{
  "type": "URL",
  "indicator": "https://europe.wiseflow.net/auth/azure/callback/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://europe.wiseflow.net/auth/azure/callback/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3900099114,
      "indicator": "https://europe.wiseflow.net/auth/azure/callback/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "68f5cfa9b74d6faa43eb6585",
          "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
          "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-20T05:59:04.173000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f80aa152fdd795fa008e2e",
          "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
          "description": "",
          "modified": "2025-11-19T05:02:39.961000",
          "created": "2025-10-21T22:35:13.128000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "b9sdwan",
            "b9 no",
            "united",
            "passive dns",
            "ipv4 add",
            "urls",
            "location united",
            "america flag",
            "san jose",
            "trojan",
            "canada unknown",
            "hostname add",
            "url analysis",
            "http",
            "ip address",
            "related nids",
            "path",
            "america asn",
            "as4983 intel",
            "canada",
            "gmt p3p",
            "cp noi",
            "adm dev",
            "psai com",
            "unknown ns",
            "united states",
            "twitter",
            "url add",
            "files location",
            "flag united",
            "status",
            "emails",
            "servers",
            "mtb aug",
            "win32",
            "invalid url",
            "lowfi",
            "body html",
            "head title",
            "files",
            "files ip",
            "filehashmd5",
            "iocs",
            "type indicator",
            "role title",
            "related pulses",
            "dynamicloader",
            "directui",
            "write c",
            "element",
            "classinfobase",
            "forbidden",
            "write",
            "high",
            "worm",
            "delphi",
            "guard",
            "error",
            "vmprotect",
            "malware",
            "defender",
            "suspicious",
            "port",
            "read c",
            "destination",
            "crlf line",
            "rgba",
            "unicode",
            "png image",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "search",
            "arial",
            "trojandropper",
            "null",
            "enough",
            "hosts",
            "fast",
            "afraid",
            "a domains",
            "welcome",
            "ok server",
            "gmt content",
            "present sep",
            "unknown soa",
            "unknown cname",
            "present oct",
            "present aug",
            "event rocket",
            "title",
            "cookie",
            "encrypt",
            "sabey type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68f5cfa9b74d6faa43eb6585",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1434,
            "URL": 3982,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 309,
            "FileHash-SHA256": 1525,
            "domain": 758,
            "email": 10,
            "SSLCertFingerprint": 3,
            "CVE": 1
          },
          "indicator_count": 8413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "151 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "665ec0cfd110b0694c51fbe2",
          "name": "Eset - Dorkbot",
          "description": "Dorkbot a self-propagating program that can spread itself from one computer to another threatening to perform numerous f actions of a malicious hacker's choice on PC. Found on an updated windows machine. Hacker named  machine, installed apple viewing software programs, partitioned 'zombie' machine.  Network of compromised, sketchy remote transfer agents of a professional in the service industry.  Serious impact on or companies impact on remote workers contracted by company in question due to the abrupt cessation of business of a recognized brand it's industry. Unfortunately, the documentation of this Eset programs behavior has been misplaced. From recall. this install identified and allowed threats, d. It was a weird see with the names eye experience. Incoming request/ Remote operators, disallowed many transactions and other basic use of software. Workers potentially working a database from individuals whose PII & PHI was leaked.",
          "modified": "2024-07-04T06:01:28.799000",
          "created": "2024-06-04T07:22:55.572000",
          "tags": [
            "historical ssl",
            "referrer",
            "algorithm",
            "v3 serial",
            "number",
            "cus cnamazon",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "first",
            "server",
            "registrar abuse",
            "date",
            "csl computer",
            "gmbh dba",
            "contact phone",
            "domain status",
            "registrar url",
            "registrar whois",
            "contact email",
            "code",
            "united",
            "unknown",
            "aaaa",
            "as14061",
            "cname",
            "search",
            "emails",
            "dnssec",
            "showing",
            "win32",
            "title error",
            "passive dns",
            "open ports",
            "trojan",
            "body doctype",
            "html public",
            "w3cdtd html",
            "body",
            "dns replication",
            "domain",
            "lookups",
            "email",
            "name server",
            "slovensko",
            "tech contact",
            "valid",
            "admin contact",
            "a domains",
            "a li",
            "span h3",
            "header link",
            "option option",
            "united kingdom",
            "test",
            "april",
            "meta",
            "paris",
            "eset",
            "yara detections",
            "nod32",
            "amon",
            "internalname",
            "online payment",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "amz cf",
            "creation date",
            "record value",
            "expiration date",
            "name servers",
            "servers",
            "status",
            "next",
            "asnone united",
            "moved",
            "certificate",
            "ipv4",
            "urls",
            "files",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "cf2a",
            "xaax04x00",
            "high",
            "dns reply",
            "noip domain",
            "et trojan",
            "createsuspended",
            "malware traffic",
            "dorkbot",
            "malware",
            "copy",
            "name verdict",
            "falcon sandbox",
            "windows nt",
            "appdata",
            "png image",
            "pattern match",
            "indicator",
            "ascii text",
            "rgba",
            "get collect",
            "vj98",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "path",
            "ms windows",
            "pe32",
            "intel",
            "microsoft asf",
            "pe32 executable",
            "database",
            "english",
            "installer",
            "template",
            "tue jun",
            "service",
            "crlf line",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "tip"
          ],
          "references": [
            "bpp.eset.com",
            "IDS Detections: Win32/IRCBrute/Floder.ej/TKcik.A Checkin Dorkbot GeoIP Lookup to wipmania DNS Reply Sinkhole Microsoft NO-IP",
            "IDS Detections: Domain Win32/IRCBrute/Floder.ej/TKcik.A Pass Checkin External IP Lookup Attempt To Wipmania Suspicious Mozilla User-Agent - Likely Fake",
            "High Priority Alerts: nids_malware_alert injection_runpe network_icmp dumped_buffer2 network_irc nolookup_communication",
            "High Priority Alerts: allocates_execute_remote_process persistence_autorun injection_createremotethread injection_modifies_memory",
            "High Priority Alerts: injection_write_memory injection_write_memory_exe modifies_proxy_wpad injection_ntsetcontextthread injection_resumethread dumped_buffer network_http nids_alert suspicious_tld allocates_rwx .",
            "IP\u2019s Contacted: 172.217.14.226  172.217.14.234  162.217.99.134  204.95.99.243  212.83.168.196  216.58.193.67  216.58.217.42  99.86.38.99",
            "Domains Contacted: n.jntbxduhz.ru n.yqqufklho.ru n.lotys.ru api.wipmania.com n.vbemnggcj.ru n.hmiblgoja.ru dns.msftncsi.com n.ezjhyxxbf.ru",
            "https://otx.alienvault.com/indicator/file/8ad6f89c763315bf59bc3619139f8478f6bcc57d902123c8b5c413f251ff8778",
            "Alerts: dead_host network_icmp nolookup_communication packer_polymorphic origin_langid peid_packer",
            "https://healthinsurancecompanion.com/affordable-health-insurance?Landing_Page=https://healthinsurancecompanion.com/affordable-health-insurance&SRC=iDr_E",
            "appleremotesupport.com | http://thickapple.net/index.php",
            "https://normalexchange.com/v/155e44b6-11dc-11e8-9dff-01407350b0f6/c/1e289258-e09c-11e5-bea8-021988c520a1/?clickid=9023100005531544085-201802-3",
            "https://asserts.turbovpn.co/web/images/download/icons/apple-icon.png",
            "https://appleid-verify.servecounterstrike.com/",
            "http://schoolgirl.uxxxporn.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:GenMalicious-KAG\\ [Trj]",
              "display_name": "Win32:GenMalicious-KAG\\ [Trj]",
              "target": null
            },
            {
              "id": ",  Win.Trojan.Agent-1286703",
              "display_name": ",  Win.Trojan.Agent-1286703",
              "target": null
            },
            {
              "id": "Trojan:Win32/DorkBot.DU",
              "display_name": "Trojan:Win32/DorkBot.DU",
              "target": "/malware/Trojan:Win32/DorkBot.DU"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Cosmu-1058",
              "display_name": "Win.Trojan.Cosmu-1058",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Finance",
            "Healthcare",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 758,
            "FileHash-SHA1": 478,
            "FileHash-SHA256": 2561,
            "URL": 8210,
            "domain": 2202,
            "hostname": 2760,
            "email": 22,
            "CVE": 3
          },
          "indicator_count": 16994,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "654 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Domains Contacted: n.jntbxduhz.ru n.yqqufklho.ru n.lotys.ru api.wipmania.com n.vbemnggcj.ru n.hmiblgoja.ru dns.msftncsi.com n.ezjhyxxbf.ru",
        "IDS Detections: Win32/IRCBrute/Floder.ej/TKcik.A Checkin Dorkbot GeoIP Lookup to wipmania DNS Reply Sinkhole Microsoft NO-IP",
        "High Priority Alerts: nids_malware_alert injection_runpe network_icmp dumped_buffer2 network_irc nolookup_communication",
        "https://asserts.turbovpn.co/web/images/download/icons/apple-icon.png",
        "Alerts: dead_host network_icmp nolookup_communication packer_polymorphic origin_langid peid_packer",
        "appleremotesupport.com | http://thickapple.net/index.php",
        "https://normalexchange.com/v/155e44b6-11dc-11e8-9dff-01407350b0f6/c/1e289258-e09c-11e5-bea8-021988c520a1/?clickid=9023100005531544085-201802-3",
        "High Priority Alerts: allocates_execute_remote_process persistence_autorun injection_createremotethread injection_modifies_memory",
        "https://healthinsurancecompanion.com/affordable-health-insurance?Landing_Page=https://healthinsurancecompanion.com/affordable-health-insurance&SRC=iDr_E",
        "https://appleid-verify.servecounterstrike.com/",
        "https://otx.alienvault.com/indicator/file/8ad6f89c763315bf59bc3619139f8478f6bcc57d902123c8b5c413f251ff8778",
        "IDS Detections: Domain Win32/IRCBrute/Floder.ej/TKcik.A Pass Checkin External IP Lookup Attempt To Wipmania Suspicious Mozilla User-Agent - Likely Fake",
        "bpp.eset.com",
        "IP\u2019s Contacted: 172.217.14.226  172.217.14.234  162.217.99.134  204.95.99.243  212.83.168.196  216.58.193.67  216.58.217.42  99.86.38.99",
        "http://schoolgirl.uxxxporn.com",
        "High Priority Alerts: injection_write_memory injection_write_memory_exe modifies_proxy_wpad injection_ntsetcontextthread injection_resumethread dumped_buffer network_http nids_alert suspicious_tld allocates_rwx ."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/dorkbot.du",
            "Win32:genmalicious-kag\\ [trj]",
            ",  win.trojan.agent-1286703",
            "Win.trojan.cosmu-1058",
            "Worm:win32/autorun.xxy!bit",
            "Trojan:win32/zombie.a",
            "Win32:malware-gen"
          ],
          "industries": [
            "Finance",
            "Healthcare",
            "Technology",
            "Telecommunications"
          ],
          "unique_indicators": 25242
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/wiseflow.net",
    "whois": "http://whois.domaintools.com/wiseflow.net",
    "domain": "wiseflow.net",
    "hostname": "europe.wiseflow.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "68f5cfa9b74d6faa43eb6585",
      "name": "Indicator Removal service affecting Threat Hunters  | Brian Sabey",
      "description": "Indicator  removal used by M. Brian Sabey to for the purpose of attacking networks and removing malicious indicators related to entities and attacks deployed by  & Co. Impacts: Threat hunting services. * Worm:Win32/AutoRun.XXY!bit (Emotet and Neshta relationship).\nThere are many other malicious indicators.\n\n* foundryvttcasero.roleros.cl",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-20T05:59:04.173000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f80aa152fdd795fa008e2e",
      "name": "Small & Comisproc Indicator Removal service Affects Threat Hunter Sevices",
      "description": "",
      "modified": "2025-11-19T05:02:39.961000",
      "created": "2025-10-21T22:35:13.128000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "b9sdwan",
        "b9 no",
        "united",
        "passive dns",
        "ipv4 add",
        "urls",
        "location united",
        "america flag",
        "san jose",
        "trojan",
        "canada unknown",
        "hostname add",
        "url analysis",
        "http",
        "ip address",
        "related nids",
        "path",
        "america asn",
        "as4983 intel",
        "canada",
        "gmt p3p",
        "cp noi",
        "adm dev",
        "psai com",
        "unknown ns",
        "united states",
        "twitter",
        "url add",
        "files location",
        "flag united",
        "status",
        "emails",
        "servers",
        "mtb aug",
        "win32",
        "invalid url",
        "lowfi",
        "body html",
        "head title",
        "files",
        "files ip",
        "filehashmd5",
        "iocs",
        "type indicator",
        "role title",
        "related pulses",
        "dynamicloader",
        "directui",
        "write c",
        "element",
        "classinfobase",
        "forbidden",
        "write",
        "high",
        "worm",
        "delphi",
        "guard",
        "error",
        "vmprotect",
        "malware",
        "defender",
        "suspicious",
        "port",
        "read c",
        "destination",
        "crlf line",
        "rgba",
        "unicode",
        "png image",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "search",
        "arial",
        "trojandropper",
        "null",
        "enough",
        "hosts",
        "fast",
        "afraid",
        "a domains",
        "welcome",
        "ok server",
        "gmt content",
        "present sep",
        "unknown soa",
        "unknown cname",
        "present oct",
        "present aug",
        "event rocket",
        "title",
        "cookie",
        "encrypt",
        "sabey type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68f5cfa9b74d6faa43eb6585",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1434,
        "URL": 3982,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 309,
        "FileHash-SHA256": 1525,
        "domain": 758,
        "email": 10,
        "SSLCertFingerprint": 3,
        "CVE": 1
      },
      "indicator_count": 8413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "151 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "665ec0cfd110b0694c51fbe2",
      "name": "Eset - Dorkbot",
      "description": "Dorkbot a self-propagating program that can spread itself from one computer to another threatening to perform numerous f actions of a malicious hacker's choice on PC. Found on an updated windows machine. Hacker named  machine, installed apple viewing software programs, partitioned 'zombie' machine.  Network of compromised, sketchy remote transfer agents of a professional in the service industry.  Serious impact on or companies impact on remote workers contracted by company in question due to the abrupt cessation of business of a recognized brand it's industry. Unfortunately, the documentation of this Eset programs behavior has been misplaced. From recall. this install identified and allowed threats, d. It was a weird see with the names eye experience. Incoming request/ Remote operators, disallowed many transactions and other basic use of software. Workers potentially working a database from individuals whose PII & PHI was leaked.",
      "modified": "2024-07-04T06:01:28.799000",
      "created": "2024-06-04T07:22:55.572000",
      "tags": [
        "historical ssl",
        "referrer",
        "algorithm",
        "v3 serial",
        "number",
        "cus cnamazon",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "first",
        "server",
        "registrar abuse",
        "date",
        "csl computer",
        "gmbh dba",
        "contact phone",
        "domain status",
        "registrar url",
        "registrar whois",
        "contact email",
        "code",
        "united",
        "unknown",
        "aaaa",
        "as14061",
        "cname",
        "search",
        "emails",
        "dnssec",
        "showing",
        "win32",
        "title error",
        "passive dns",
        "open ports",
        "trojan",
        "body doctype",
        "html public",
        "w3cdtd html",
        "body",
        "dns replication",
        "domain",
        "lookups",
        "email",
        "name server",
        "slovensko",
        "tech contact",
        "valid",
        "admin contact",
        "a domains",
        "a li",
        "span h3",
        "header link",
        "option option",
        "united kingdom",
        "test",
        "april",
        "meta",
        "paris",
        "eset",
        "yara detections",
        "nod32",
        "amon",
        "internalname",
        "online payment",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "pulse pulses",
        "amz cf",
        "creation date",
        "record value",
        "expiration date",
        "name servers",
        "servers",
        "status",
        "next",
        "asnone united",
        "moved",
        "certificate",
        "ipv4",
        "urls",
        "files",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "cf2a",
        "xaax04x00",
        "high",
        "dns reply",
        "noip domain",
        "et trojan",
        "createsuspended",
        "malware traffic",
        "dorkbot",
        "malware",
        "copy",
        "name verdict",
        "falcon sandbox",
        "windows nt",
        "appdata",
        "png image",
        "pattern match",
        "indicator",
        "ascii text",
        "rgba",
        "get collect",
        "vj98",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "path",
        "ms windows",
        "pe32",
        "intel",
        "microsoft asf",
        "pe32 executable",
        "database",
        "english",
        "installer",
        "template",
        "tue jun",
        "service",
        "crlf line",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "tip"
      ],
      "references": [
        "bpp.eset.com",
        "IDS Detections: Win32/IRCBrute/Floder.ej/TKcik.A Checkin Dorkbot GeoIP Lookup to wipmania DNS Reply Sinkhole Microsoft NO-IP",
        "IDS Detections: Domain Win32/IRCBrute/Floder.ej/TKcik.A Pass Checkin External IP Lookup Attempt To Wipmania Suspicious Mozilla User-Agent - Likely Fake",
        "High Priority Alerts: nids_malware_alert injection_runpe network_icmp dumped_buffer2 network_irc nolookup_communication",
        "High Priority Alerts: allocates_execute_remote_process persistence_autorun injection_createremotethread injection_modifies_memory",
        "High Priority Alerts: injection_write_memory injection_write_memory_exe modifies_proxy_wpad injection_ntsetcontextthread injection_resumethread dumped_buffer network_http nids_alert suspicious_tld allocates_rwx .",
        "IP\u2019s Contacted: 172.217.14.226  172.217.14.234  162.217.99.134  204.95.99.243  212.83.168.196  216.58.193.67  216.58.217.42  99.86.38.99",
        "Domains Contacted: n.jntbxduhz.ru n.yqqufklho.ru n.lotys.ru api.wipmania.com n.vbemnggcj.ru n.hmiblgoja.ru dns.msftncsi.com n.ezjhyxxbf.ru",
        "https://otx.alienvault.com/indicator/file/8ad6f89c763315bf59bc3619139f8478f6bcc57d902123c8b5c413f251ff8778",
        "Alerts: dead_host network_icmp nolookup_communication packer_polymorphic origin_langid peid_packer",
        "https://healthinsurancecompanion.com/affordable-health-insurance?Landing_Page=https://healthinsurancecompanion.com/affordable-health-insurance&SRC=iDr_E",
        "appleremotesupport.com | http://thickapple.net/index.php",
        "https://normalexchange.com/v/155e44b6-11dc-11e8-9dff-01407350b0f6/c/1e289258-e09c-11e5-bea8-021988c520a1/?clickid=9023100005531544085-201802-3",
        "https://asserts.turbovpn.co/web/images/download/icons/apple-icon.png",
        "https://appleid-verify.servecounterstrike.com/",
        "http://schoolgirl.uxxxporn.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:GenMalicious-KAG\\ [Trj]",
          "display_name": "Win32:GenMalicious-KAG\\ [Trj]",
          "target": null
        },
        {
          "id": ",  Win.Trojan.Agent-1286703",
          "display_name": ",  Win.Trojan.Agent-1286703",
          "target": null
        },
        {
          "id": "Trojan:Win32/DorkBot.DU",
          "display_name": "Trojan:Win32/DorkBot.DU",
          "target": "/malware/Trojan:Win32/DorkBot.DU"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win.Trojan.Cosmu-1058",
          "display_name": "Win.Trojan.Cosmu-1058",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Finance",
        "Healthcare",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 758,
        "FileHash-SHA1": 478,
        "FileHash-SHA256": 2561,
        "URL": 8210,
        "domain": 2202,
        "hostname": 2760,
        "email": 22,
        "CVE": 3
      },
      "indicator_count": 16994,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "654 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://europe.wiseflow.net/auth/azure/callback/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://europe.wiseflow.net/auth/azure/callback/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776617886.6362379
}