{
  "type": "URL",
  "indicator": "https://foros.yupimsn.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://foros.yupimsn.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2846305096,
      "indicator": "https://foros.yupimsn.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "65b85e73efe2e053366ed972",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-09-05T06:21:34.047000",
          "created": "2024-01-30T02:26:59.218000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6145,
            "URL": 14252,
            "hostname": 4778,
            "domain": 6809,
            "CVE": 3
          },
          "indicator_count": 32339,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "591 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8e4a55f5851279c265c8",
          "name": "https://www.hallrender.com/attorney/brian-sabey/ Gopher Ransomware ",
          "description": "",
          "modified": "2024-02-03T19:04:42.251000",
          "created": "2024-02-03T19:04:42.251000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85e73efe2e053366ed972",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85e7056e146f1416eae32",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-01-30T02:26:56.698000",
          "created": "2024-01-30T02:26:56.698000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "810 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74ee93a0b0dc9c960cee",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:50:54.481000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74f4a6c53cc8e0f70611",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:51:00.982000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ca37e41ea135fa35b8832",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/ ",
          "description": "",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T22:21:50.409000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "814 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afca8042c6fe9412bfa29b",
          "name": "Red Team & Law Firm hijack targets Denver, Arizona, Indiana",
          "description": "",
          "modified": "2024-01-23T14:17:36.291000",
          "created": "2024-01-23T14:17:36.291000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aec0fde095e6b58d81150c",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "817 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afbae2f2128524e68c4344",
          "name": "RED TEAM ",
          "description": "",
          "modified": "2024-01-23T13:10:58.488000",
          "created": "2024-01-23T13:10:58.488000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aebfa135f9d1d8ba5d74a9",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "craignbmed",
            "id": "181999",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_181999/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 45,
          "modified_text": "817 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aec5db33e8f0cb8010282c",
          "name": "Dark Angels Newest Threat -ESXi Ransomware [Pulse created by another user]",
          "description": "",
          "modified": "2024-01-22T19:45:31.378000",
          "created": "2024-01-22T19:45:31.378000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aec0fde095e6b58d81150c",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "818 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aec0fde095e6b58d81150c",
          "name": "Red Team & Law Firm attack target [copy users pulse] Denver, Arizona, Indiana, Germany",
          "description": "",
          "modified": "2024-01-22T19:24:45.664000",
          "created": "2024-01-22T19:24:45.664000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65aebfa135f9d1d8ba5d74a9",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "818 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65aebfa135f9d1d8ba5d74a9",
          "name": "Red Team - Cyber Security Defense Team attacking individuals for Attorney [copy]",
          "description": "",
          "modified": "2024-01-22T19:18:57.869000",
          "created": "2024-01-22T19:18:57.869000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65709f9a3d87b76cacd54245",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "818 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f9011e57040b2717c99c",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:45.262000",
          "created": "2023-12-31T05:15:45.262000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6590f8f3b192d56e80294c13",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "840 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f8f3b192d56e80294c13",
          "name": "Aig.com Pegasus attack+ https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
          "description": "",
          "modified": "2023-12-31T05:15:31.645000",
          "created": "2023-12-31T05:15:31.645000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "contacted",
            "execution",
            "august",
            "march",
            "whois record",
            "contacted urls",
            "malware",
            "copy",
            "april",
            "crypto",
            "alive",
            "malicious",
            "ducktail",
            "ransomware",
            "dead",
            "skynet",
            "chinese",
            "october",
            "roundup",
            "february",
            "goldfinder",
            "sibot",
            "hacktool",
            "metro",
            "goldmax",
            "installer",
            "awful",
            "open",
            "android",
            "banker",
            "keylogger",
            "united",
            "maltiverse",
            "mail spammer",
            "phishing site",
            "cyber threat",
            "engineering",
            "emotet",
            "phishing",
            "spammer",
            "firehol",
            "bank",
            "azorult",
            "team",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "installcore",
            "nymaim",
            "suppobox",
            "download",
            "looquer",
            "domains",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "malware site",
            "malicious site",
            "artemis",
            "opencandy",
            "riskware",
            "tofsee",
            "gandcrab",
            "trojanx",
            "trojan",
            "generic",
            "bankerx",
            "service",
            "runescape",
            "facebook",
            "exploit",
            "agent",
            "mimikatz",
            "unsafe",
            "alexa",
            "union",
            "webtoolbar",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist https",
            "dsp1",
            "noname057",
            "tag count",
            "sample",
            "samples",
            "blacklist",
            "tsara brashears",
            "alohatube",
            "trojan",
            "scanning_host",
            "Botnet",
            "malvertizing",
            "abuse",
            "cyber stalking",
            "defacement",
            "adult content",
            "threats",
            "silencing",
            "harassment",
            "target",
            "aig",
            "workers compensation",
            "severe",
            "attack",
            "hacking",
            "yixun tool",
            "spyware",
            "malware",
            "evasion",
            "malicious",
            "private investigator",
            "legal entities",
            "insurance company",
            "remote attack",
            "colorado",
            "tulach",
            "Attack origin: United States",
            "apple",
            "ios",
            "victim",
            "allegations",
            "assault",
            "revenge",
            "retaliation",
            "libel",
            "monitoring",
            "tracking",
            "pegatech",
            "bam.nr-data.net",
            "bam",
            "nr-data.net",
            "matrix",
            "data.net",
            "asp.net",
            "apple private data collection",
            "norad.mil",
            "norad tracker",
            "b.scope",
            "command_and_control",
            "pornhub",
            "alohatube",
            "sweetheart videos",
            "users voice",
            "interfacing",
            "social engineering",
            "BankerX",
            "law enforcement aware, complacent or complicit?",
            "NSA tool Tulach malaware",
            "metro tmobile",
            "AS 10975 (NET-AIG) US",
            "record type",
            "ttl value",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus ou",
            "entrust",
            "oentrust",
            "l1k validity",
            "cus stnew",
            "group",
            "info",
            "domain status",
            "server",
            "date",
            "registrar abuse",
            "new york",
            "postal code",
            "contact phone",
            "registrar url",
            "csc corporate",
            "code",
            "microsoft",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "confed",
            "network",
            "label netaig",
            "registry arin",
            "country us",
            "continent na",
            "whois lookup",
            "no match",
            "google",
            "dns replication",
            "domain",
            "type name",
            "pine street",
            "whois database",
            "email",
            "registrar iana",
            "icann whois",
            "contact",
            "form",
            "tech",
            "iana id",
            "tech email",
            "admin country",
            "CVE-2017-0147",
            "CVE-2018-0802",
            "CVE-2017-17215",
            "CVE-2016-7255",
            "CVE-2017-11882",
            "CVE-2017-8570"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Chinese",
              "display_name": "Chinese",
              "target": null
            },
            {
              "id": "Looquer",
              "display_name": "Looquer",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "Neurovt",
              "display_name": "Neurovt",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanX",
              "display_name": "TrojanX",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "DUCKTAIL",
              "display_name": "DUCKTAIL",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "GandCrab",
              "display_name": "GandCrab",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Raccoon Stealer",
              "display_name": "Raccoon Stealer",
              "target": null
            },
            {
              "id": "Skynet",
              "display_name": "Skynet",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "FireHOL",
              "display_name": "FireHOL",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "NanoCore",
              "display_name": "NanoCore",
              "target": null
            },
            {
              "id": "Immortal Stealer",
              "display_name": "Immortal Stealer",
              "target": null
            },
            {
              "id": "WebToolBar",
              "display_name": "WebToolBar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1497.002",
              "name": "User Activity Based Checks",
              "display_name": "T1497.002 - User Activity Based Checks"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1563",
              "name": "Remote Service Session Hijacking",
              "display_name": "T1563 - Remote Service Session Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1184",
              "name": "SSH Hijacking",
              "display_name": "T1184 - SSH Hijacking"
            },
            {
              "id": "T1134.001",
              "name": "Token Impersonation/Theft",
              "display_name": "T1134.001 - Token Impersonation/Theft"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "653f21878bcd05f7d594ff86",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5239,
            "FileHash-MD5": 929,
            "FileHash-SHA1": 500,
            "FileHash-SHA256": 3566,
            "domain": 1230,
            "hostname": 2051,
            "CVE": 6,
            "email": 5,
            "CIDR": 1
          },
          "indicator_count": 13527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "840 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7c9f6bf793f823e6398",
          "name": "Qakbot attacks. As strong as before?",
          "description": "",
          "modified": "2023-12-06T16:56:41.266000",
          "created": "2023-12-06T16:56:41.266000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "hostname": 1177,
            "FileHash-SHA256": 2150,
            "domain": 620,
            "URL": 3016,
            "FileHash-MD5": 519,
            "FileHash-SHA1": 292
          },
          "indicator_count": 7775,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a77022ab8eb59e186099",
          "name": "scan_host",
          "description": "",
          "modified": "2023-12-06T16:55:12.020000",
          "created": "2023-12-06T16:55:12.020000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a72f140326fa725a7583",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:54:07.518000",
          "created": "2023-12-06T16:54:07.518000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a71746cd05b8ffc71d86",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:43.601000",
          "created": "2023-12-06T16:53:43.601000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6f9f0cb95f36a8590b6",
          "name": "Application Layer Protocol",
          "description": "",
          "modified": "2023-12-06T16:53:13.036000",
          "created": "2023-12-06T16:53:13.036000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6e151668215a7eb7ef6",
          "name": "Cyber Criminal Group",
          "description": "",
          "modified": "2023-12-06T16:52:49.885000",
          "created": "2023-12-06T16:52:49.885000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a6cfa62bb520508659a6",
          "name": "NewOrder.doc",
          "description": "",
          "modified": "2023-12-06T16:52:31.959000",
          "created": "2023-12-06T16:52:31.959000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4049421d107b6ade1c0",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:40:36.624000",
          "created": "2023-12-06T16:40:36.624000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3fdf7637f464de729d2",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:40:29.875000",
          "created": "2023-12-06T16:40:29.875000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3f88930c56241d29c80",
          "name": "Spammer",
          "description": "",
          "modified": "2023-12-06T16:40:24.522000",
          "created": "2023-12-06T16:40:24.522000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3f24e8fd846cc01d23e",
          "name": "DGA DOMAIN",
          "description": "",
          "modified": "2023-12-06T16:40:18.209000",
          "created": "2023-12-06T16:40:18.209000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3ec011405ef6fcd8cb0",
          "name": "Passive DNS",
          "description": "",
          "modified": "2023-12-06T16:40:12.247000",
          "created": "2023-12-06T16:40:12.247000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 1083,
            "URL": 4338,
            "hostname": 1386,
            "FileHash-SHA256": 1740,
            "FileHash-SHA1": 83,
            "email": 12,
            "FileHash-MD5": 96
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3dd6b4fb6460f906d0b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:57.080000",
          "created": "2023-12-06T16:39:57.080000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3cbf5835c0db09df031",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:39:39.015000",
          "created": "2023-12-06T16:39:39.015000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3ba609912d5c2688fda",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:22.589000",
          "created": "2023-12-06T16:39:22.589000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3aab919327802eaa6c7",
          "name": "&",
          "description": "",
          "modified": "2023-12-06T16:39:06.882000",
          "created": "2023-12-06T16:39:06.882000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a39c62ca90307d3ed7a2",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:52.427000",
          "created": "2023-12-06T16:38:52.427000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a38ab6285fde4c69534d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:34.581000",
          "created": "2023-12-06T16:38:34.581000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a378641e02b700e2c60b",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:16.858000",
          "created": "2023-12-06T16:38:16.858000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a368b24b94cdd5d344d0",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:38:00.732000",
          "created": "2023-12-06T16:38:00.732000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a3566f101265e303109f",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:42.071000",
          "created": "2023-12-06T16:37:42.071000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a341ad3da7ce846d2d7a",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:37:21.524000",
          "created": "2023-12-06T16:37:21.524000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a32e67d395236553d739",
          "name": "confer.pw",
          "description": "",
          "modified": "2023-12-06T16:37:02.495000",
          "created": "2023-12-06T16:37:02.495000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a31d3f7a17df14af4915",
          "name": "-_-",
          "description": "",
          "modified": "2023-12-06T16:36:45.040000",
          "created": "2023-12-06T16:36:45.040000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a30b4e663b75369851e3",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:36:27.088000",
          "created": "2023-12-06T16:36:27.088000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2fa9421d107b6ade1bf",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:36:10.480000",
          "created": "2023-12-06T16:36:10.480000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2e7cd51140a2423edf5",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:51.131000",
          "created": "2023-12-06T16:35:51.131000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2d5e7d74f25c209652d",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:33.433000",
          "created": "2023-12-06T16:35:33.433000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2c28401bda338adc15e",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:35:14.403000",
          "created": "2023-12-06T16:35:14.403000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2ae16a2ac8b0bd23523",
          "name": "Hacker Group. Cyber Criminal Group",
          "description": "",
          "modified": "2023-12-06T16:34:54.869000",
          "created": "2023-12-06T16:34:54.869000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a29c2e97b9fce90093c3",
          "name": "STOP modifying my pulses. Unauthorized Login. ABUSE! Is this tool safe?",
          "description": "",
          "modified": "2023-12-06T16:34:36.087000",
          "created": "2023-12-06T16:34:36.087000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a28ac07b076a6022abbd",
          "name": "NewOrder.doc",
          "description": "",
          "modified": "2023-12-06T16:34:18.117000",
          "created": "2023-12-06T16:34:18.117000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a278b0d22cb077976227",
          "name": "scan_host",
          "description": "",
          "modified": "2023-12-06T16:34:00.462000",
          "created": "2023-12-06T16:34:00.462000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a265501145de92c5d159",
          "name": "Phishing",
          "description": "",
          "modified": "2023-12-06T16:33:41.886000",
          "created": "2023-12-06T16:33:41.886000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2532d2d154345e475c2",
          "name": "Phishing",
          "description": "",
          "modified": "2023-12-06T16:33:23.968000",
          "created": "2023-12-06T16:33:23.968000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a2410b6595444a3fdd99",
          "name": "Phishing",
          "description": "",
          "modified": "2023-12-06T16:33:05.489000",
          "created": "2023-12-06T16:33:05.489000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 4,
            "domain": 4157,
            "URL": 15415,
            "FileHash-SHA256": 7002,
            "hostname": 4814,
            "FileHash-MD5": 191,
            "FileHash-SHA1": 182,
            "email": 2,
            "CIDR": 2
          },
          "indicator_count": 31769,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "business-support.intel.com",
        "http://medlineplus.gov.https.sci-hub.st",
        "http://intel.net/.about.html",
        "https://www.journaldev.com/41403/regex",
        "00000000000.cloudfront.net",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "artificial-legal-intelligence.com",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "mobileaccess.intel.com",
        "http://pl.gov-zaloguj.info"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Skynet",
            "Ducktail",
            "Formbook",
            "Firehol",
            "Hacktool",
            "Hacktool.cheatengine",
            "Artemis",
            "Tofsee",
            "Nymaim",
            "Raccoon stealer",
            "Ransomware",
            "Looquer",
            "Ransomexx",
            "Trojanspy",
            "Gandcrab",
            "Njrat",
            "Goldmax - s0588",
            "Trojan:win32/installcore",
            "Sibot",
            "Azorult",
            "Webtoolbar",
            "Inmortal",
            "Hiddentear",
            "Emotet",
            "Trojanx",
            "Mirai",
            "Gopher",
            "Opencandy",
            "Mimikatz",
            "Domains",
            "Immortal stealer",
            "Chinese",
            "Goldfinder",
            "Yixun",
            "Blacknet",
            "Neurovt",
            "Ascii exploit",
            "Maltiverse",
            "Nanocore",
            "Hacktool.bruteforce"
          ],
          "industries": [],
          "unique_indicators": 108179
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/yupimsn.com",
    "whois": "http://whois.domaintools.com/yupimsn.com",
    "domain": "yupimsn.com",
    "hostname": "foros.yupimsn.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "65b85e73efe2e053366ed972",
      "name": "https://www.hallrender.com/attorney/brian-sabey/",
      "description": "",
      "modified": "2024-09-05T06:21:34.047000",
      "created": "2024-01-30T02:26:59.218000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658b74ee93a0b0dc9c960cee",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6145,
        "URL": 14252,
        "hostname": 4778,
        "domain": 6809,
        "CVE": 3
      },
      "indicator_count": 32339,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "591 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be8e4a55f5851279c265c8",
      "name": "https://www.hallrender.com/attorney/brian-sabey/ Gopher Ransomware ",
      "description": "",
      "modified": "2024-02-03T19:04:42.251000",
      "created": "2024-02-03T19:04:42.251000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65b85e73efe2e053366ed972",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6027,
        "URL": 13374,
        "hostname": 4575,
        "domain": 6755,
        "CVE": 3
      },
      "indicator_count": 31086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "806 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b85e7056e146f1416eae32",
      "name": "https://www.hallrender.com/attorney/brian-sabey/",
      "description": "",
      "modified": "2024-01-30T02:26:56.698000",
      "created": "2024-01-30T02:26:56.698000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658b74ee93a0b0dc9c960cee",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6027,
        "URL": 13374,
        "hostname": 4575,
        "domain": 6755,
        "CVE": 3
      },
      "indicator_count": 31086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "810 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658b74ee93a0b0dc9c960cee",
      "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
      "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
      "modified": "2024-01-26T00:00:39.927000",
      "created": "2023-12-27T00:50:54.481000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6027,
        "URL": 13374,
        "hostname": 4575,
        "domain": 6755,
        "CVE": 3
      },
      "indicator_count": 31086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "814 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658b74f4a6c53cc8e0f70611",
      "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
      "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
      "modified": "2024-01-26T00:00:39.927000",
      "created": "2023-12-27T00:51:00.982000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 43,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6027,
        "URL": 13374,
        "hostname": 4575,
        "domain": 6755,
        "CVE": 3
      },
      "indicator_count": 31086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "814 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658ca37e41ea135fa35b8832",
      "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/ ",
      "description": "",
      "modified": "2024-01-26T00:00:39.927000",
      "created": "2023-12-27T22:21:50.409000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658b74ee93a0b0dc9c960cee",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6027,
        "URL": 13374,
        "hostname": 4575,
        "domain": 6755,
        "CVE": 3
      },
      "indicator_count": 31086,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "814 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65afca8042c6fe9412bfa29b",
      "name": "Red Team & Law Firm hijack targets Denver, Arizona, Indiana",
      "description": "",
      "modified": "2024-01-23T14:17:36.291000",
      "created": "2024-01-23T14:17:36.291000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aec0fde095e6b58d81150c",
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "domain": 1083,
        "URL": 4338,
        "hostname": 1386,
        "FileHash-SHA256": 1740,
        "FileHash-SHA1": 83,
        "email": 12,
        "FileHash-MD5": 96
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "817 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65afbae2f2128524e68c4344",
      "name": "RED TEAM ",
      "description": "",
      "modified": "2024-01-23T13:10:58.488000",
      "created": "2024-01-23T13:10:58.488000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aebfa135f9d1d8ba5d74a9",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "craignbmed",
        "id": "181999",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_181999/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "domain": 1083,
        "URL": 4338,
        "hostname": 1386,
        "FileHash-SHA256": 1740,
        "FileHash-SHA1": 83,
        "email": 12,
        "FileHash-MD5": 96
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 45,
      "modified_text": "817 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aec5db33e8f0cb8010282c",
      "name": "Dark Angels Newest Threat -ESXi Ransomware [Pulse created by another user]",
      "description": "",
      "modified": "2024-01-22T19:45:31.378000",
      "created": "2024-01-22T19:45:31.378000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aec0fde095e6b58d81150c",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "domain": 1083,
        "URL": 4338,
        "hostname": 1386,
        "FileHash-SHA256": 1740,
        "FileHash-SHA1": 83,
        "email": 12,
        "FileHash-MD5": 96
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "818 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65aec0fde095e6b58d81150c",
      "name": "Red Team & Law Firm attack target [copy users pulse] Denver, Arizona, Indiana, Germany",
      "description": "",
      "modified": "2024-01-22T19:24:45.664000",
      "created": "2024-01-22T19:24:45.664000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65aebfa135f9d1d8ba5d74a9",
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "domain": 1083,
        "URL": 4338,
        "hostname": 1386,
        "FileHash-SHA256": 1740,
        "FileHash-SHA1": 83,
        "email": 12,
        "FileHash-MD5": 96
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "818 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://foros.yupimsn.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://foros.yupimsn.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776642159.6913655
}