechnology.com",
        "https://prod.centurylinktechnology.com",
        "https://brand2.centurylinktechnology.com",
        "https://mobile-pocket-guide.centurylinktechnology.com",
        "UPX_OEP_place",
        "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
        "ASP. NET",
        "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
        "7box.vip"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan.Tofsee/Botx",
          "display_name": "Trojan.Tofsee/Botx",
          "target": null
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "PWS:Win32/Axespec.A",
          "display_name": "PWS:Win32/Axespec.A",
          "target": "/malware/PWS:Win32/Axespec.A"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1078.004",
          "name": "Cloud Accounts",
          "display_name": "T1078.004 - Cloud Accounts"
        },
        {
          "id": "T1069.003",
          "name": "Cloud Groups",
          "display_name": "T1069.003 - Cloud Groups"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 102,
        "FileHash-SHA1": 59,
        "FileHash-SHA256": 1929,
        "domain": 854,
        "hostname": 2156,
        "URL": 4475,
        "SSLCertFingerprint": 9,
        "email": 7,
        "CVE": 1
      },
      "indicator_count": 9592,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "49 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68b60cdecf42fb532f2ceb12",
      "name": "U of A DataBreach Update - 11.13.25",
      "description": "Domain Analysis that serves as evidence of an on-going DataBreaches at the University of Alberta with associated references.\nAnalysis demonstrates abused critical infrastructure in the Province of Alberta stemming from UAlberta as detailed in this Pulse.",
      "modified": "2025-12-13T22:01:27.739000",
      "created": "2025-09-01T21:15:10.117000",
      "tags": [
        "as16509",
        "amazon02",
        "redirect",
        "tags",
        "as14618",
        "amazonaes",
        "search",
        "public",
        "search live",
        "api blog",
        "patch http",
        "please",
        "javascript",
        "url",
        "website",
        "web",
        "scanner",
        "analyze",
        "analyzer",
        "search api",
        "make sure",
        "domain",
        "and not",
        "page",
        "home search",
        "live api",
        "blog docs",
        "pricing login",
        "greynoise",
        "visualizer skip",
        "service status",
        "company blog",
        "us careers",
        "policies vpat",
        "slo privacy",
        "cookie patent",
        "copyright",
        "google privacy",
        "sandbox",
        "reputation",
        "phishing",
        "malware",
        "amazon web",
        "services",
        "warning icon",
        "share report",
        "systems",
        "cloudflare",
        "varnish",
        "nginx",
        "apache",
        "write",
        "virus",
        "trojan",
        "ransomware",
        "static",
        "analysis",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "online",
        "submit",
        "sample",
        "download",
        "platform",
        "course",
        "program",
        "vxstream",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "UAlberta"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/iocs",
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/summary",
        "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "https://viz.greynoise.io/ip/analysis/d90b0bd7-aaa1-4ea6-93c1-92bfd2d8f930",
        "https://urlquery.net/report/e9f9c430-fb2f-4166-8bfb-500339fdb9c0",
        "https://www.filescan.io/uploads/68b608d639a6221faa7935aa/reports/dd218cea-f81d-43ed-97fe-dd8c5aec52a3/ioc",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43",
        "https://viz.greynoise.io/query/AS3359",
        "https://www.virustotal.com/graph/embed/g4022b02acb3b46ddb4b24043845853d9f56a84d80b5849188fee79c90217d4ca?theme=dark",
        "http://ci-www.threatcrowd.org/domain.php?domain=ualberta.ca",
        "https://www.urlvoid.com/dns-records-lookup/",
        "https://www.shodan.io/search?query=ualberta.ca",
        "https://dnsdumpster.com/",
        "https://bgpview.io/asn/3359#whois",
        "https://centralops.net/co/",
        "https://app.netlas.io/domains/stats/?facets=domain&indices=&q=domain%3A%2A.ualberta.ca&size=1100",
        "09.10.25 - https://viz.greynoise.io/ip/analysis/df2c8c37-f8f2-4398-b709-7c716b03b697",
        "09.10.25 - https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43/680e723df123be6c63004290",
        "https://www.criminalip.io/asset/search?query=ualberta.ca",
        "09.20.25 - https://urlscan.io/search/#page.domain%3Aualberta.ca",
        "https://app.threat.zone/submission/c70698bf-881e-491a-a582-eee634b4bf73/url-analysis-report",
        "https://whois.domaintools.com/ualberta.ca",
        "https://research.domaintools.com/research/whois-history/search/?q=ualberta.ca",
        "https://viewdns.info/iphistory/?domain=ualberta.ca",
        "https://viewdns.info/portscan/?host=ualberta.ca",
        "https://whois.easycounter.com/ualberta.ca",
        "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=ualberta.ca",
        "https://who.is/whois/ualberta.ca",
        "https://www.robtex.com/en/dns-lookup/ca/ualberta",
        "https://www.whoxy.com/ualberta.ca",
        "https://reverseip.domaintools.com/search/?q=ualberta.ca",
        "https://bgp.he.net/dns/ualberta.ca",
        "https://intelx.io/?s=ualberta.ca",
        "https://pulsedive.com/indicator/?indicator=ualberta.ca",
        "https://web.archive.org/web/20250000000000*/ualberta.ca",
        "https://crt.sh/?q=ualberta.ca&exclude=expired&group=none",
        "https://viewdns.info/traceroute/?domain=ualberta.ca",
        "https://centralops.net/co/DomainDossier.aspx",
        "https://search.odin.io/hosts?query=ualberta.ca",
        "https://www.merklemap.com/search?query=ualberta.ca&page=0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada",
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 92,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 9901,
        "domain": 790,
        "email": 982,
        "hostname": 10520,
        "FileHash-MD5": 550,
        "FileHash-SHA256": 1726,
        "FileHash-SHA1": 519,
        "SSLCertFingerprint": 64,
        "CIDR": 26,
        "CVE": 12
      },
      "indicator_count": 25090,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "126 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687d30048b95aaba628a5ee7",
      "name": "Working on it\u2026\u2026",
      "description": "\u2022 Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\n(onyx-ware.com)\nNS1.ENDGAME.COM\n(endgames.us)\nNS1.ENDGAME.COM\n#deadmau5 #janskyofficial #idk #soundcloud",
      "modified": "2025-08-19T17:00:59.379000",
      "created": "2025-07-20T18:05:56.587000",
      "tags": [
        "dynamicloader",
        "united",
        "as15169",
        "medium",
        "search",
        "show",
        "write c",
        "whitelisted",
        "brazil as396982",
        "high",
        "themida",
        "write",
        "delphi",
        "copy",
        "upatre",
        "encrypt",
        "june",
        "win32",
        "malware",
        "win64",
        "windows nt",
        "directui",
        "element",
        "classinfobase",
        "value",
        "hwndhost",
        "sapeav12",
        "delete c",
        "worm",
        "explorer",
        "insert",
        "movie",
        "alerts",
        "windows",
        "installs",
        "filehash",
        "sha256 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "passive dns",
        "urls",
        "http",
        "ip address",
        "related nids",
        "files location",
        "spain flag",
        "spain domain",
        "files related",
        "spain",
        "entries",
        "next associated",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "filehashsha256",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "url http",
        "filehashmd5",
        "showing",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "iocs",
        "learn more",
        "filehashsha1",
        "types of",
        "united kingdom",
        "t1053",
        "taskjob",
        "t1055",
        "injection",
        "t1082",
        "t1119",
        "t1129",
        "modules",
        "t1143",
        "soundcloud",
        "created",
        "hour ago",
        "facebook",
        "twitter",
        "victims website",
        "youtube",
        "jansky",
        "trojandropper",
        "pulses url"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2012,
        "FileHash-MD5": 140,
        "FileHash-SHA1": 129,
        "FileHash-SHA256": 1348,
        "SSLCertFingerprint": 3,
        "domain": 288,
        "hostname": 812
      },
      "indicator_count": 4732,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "243 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "678dd7c763b29de06765fb52",
      "name": "hxxps://www[.]unitedconservative[.]ca/ - 01.19.25",
      "description": "Alberta UCP Compromise (i.e. potential evidence of active foreign interference).\n\nhttps://www.virustotal.com/graph/embed/g3fdc926b2208411e8b138e8bd7069b721b2586a3a1b3445aa4f70a932701ccbe?theme=dark",
      "modified": "2025-02-19T05:02:21.540000",
      "created": "2025-01-20T04:57:43.300000",
      "tags": [
        "pentester",
        "javascript",
        "completed",
        "risk",
        "load",
        "web application",
        "firewall",
        "google search",
        "ssl certificate",
        "http",
        "create account",
        "critical",
        "malware",
        "virus",
        "trojan",
        "ransomware",
        "static",
        "analysis",
        "indicator of compromise",
        "ioc",
        "extraction",
        "emulation",
        "online",
        "submit",
        "sample",
        "download",
        "platform",
        "eci3",
        "eci4",
        "p1737345680749",
        "gaz1",
        "uaax86",
        "uab64",
        "sid1737345681",
        "sct1",
        "seg0",
        "nsi1",
        "url",
        "sandbox",
        "scanner",
        "reputation",
        "phishing",
        "hash",
        "miss",
        "eval",
        "first seen",
        "fastly",
        "gmt file",
        "linux x8664",
        "accept",
        "fingerprint",
        "loading",
        "path",
        "patch",
        "write",
        "vxstream",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please"
      ],
      "references": [
        "https://app.pentester.com/scans/U2NhblR5cGU6NDcwNDM5Mw==",
        "https://www.filescan.io/uploads/678dca8c2d219e36112b2dd4/reports/1d6e1a12-c26b-4506-aeb4-a8f539b75bee/overview",
        "https://urlquery.net/report/0b60a80e-d3a5-4ca3-8644-190f32f28c65",
        "http://www.hybrid-analysis.com/sample/c047a23d603e9babce4db32175ecad13f5209027f24772908879d40bb392cefe",
        "https://www.virustotal.com/gui/url/6314e10278e55b5f02aa1f8e588ad7e20bf90534cd813c7eff24d261e8dc4250"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 734,
        "domain": 486,
        "email": 8,
        "hostname": 346,
        "FileHash-SHA256": 1814,
        "FileHash-MD5": 363,
        "FileHash-SHA1": 361,
        "SSLCertFingerprint": 24
      },
      "indicator_count": 4136,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 129,
      "modified_text": "424 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653e5c98b16bb2c8d16342f6",
      "name": "Vonteera PUA Installed",
      "description": "*Win32:Evo-gen\\ [Susp]\n\n*LZMA\nUWVS|$D$tD$s$B\u0004D$x\u0001\u000fJ\u0002IL$l\u000fJ\u0001HD$h$\u000f2ED$`\u0003t$dD$\\\u0001D$X\u0001D$T\u0001D$P\u0001\u000fJ\u0001\u00036\u00079L$ts\u000eD$xf\u0004\u0002",
      "modified": "2023-11-28T12:02:42.639000",
      "created": "2023-10-29T13:22:32.074000",
      "tags": [
        "sha1",
        "pehash",
        "highest f",
        "daily tn",
        "regsetvalueexa",
        "entries",
        "create tr",
        "search",
        "read c",
        "regdword",
        "noodle",
        "newsfeed",
        "malware",
        "copy",
        "write",
        "next",
        "win32",
        "tools",
        "vonteera",
        "useragent",
        "malware cve",
        "tls handshake",
        "failure",
        "vonteera pua",
        "malware install",
        "activity beacon",
        "http request",
        "less related",
        "pulses otx",
        "pulses",
        "shellexecuteexw",
        "delete tn",
        "onidle tn",
        "update",
        "scheduledscan",
        "dock",
        "nids",
        "united",
        "show",
        "crlf line",
        "unicode text",
        "lzma uwvs",
        "pj69l",
        "alerts"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 236,
        "FileHash-SHA1": 214,
        "FileHash-SHA256": 1280,
        "hostname": 210,
        "URL": 395,
        "SSLCertFingerprint": 2,
        "domain": 58
      },
      "indicator_count": 2395,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f0382b35bbb50ddd70190",
      "name": "Vonteera PUA Installed",
      "description": "",
      "modified": "2023-11-28T12:02:42.639000",
      "created": "2023-10-30T01:14:42.967000",
      "tags": [
        "sha1",
        "pehash",
        "highest f",
        "daily tn",
        "regsetvalueexa",
        "entries",
        "create tr",
        "search",
        "read c",
        "regdword",
        "noodle",
        "newsfeed",
        "malware",
        "copy",
        "write",
        "next",
        "win32",
        "tools",
        "vonteera",
        "useragent",
        "malware cve",
        "tls handshake",
        "failure",
        "vonteera pua",
        "malware install",
        "activity beacon",
        "http request",
        "less related",
        "pulses otx",
        "pulses",
        "shellexecuteexw",
        "delete tn",
        "onidle tn",
        "update",
        "scheduledscan",
        "dock",
        "nids",
        "united",
        "show",
        "crlf line",
        "unicode text",
        "lzma uwvs",
        "pj69l",
        "alerts"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "653e5c98b16bb2c8d16342f6",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 236,
        "FileHash-SHA1": 214,
        "FileHash-SHA256": 1280,
        "hostname": 210,
        "URL": 395,
        "SSLCertFingerprint": 2,
        "domain": 58
      },
      "indicator_count": 2395,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ethmon.net/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ethmon.net/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776630042.20987
}