{
  "type": "URL",
  "indicator": "https://firebase.google.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://firebase.google.com",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #1",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #3",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain google.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain google.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 3175190835,
      "indicator": "https://firebase.google.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "6893032410060f658d862c60",
          "name": "Hosting App - Partial research | Emotet Worm",
          "description": "#firebase #google #dark_web_hosting #ransom #tracking #locate #monitored_targets #worm #emotet #malware #remoted_devices #trojan #reputation\n\n\u2022 Targets likely unaware.\n\n[m.pornsexer.xxx.3.1.adiosfil.roksit.net - reputation tool]",
          "modified": "2025-09-05T07:00:00.711000",
          "created": "2025-08-06T07:24:20.645000",
          "tags": [
            "url https",
            "iocs",
            "learn more",
            "ipv4",
            "domain",
            "hostname",
            "types of",
            "sweden",
            "united",
            "belgium",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "showing",
            "document file",
            "v2 document",
            "search",
            "medium",
            "ms windows",
            "vista event",
            "port",
            "msie",
            "windows nt",
            "wow64",
            "dirty",
            "write",
            "powershell",
            "copy",
            "next",
            "defender",
            "dynamicloader",
            "high",
            "fwlink",
            "windows",
            "cmd c",
            "alerts",
            "bios",
            "related pulses",
            "pulses",
            "related tags",
            "file type",
            "ascii text",
            "sha256",
            "external",
            "virustotal api",
            "screenshots",
            "june",
            "flag",
            "usa windows",
            "input threat",
            "level analysis",
            "summary",
            "gbrflag",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "ssl certificate",
            "defense evasion",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "size",
            "mitre att",
            "date",
            "path",
            "format",
            "august",
            "hybrid",
            "local",
            "form",
            "click",
            "strings",
            "ubar",
            "truetype",
            "web open",
            "font format",
            "description web",
            "general",
            "iframe",
            "slcc2",
            "media center",
            "destination",
            "tlsv1",
            "unknown",
            "execution",
            "dock",
            "persistence",
            "malware",
            "encrypt",
            "ck techniques",
            "read c",
            "show",
            "entries",
            "delete",
            "data upload",
            "extraction",
            "onlv",
            "find",
            "type",
            "no matching",
            "indicator",
            "mtb may",
            "trojandropper",
            "passive dns",
            "next associated",
            "lowfi",
            "gmt cache",
            "sameorigin",
            "ipv4 add",
            "trojan",
            "mtb apr",
            "files show",
            "date hash",
            "avast avg",
            "shellterlod may",
            "win32qqpass apr",
            "trojanspy",
            "ransom",
            "wiper",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results aug",
            "urls show",
            "hookwowlow may"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4593,
            "hostname": 1754,
            "domain": 399,
            "FileHash-SHA256": 2128,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 299,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68930449988277cd29c25cb7",
          "name": "https://firebase.google.com/ - Ransom \u2022 Wiper\u2022 Trojan dropper",
          "description": "",
          "modified": "2025-09-05T07:00:00.711000",
          "created": "2025-08-06T07:29:13.136000",
          "tags": [
            "url https",
            "iocs",
            "learn more",
            "ipv4",
            "domain",
            "hostname",
            "types of",
            "sweden",
            "united",
            "belgium",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "showing",
            "document file",
            "v2 document",
            "search",
            "medium",
            "ms windows",
            "vista event",
            "port",
            "msie",
            "windows nt",
            "wow64",
            "dirty",
            "write",
            "powershell",
            "copy",
            "next",
            "defender",
            "dynamicloader",
            "high",
            "fwlink",
            "windows",
            "cmd c",
            "alerts",
            "bios",
            "related pulses",
            "pulses",
            "related tags",
            "file type",
            "ascii text",
            "sha256",
            "external",
            "virustotal api",
            "screenshots",
            "june",
            "flag",
            "usa windows",
            "input threat",
            "level analysis",
            "summary",
            "gbrflag",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "ssl certificate",
            "defense evasion",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "size",
            "mitre att",
            "date",
            "path",
            "format",
            "august",
            "hybrid",
            "local",
            "form",
            "click",
            "strings",
            "ubar",
            "truetype",
            "web open",
            "font format",
            "description web",
            "general",
            "iframe",
            "slcc2",
            "media center",
            "destination",
            "tlsv1",
            "unknown",
            "execution",
            "dock",
            "persistence",
            "malware",
            "encrypt",
            "ck techniques",
            "read c",
            "show",
            "entries",
            "delete",
            "data upload",
            "extraction",
            "onlv",
            "find",
            "type",
            "no matching",
            "indicator",
            "mtb may",
            "trojandropper",
            "passive dns",
            "next associated",
            "lowfi",
            "gmt cache",
            "sameorigin",
            "ipv4 add",
            "trojan",
            "mtb apr",
            "files show",
            "date hash",
            "avast avg",
            "shellterlod may",
            "win32qqpass apr",
            "trojanspy",
            "ransom",
            "wiper",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results aug",
            "urls show",
            "hookwowlow may"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6893032410060f658d862c60",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4593,
            "hostname": 1754,
            "domain": 399,
            "FileHash-SHA256": 2128,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 299,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68923ea4efbf58b7ba48acec",
          "name": "Hosted App",
          "description": "",
          "modified": "2025-09-04T16:03:17.037000",
          "created": "2025-08-05T17:25:56.454000",
          "tags": [
            "issuer wr3",
            "log id",
            "gmtn",
            "abn timestamp",
            "ad180b80",
            "full name",
            "extensionsstr",
            "web server",
            "ca issuers",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "spawns",
            "mitre att",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "ascii text",
            "pattern match",
            "show technique",
            "date",
            "format",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "flag",
            "usa windows",
            "hwp support",
            "march",
            "december",
            "united",
            "markmonitor",
            "overview dns",
            "requests domain",
            "country",
            "contacted hosts",
            "ip address",
            "process details",
            "t1179 hooking",
            "access windows",
            "installs",
            "control att",
            "found",
            "development att",
            "name server",
            "show process",
            "programfiles",
            "command decode",
            "suricata ipv4",
            "ck matrix",
            "comspec",
            "model",
            "general",
            "dynamicloader",
            "unknown",
            "as16509",
            "whitelisted",
            "medium",
            "write c",
            "as15169",
            "search",
            "high",
            "write",
            "android",
            "malware",
            "copy",
            "next",
            "formbook cnc",
            "checkin",
            "entries",
            "passive dns",
            "next associated",
            "site",
            "neue",
            "ipv4",
            "pulse pulses",
            "exploit",
            "trojan",
            "virtool",
            "body",
            "refer",
            "present dec",
            "epub",
            "present jan",
            "present nov",
            "present oct",
            "showing",
            "urls show",
            "win32",
            "win64",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "prefetch8",
            "localappdata",
            "prefetch1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3409,
            "hostname": 4127,
            "URL": 8408,
            "SSLCertFingerprint": 9,
            "FileHash-SHA256": 1175,
            "FileHash-MD5": 144,
            "FileHash-SHA1": 134,
            "CVE": 2
          },
          "indicator_count": 17408,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "227 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e01dc0fd31b731b2d5dac7",
          "name": "Cloudflade Botnet \u00bb  | 1.1.1.1 | Warp.Plus?  | smlpp.monster | Mirai",
          "description": "This issue may only affect those already in Botnet/s. DoS.Bad login requests .dead host, CnC,\nELF:Mirai-GH\\ [Trj] ,\nMirai ,\nNIDS m\nTrojan:Win32/Danabot",
          "modified": "2024-10-10T10:03:15.339000",
          "created": "2024-09-10T10:21:52.428000",
          "tags": [
            "ip block",
            "list",
            "historical ssl",
            "iocs",
            "apt ip",
            "address list",
            "nukespeed",
            "bot networks",
            "listen",
            "tracker",
            "powershell",
            "http response",
            "final url",
            "ip address",
            "status code",
            "kb body",
            "sha256",
            "gmt server",
            "united",
            "passive dns",
            "as54113",
            "arial",
            "dynamic link",
            "msg div",
            "all scoreblue",
            "south korea",
            "china as4134",
            "china as4837",
            "as4766 korea",
            "as9318 sk",
            "taiwan as3462",
            "high",
            "nids",
            "tcp syn",
            "resolverror",
            "malware",
            "next",
            "certificate",
            "encrypt",
            "title invalid",
            "a domains",
            "files",
            "ip related",
            "pulses otx",
            "as21928",
            "china as9394",
            "asnone",
            "as701 verizon",
            "china asnone",
            "port",
            "destination",
            "south africa",
            "tunisia as37693",
            "nigeria asnone",
            "tunisia asnone",
            "kenya as36926",
            "egypt as36992",
            "as14061",
            "aaaa",
            "moved",
            "search",
            "body",
            "114.114.114.114",
            "tulach",
            "telnet",
            "firebase app",
            "telnet login",
            "bad login",
            "gpl telnet",
            "telnet root",
            "hisilicon dvr",
            "hong kong",
            "activity",
            "copy",
            "suspicious path",
            "fbotsatori",
            "yara detections",
            "contacted",
            "cname",
            "urls",
            "creation date",
            "otx telemetry",
            "record value",
            "date",
            "unknown",
            "as51468",
            "denmark unknown",
            "scan endpoints",
            "pulse pulses",
            "dcbg",
            "status",
            "hostname",
            "taiwan",
            "as3462",
            "showing",
            "as17421",
            "entries",
            "win32",
            "busybox"
          ],
          "references": [
            "Cloudflare | 1.1.1.1 -WarpPlus/****",
            "smlpp.monster",
            "IDS Detections: Fbot/Satori CnC Checkin SUSPICIOUS Path to BusyBox Bad Login root logbusyboxin",
            "Alerts: dead_host nids_malware_alert network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Yara Detections is__elf ,  LZMA",
            "Tulach- 114.114.114.114"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "India",
            "Korea, Republic of",
            "Japan",
            "Hong Kong",
            "Philippines",
            "Taiwan",
            "Indonesia",
            "Australia",
            "France",
            "South Africa",
            "United States of America",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Telecommunications",
            "Civilian Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 144,
            "FileHash-SHA1": 144,
            "FileHash-SHA256": 863,
            "domain": 640,
            "hostname": 740,
            "URL": 1117,
            "email": 3,
            "CVE": 1
          },
          "indicator_count": 3652,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "556 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e01e7b6a0bc2abe0d6c0d1",
          "name": "Cloudflare Botnet- https://otx.alienvault.com/pulse/66e01dc0fd31b731b2d5dac7",
          "description": "",
          "modified": "2024-10-10T10:03:15.339000",
          "created": "2024-09-10T10:24:59.035000",
          "tags": [
            "ip block",
            "list",
            "historical ssl",
            "iocs",
            "apt ip",
            "address list",
            "nukespeed",
            "bot networks",
            "listen",
            "tracker",
            "powershell",
            "http response",
            "final url",
            "ip address",
            "status code",
            "kb body",
            "sha256",
            "gmt server",
            "united",
            "passive dns",
            "as54113",
            "arial",
            "dynamic link",
            "msg div",
            "all scoreblue",
            "south korea",
            "china as4134",
            "china as4837",
            "as4766 korea",
            "as9318 sk",
            "taiwan as3462",
            "high",
            "nids",
            "tcp syn",
            "resolverror",
            "malware",
            "next",
            "certificate",
            "encrypt",
            "title invalid",
            "a domains",
            "files",
            "ip related",
            "pulses otx",
            "as21928",
            "china as9394",
            "asnone",
            "as701 verizon",
            "china asnone",
            "port",
            "destination",
            "south africa",
            "tunisia as37693",
            "nigeria asnone",
            "tunisia asnone",
            "kenya as36926",
            "egypt as36992",
            "as14061",
            "aaaa",
            "moved",
            "search",
            "body",
            "114.114.114.114",
            "tulach",
            "telnet",
            "firebase app",
            "telnet login",
            "bad login",
            "gpl telnet",
            "telnet root",
            "hisilicon dvr",
            "hong kong",
            "activity",
            "copy",
            "suspicious path",
            "fbotsatori",
            "yara detections",
            "contacted",
            "cname",
            "urls",
            "creation date",
            "otx telemetry",
            "record value",
            "date",
            "unknown",
            "as51468",
            "denmark unknown",
            "scan endpoints",
            "pulse pulses",
            "dcbg",
            "status",
            "hostname",
            "taiwan",
            "as3462",
            "showing",
            "as17421",
            "entries",
            "win32",
            "busybox"
          ],
          "references": [
            "Cloudflare | 1.1.1.1 -WarpPlus/****",
            "smlpp.monster",
            "IDS Detections: Fbot/Satori CnC Checkin SUSPICIOUS Path to BusyBox Bad Login root logbusyboxin",
            "Alerts: dead_host nids_malware_alert network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Yara Detections is__elf ,  LZMA",
            "Tulach- 114.114.114.114"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "India",
            "Korea, Republic of",
            "Japan",
            "Hong Kong",
            "Philippines",
            "Taiwan",
            "Indonesia",
            "Australia",
            "France",
            "South Africa",
            "United States of America",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Telecommunications",
            "Civilian Society"
          ],
          "TLP": "green",
          "cloned_from": "66e01dc0fd31b731b2d5dac7",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 144,
            "FileHash-SHA1": 144,
            "FileHash-SHA256": 863,
            "domain": 640,
            "hostname": 740,
            "URL": 1117,
            "email": 3,
            "CVE": 1
          },
          "indicator_count": 3652,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "556 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cc958e062575a9a160",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:24.154000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cdfd20f6237e3892c0",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:25.910000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015551faca20cb510f9121",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:29.149000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015553ad4633eb85c66817",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:31.072000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603360b48908ae9b9835563",
          "name": "IoT Dark Nexus + Mirai BotNet HELP HER PLEASE!!- Enom | TELNET Root |",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:54:35.118000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603369ad0e38e313883c4fa",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root HELP! RETALIATION HAS OCCURRED ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:56:58.037000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 4468,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "Tulach- 114.114.114.114",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "smlpp.monster",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Yara Detections is__elf ,  LZMA",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Alerts: dead_host nids_malware_alert network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Cloudflare | 1.1.1.1 -WarpPlus/****",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "nr-data.net [Apple Private Data Collection]",
        "IDS Detections: Fbot/Satori CnC Checkin SUSPICIOUS Path to BusyBox Bad Login root logbusyboxin",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Mirai",
            "Nids",
            "Ransom",
            "Unix.trojan.darknexus-7679166-0",
            "Elf:mirai-gh\\ [trj]",
            "Trojan:win32/danabot"
          ],
          "industries": [
            "Telecommunications",
            "Civilian society",
            "Technology"
          ],
          "unique_indicators": 40317
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/google.com",
    "whois": "http://whois.domaintools.com/google.com",
    "domain": "google.com",
    "hostname": "firebase.google.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "6893032410060f658d862c60",
      "name": "Hosting App - Partial research | Emotet Worm",
      "description": "#firebase #google #dark_web_hosting #ransom #tracking #locate #monitored_targets #worm #emotet #malware #remoted_devices #trojan #reputation\n\n\u2022 Targets likely unaware.\n\n[m.pornsexer.xxx.3.1.adiosfil.roksit.net - reputation tool]",
      "modified": "2025-09-05T07:00:00.711000",
      "created": "2025-08-06T07:24:20.645000",
      "tags": [
        "url https",
        "iocs",
        "learn more",
        "ipv4",
        "domain",
        "hostname",
        "types of",
        "sweden",
        "united",
        "belgium",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "showing",
        "document file",
        "v2 document",
        "search",
        "medium",
        "ms windows",
        "vista event",
        "port",
        "msie",
        "windows nt",
        "wow64",
        "dirty",
        "write",
        "powershell",
        "copy",
        "next",
        "defender",
        "dynamicloader",
        "high",
        "fwlink",
        "windows",
        "cmd c",
        "alerts",
        "bios",
        "related pulses",
        "pulses",
        "related tags",
        "file type",
        "ascii text",
        "sha256",
        "external",
        "virustotal api",
        "screenshots",
        "june",
        "flag",
        "usa windows",
        "input threat",
        "level analysis",
        "summary",
        "gbrflag",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "ssl certificate",
        "defense evasion",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "size",
        "mitre att",
        "date",
        "path",
        "format",
        "august",
        "hybrid",
        "local",
        "form",
        "click",
        "strings",
        "ubar",
        "truetype",
        "web open",
        "font format",
        "description web",
        "general",
        "iframe",
        "slcc2",
        "media center",
        "destination",
        "tlsv1",
        "unknown",
        "execution",
        "dock",
        "persistence",
        "malware",
        "encrypt",
        "ck techniques",
        "read c",
        "show",
        "entries",
        "delete",
        "data upload",
        "extraction",
        "onlv",
        "find",
        "type",
        "no matching",
        "indicator",
        "mtb may",
        "trojandropper",
        "passive dns",
        "next associated",
        "lowfi",
        "gmt cache",
        "sameorigin",
        "ipv4 add",
        "trojan",
        "mtb apr",
        "files show",
        "date hash",
        "avast avg",
        "shellterlod may",
        "win32qqpass apr",
        "trojanspy",
        "ransom",
        "wiper",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results aug",
        "urls show",
        "hookwowlow may"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4593,
        "hostname": 1754,
        "domain": 399,
        "FileHash-SHA256": 2128,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 299,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68930449988277cd29c25cb7",
      "name": "https://firebase.google.com/ - Ransom \u2022 Wiper\u2022 Trojan dropper",
      "description": "",
      "modified": "2025-09-05T07:00:00.711000",
      "created": "2025-08-06T07:29:13.136000",
      "tags": [
        "url https",
        "iocs",
        "learn more",
        "ipv4",
        "domain",
        "hostname",
        "types of",
        "sweden",
        "united",
        "belgium",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "showing",
        "document file",
        "v2 document",
        "search",
        "medium",
        "ms windows",
        "vista event",
        "port",
        "msie",
        "windows nt",
        "wow64",
        "dirty",
        "write",
        "powershell",
        "copy",
        "next",
        "defender",
        "dynamicloader",
        "high",
        "fwlink",
        "windows",
        "cmd c",
        "alerts",
        "bios",
        "related pulses",
        "pulses",
        "related tags",
        "file type",
        "ascii text",
        "sha256",
        "external",
        "virustotal api",
        "screenshots",
        "june",
        "flag",
        "usa windows",
        "input threat",
        "level analysis",
        "summary",
        "gbrflag",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "ssl certificate",
        "defense evasion",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "size",
        "mitre att",
        "date",
        "path",
        "format",
        "august",
        "hybrid",
        "local",
        "form",
        "click",
        "strings",
        "ubar",
        "truetype",
        "web open",
        "font format",
        "description web",
        "general",
        "iframe",
        "slcc2",
        "media center",
        "destination",
        "tlsv1",
        "unknown",
        "execution",
        "dock",
        "persistence",
        "malware",
        "encrypt",
        "ck techniques",
        "read c",
        "show",
        "entries",
        "delete",
        "data upload",
        "extraction",
        "onlv",
        "find",
        "type",
        "no matching",
        "indicator",
        "mtb may",
        "trojandropper",
        "passive dns",
        "next associated",
        "lowfi",
        "gmt cache",
        "sameorigin",
        "ipv4 add",
        "trojan",
        "mtb apr",
        "files show",
        "date hash",
        "avast avg",
        "shellterlod may",
        "win32qqpass apr",
        "trojanspy",
        "ransom",
        "wiper",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results aug",
        "urls show",
        "hookwowlow may"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6893032410060f658d862c60",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4593,
        "hostname": 1754,
        "domain": 399,
        "FileHash-SHA256": 2128,
        "FileHash-MD5": 426,
        "FileHash-SHA1": 299,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68923ea4efbf58b7ba48acec",
      "name": "Hosted App",
      "description": "",
      "modified": "2025-09-04T16:03:17.037000",
      "created": "2025-08-05T17:25:56.454000",
      "tags": [
        "issuer wr3",
        "log id",
        "gmtn",
        "abn timestamp",
        "ad180b80",
        "full name",
        "extensionsstr",
        "web server",
        "ca issuers",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "spawns",
        "mitre att",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "ascii text",
        "pattern match",
        "show technique",
        "date",
        "format",
        "august",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "flag",
        "usa windows",
        "hwp support",
        "march",
        "december",
        "united",
        "markmonitor",
        "overview dns",
        "requests domain",
        "country",
        "contacted hosts",
        "ip address",
        "process details",
        "t1179 hooking",
        "access windows",
        "installs",
        "control att",
        "found",
        "development att",
        "name server",
        "show process",
        "programfiles",
        "command decode",
        "suricata ipv4",
        "ck matrix",
        "comspec",
        "model",
        "general",
        "dynamicloader",
        "unknown",
        "as16509",
        "whitelisted",
        "medium",
        "write c",
        "as15169",
        "search",
        "high",
        "write",
        "android",
        "malware",
        "copy",
        "next",
        "formbook cnc",
        "checkin",
        "entries",
        "passive dns",
        "next associated",
        "site",
        "neue",
        "ipv4",
        "pulse pulses",
        "exploit",
        "trojan",
        "virtool",
        "body",
        "refer",
        "present dec",
        "epub",
        "present jan",
        "present nov",
        "present oct",
        "showing",
        "urls show",
        "win32",
        "win64",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "prefetch8",
        "localappdata",
        "prefetch1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 3409,
        "hostname": 4127,
        "URL": 8408,
        "SSLCertFingerprint": 9,
        "FileHash-SHA256": 1175,
        "FileHash-MD5": 144,
        "FileHash-SHA1": 134,
        "CVE": 2
      },
      "indicator_count": 17408,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "227 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e01dc0fd31b731b2d5dac7",
      "name": "Cloudflade Botnet \u00bb  | 1.1.1.1 | Warp.Plus?  | smlpp.monster | Mirai",
      "description": "This issue may only affect those already in Botnet/s. DoS.Bad login requests .dead host, CnC,\nELF:Mirai-GH\\ [Trj] ,\nMirai ,\nNIDS m\nTrojan:Win32/Danabot",
      "modified": "2024-10-10T10:03:15.339000",
      "created": "2024-09-10T10:21:52.428000",
      "tags": [
        "ip block",
        "list",
        "historical ssl",
        "iocs",
        "apt ip",
        "address list",
        "nukespeed",
        "bot networks",
        "listen",
        "tracker",
        "powershell",
        "http response",
        "final url",
        "ip address",
        "status code",
        "kb body",
        "sha256",
        "gmt server",
        "united",
        "passive dns",
        "as54113",
        "arial",
        "dynamic link",
        "msg div",
        "all scoreblue",
        "south korea",
        "china as4134",
        "china as4837",
        "as4766 korea",
        "as9318 sk",
        "taiwan as3462",
        "high",
        "nids",
        "tcp syn",
        "resolverror",
        "malware",
        "next",
        "certificate",
        "encrypt",
        "title invalid",
        "a domains",
        "files",
        "ip related",
        "pulses otx",
        "as21928",
        "china as9394",
        "asnone",
        "as701 verizon",
        "china asnone",
        "port",
        "destination",
        "south africa",
        "tunisia as37693",
        "nigeria asnone",
        "tunisia asnone",
        "kenya as36926",
        "egypt as36992",
        "as14061",
        "aaaa",
        "moved",
        "search",
        "body",
        "114.114.114.114",
        "tulach",
        "telnet",
        "firebase app",
        "telnet login",
        "bad login",
        "gpl telnet",
        "telnet root",
        "hisilicon dvr",
        "hong kong",
        "activity",
        "copy",
        "suspicious path",
        "fbotsatori",
        "yara detections",
        "contacted",
        "cname",
        "urls",
        "creation date",
        "otx telemetry",
        "record value",
        "date",
        "unknown",
        "as51468",
        "denmark unknown",
        "scan endpoints",
        "pulse pulses",
        "dcbg",
        "status",
        "hostname",
        "taiwan",
        "as3462",
        "showing",
        "as17421",
        "entries",
        "win32",
        "busybox"
      ],
      "references": [
        "Cloudflare | 1.1.1.1 -WarpPlus/****",
        "smlpp.monster",
        "IDS Detections: Fbot/Satori CnC Checkin SUSPICIOUS Path to BusyBox Bad Login root logbusyboxin",
        "Alerts: dead_host nids_malware_alert network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections is__elf ,  LZMA",
        "Tulach- 114.114.114.114"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "India",
        "Korea, Republic of",
        "Japan",
        "Hong Kong",
        "Philippines",
        "Taiwan",
        "Indonesia",
        "Australia",
        "France",
        "South Africa",
        "United States of America",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        }
      ],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Telecommunications",
        "Civilian Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 144,
        "FileHash-SHA1": 144,
        "FileHash-SHA256": 863,
        "domain": 640,
        "hostname": 740,
        "URL": 1117,
        "email": 3,
        "CVE": 1
      },
      "indicator_count": 3652,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "556 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e01e7b6a0bc2abe0d6c0d1",
      "name": "Cloudflare Botnet- https://otx.alienvault.com/pulse/66e01dc0fd31b731b2d5dac7",
      "description": "",
      "modified": "2024-10-10T10:03:15.339000",
      "created": "2024-09-10T10:24:59.035000",
      "tags": [
        "ip block",
        "list",
        "historical ssl",
        "iocs",
        "apt ip",
        "address list",
        "nukespeed",
        "bot networks",
        "listen",
        "tracker",
        "powershell",
        "http response",
        "final url",
        "ip address",
        "status code",
        "kb body",
        "sha256",
        "gmt server",
        "united",
        "passive dns",
        "as54113",
        "arial",
        "dynamic link",
        "msg div",
        "all scoreblue",
        "south korea",
        "china as4134",
        "china as4837",
        "as4766 korea",
        "as9318 sk",
        "taiwan as3462",
        "high",
        "nids",
        "tcp syn",
        "resolverror",
        "malware",
        "next",
        "certificate",
        "encrypt",
        "title invalid",
        "a domains",
        "files",
        "ip related",
        "pulses otx",
        "as21928",
        "china as9394",
        "asnone",
        "as701 verizon",
        "china asnone",
        "port",
        "destination",
        "south africa",
        "tunisia as37693",
        "nigeria asnone",
        "tunisia asnone",
        "kenya as36926",
        "egypt as36992",
        "as14061",
        "aaaa",
        "moved",
        "search",
        "body",
        "114.114.114.114",
        "tulach",
        "telnet",
        "firebase app",
        "telnet login",
        "bad login",
        "gpl telnet",
        "telnet root",
        "hisilicon dvr",
        "hong kong",
        "activity",
        "copy",
        "suspicious path",
        "fbotsatori",
        "yara detections",
        "contacted",
        "cname",
        "urls",
        "creation date",
        "otx telemetry",
        "record value",
        "date",
        "unknown",
        "as51468",
        "denmark unknown",
        "scan endpoints",
        "pulse pulses",
        "dcbg",
        "status",
        "hostname",
        "taiwan",
        "as3462",
        "showing",
        "as17421",
        "entries",
        "win32",
        "busybox"
      ],
      "references": [
        "Cloudflare | 1.1.1.1 -WarpPlus/****",
        "smlpp.monster",
        "IDS Detections: Fbot/Satori CnC Checkin SUSPICIOUS Path to BusyBox Bad Login root logbusyboxin",
        "Alerts: dead_host nids_malware_alert network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections is__elf ,  LZMA",
        "Tulach- 114.114.114.114"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "India",
        "Korea, Republic of",
        "Japan",
        "Hong Kong",
        "Philippines",
        "Taiwan",
        "Indonesia",
        "Australia",
        "France",
        "South Africa",
        "United States of America",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        }
      ],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Telecommunications",
        "Civilian Society"
      ],
      "TLP": "green",
      "cloned_from": "66e01dc0fd31b731b2d5dac7",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 144,
        "FileHash-SHA1": 144,
        "FileHash-SHA256": 863,
        "domain": 640,
        "hostname": 740,
        "URL": 1117,
        "email": 3,
        "CVE": 1
      },
      "indicator_count": 3652,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "556 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "660021cc958e062575a9a160",
      "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
      "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-24T12:51:24.154000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "660021cdfd20f6237e3892c0",
      "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
      "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-24T12:51:25.910000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66015551faca20cb510f9121",
      "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-25T10:43:29.149000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66015553ad4633eb85c66817",
      "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-25T10:43:31.072000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6603360b48908ae9b9835563",
      "name": "IoT Dark Nexus + Mirai BotNet HELP HER PLEASE!!- Enom | TELNET Root |",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-26T20:54:35.118000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://firebase.google.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://firebase.google.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631229.8909035
}