{
  "type": "URL",
  "indicator": "https://feross.org",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://feross.org",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3257943668,
      "indicator": "https://feross.org",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 26,
      "pulses": [
        {
          "id": "6570a458c9934c2c2387556a",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:42:00.798000",
          "created": "2023-12-06T16:42:00.798000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a45205d13649df0844ba",
          "name": "iOS Hacktool Actively exploited",
          "description": "",
          "modified": "2023-12-06T16:41:54.157000",
          "created": "2023-12-06T16:41:54.157000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a44bb1c37c78fb86e09d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:41:47.803000",
          "created": "2023-12-06T16:41:47.803000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a441d4e3eae9a6de91dd",
          "name": "Apple iOS - COBALT STRIKE",
          "description": "",
          "modified": "2023-12-06T16:41:37.067000",
          "created": "2023-12-06T16:41:37.067000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a43affc51769be1188f9",
          "name": "Apple exploit targets private citizen. Actively exploited.",
          "description": "",
          "modified": "2023-12-06T16:41:30.939000",
          "created": "2023-12-06T16:41:30.939000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a434c72e0d41666e0b43",
          "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
          "description": "",
          "modified": "2023-12-06T16:41:24.547000",
          "created": "2023-12-06T16:41:24.547000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a42c670fdf66b4af46df",
          "name": "Crimson Apple",
          "description": "",
          "modified": "2023-12-06T16:41:16.304000",
          "created": "2023-12-06T16:41:16.304000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4250011524abcdf1be0",
          "name": "Apple Tracking \u2022 Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:09.398000",
          "created": "2023-12-06T16:41:09.398000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a41e852f6b1b04648d44",
          "name": "Apple iOS Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:02.718000",
          "created": "2023-12-06T16:41:02.718000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4161da64500aa609121",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:54.425000",
          "created": "2023-12-06T16:40:54.425000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a40e62ca90307d3ed7a3",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:46.173000",
          "created": "2023-12-06T16:40:46.173000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1d4a989642696d13b34c",
          "name": "Network capture | Gather Victim Network Information | C2",
          "description": "",
          "modified": "2023-11-20T11:03:09.867000",
          "created": "2023-10-30T03:04:42.175000",
          "tags": [
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "ssl certificate",
            "contacted",
            "whois record",
            "tsara brashears",
            "historical ssl",
            "apple",
            "password",
            "porn",
            "networks",
            "botnet campaign",
            "crypto",
            "installer",
            "attacker",
            "metro",
            "brazzers",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "maxage86400",
            "path",
            "html info",
            "title page",
            "found meta",
            "milehigh",
            "watch",
            "milfs",
            "trackers google",
            "analytics na",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "specific",
            "pattern match",
            "file",
            "ascii text",
            "windows nt",
            "jpeg image",
            "united",
            "appdata",
            "jfif",
            "mitre att",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "general",
            "local",
            "strings",
            "class",
            "critical",
            "error",
            "server",
            "email",
            "code",
            "whois privacy",
            "domain status",
            "registrar abuse",
            "registrar url",
            "registrar",
            "registry domain",
            "C2",
            "organization",
            "threat level",
            "windir",
            "getpost",
            "name server",
            "openurl c"
          ],
          "references": [
            "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
            "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
            "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]",
            "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
            "m1.sweetheartvideo.com                                                                            [mailer!]",
            "mba3.sweetheartvideo.com                                                                       [Server]",
            "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
            "Other",
            "browser.events.data.msn.com                                                                    [sandbox and archive browser events]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6533ed2685e0fc66ac0628bd",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4377,
            "FileHash-MD5": 128,
            "FileHash-SHA1": 127,
            "FileHash-SHA256": 2861,
            "domain": 829,
            "hostname": 1452,
            "CVE": 1,
            "email": 6
          },
          "indicator_count": 9781,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "881 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6533ed2685e0fc66ac0628bd",
          "name": "Network capture | Gather Victim Network Information | C2",
          "description": "Botnet. Spammer. BN campaigners. Victim name used for marketing BN and porn. This website contains age-restricted material and contains explicit depictions of sexual activity, but does not ask for permission to access or access any of the site's materials. \u00c2\u00a9 Mile High Distribution Inc",
          "modified": "2023-11-20T11:03:09.867000",
          "created": "2023-10-21T15:24:22.377000",
          "tags": [
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "ssl certificate",
            "contacted",
            "whois record",
            "tsara brashears",
            "historical ssl",
            "apple",
            "password",
            "porn",
            "networks",
            "botnet campaign",
            "crypto",
            "installer",
            "attacker",
            "metro",
            "brazzers",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "maxage86400",
            "path",
            "html info",
            "title page",
            "found meta",
            "milehigh",
            "watch",
            "milfs",
            "trackers google",
            "analytics na",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "specific",
            "pattern match",
            "file",
            "ascii text",
            "windows nt",
            "jpeg image",
            "united",
            "appdata",
            "jfif",
            "mitre att",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "general",
            "local",
            "strings",
            "class",
            "critical",
            "error",
            "server",
            "email",
            "code",
            "whois privacy",
            "domain status",
            "registrar abuse",
            "registrar url",
            "registrar",
            "registry domain",
            "C2",
            "organization",
            "threat level",
            "windir",
            "getpost",
            "name server",
            "openurl c"
          ],
          "references": [
            "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
            "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
            "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]",
            "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
            "m1.sweetheartvideo.com                                                                            [mailer!]",
            "mba3.sweetheartvideo.com                                                                       [Server]",
            "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
            "Other",
            "browser.events.data.msn.com                                                                    [sandbox and archive browser events]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4377,
            "FileHash-MD5": 128,
            "FileHash-SHA1": 127,
            "FileHash-SHA256": 2861,
            "domain": 829,
            "hostname": 1452,
            "CVE": 1,
            "email": 6
          },
          "indicator_count": 9781,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "881 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdce908b6c507cf08faf7",
          "name": "     ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:37:13.129000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdba12fec032a4684721c",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc6c08b6c507cf08faf6",
          "name": "   iOS Hacktool Actively exploited ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:35:08.802000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc42fa7e80fbb768244d",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc42fa7e80fbb768244d",
          "name": "    ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:34:26.716000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc2d3c898b5a98fcfc64",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc2d3c898b5a98fcfc64",
          "name": "Apple iOS - COBALT STRIKE ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:34:05.784000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc093e1a5bc65f6b28b3",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc093e1a5bc65f6b28b3",
          "name": "Apple exploit targets private citizen. Actively exploited.",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:33:29.774000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdba12fec032a4684721c",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdba12fec032a4684721c",
          "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:31:45.373000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdaed5dc332a3b00549f1",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdaed5dc332a3b00549f1",
          "name": "Crimson Apple ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:28:45.920000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdad70ebc73b9922363f8",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdad70ebc73b9922363f8",
          "name": "Apple Tracking \u2022 Remote Access ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:28:23.256000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdaa6d6b8dec6c841dddf",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdaa6d6b8dec6c841dddf",
          "name": "Apple iOS Remote Access ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:27:34.382000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffd9a1a50c6f76a8f7de02",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffd9a641b3478bfd23fe30",
          "name": "Major Apple Exploit",
          "description": "Exploit/Shellcode Apple \u2022 Remote, Access \u2022 Command and Control \u2022 24/7 Monitoring\nCrimson Apple",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:23:18.625000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffd9a1a50c6f76a8f7de02",
          "name": "Major Apple Exploit",
          "description": "Exploit/Shellcode Apple \u2022 Remote, Access \u2022 Command and Control \u2022 24/7 Monitoring\nCrimson Apple",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:23:13.409000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "920 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "mba3.sweetheartvideo.com                                                                       [Server]",
        "https://www.sweetheartvideo.com                                                       [Pattern match, Brashears]",
        "https://www.hybrid-analysis.com/sample/a478360da159c358a804f1340f142fa2a0d689e02d743b71509e5e3921877a3e           [Research Tool]",
        "m1.sweetheartvideo.com                                                                            [mailer!]",
        "Other",
        "https://www.milehighmedia.com/legal/2257                                     exploit_source  [Metro T-Mobile attacker. Brazzers  | T]",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://www.sweetheartvideo.com/tsara-brashears/                    [Botnet tracking campaign, referrer]",
        "browser.events.data.msn.com                                                                    [sandbox and archive browser events]",
        "https://www.sweetheartvideo.com/tsara-brashears                      [Network ID]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 49091
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/feross.org",
    "whois": "http://whois.domaintools.com/feross.org",
    "domain": "feross.org",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 26,
  "pulses": [
    {
      "id": "6570a458c9934c2c2387556a",
      "name": "",
      "description": "",
      "modified": "2023-12-06T16:42:00.798000",
      "created": "2023-12-06T16:42:00.798000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a45205d13649df0844ba",
      "name": "iOS Hacktool Actively exploited",
      "description": "",
      "modified": "2023-12-06T16:41:54.157000",
      "created": "2023-12-06T16:41:54.157000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a44bb1c37c78fb86e09d",
      "name": "Undefined Name",
      "description": "",
      "modified": "2023-12-06T16:41:47.803000",
      "created": "2023-12-06T16:41:47.803000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a441d4e3eae9a6de91dd",
      "name": "Apple iOS - COBALT STRIKE",
      "description": "",
      "modified": "2023-12-06T16:41:37.067000",
      "created": "2023-12-06T16:41:37.067000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a43affc51769be1188f9",
      "name": "Apple exploit targets private citizen. Actively exploited.",
      "description": "",
      "modified": "2023-12-06T16:41:30.939000",
      "created": "2023-12-06T16:41:30.939000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a434c72e0d41666e0b43",
      "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
      "description": "",
      "modified": "2023-12-06T16:41:24.547000",
      "created": "2023-12-06T16:41:24.547000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a42c670fdf66b4af46df",
      "name": "Crimson Apple",
      "description": "",
      "modified": "2023-12-06T16:41:16.304000",
      "created": "2023-12-06T16:41:16.304000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4250011524abcdf1be0",
      "name": "Apple Tracking \u2022 Remote Access",
      "description": "",
      "modified": "2023-12-06T16:41:09.398000",
      "created": "2023-12-06T16:41:09.398000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a41e852f6b1b04648d44",
      "name": "Apple iOS Remote Access",
      "description": "",
      "modified": "2023-12-06T16:41:02.718000",
      "created": "2023-12-06T16:41:02.718000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4161da64500aa609121",
      "name": "Major Apple Exploit",
      "description": "",
      "modified": "2023-12-06T16:40:54.425000",
      "created": "2023-12-06T16:40:54.425000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://feross.org",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://feross.org",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629694.078333
}