{
  "type": "URL",
  "indicator": "https://forums.foxcentral.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://forums.foxcentral.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4076260272,
      "indicator": "https://forums.foxcentral.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "684cd7ad87254fdda87d3054",
          "name": "Devilspen.com (awsdns) | Strictor/ Installmonster | Emotet",
          "description": "\u2022 Python Initiated Connection by frack113\n\u2022 Creation of an Executable by an Executable by frack113\n\u2022 ET DNS Query to a *.top domain - Likely Hostile\n\u2022 ET INFO TLS Handshake Failure\n\u2022 INDICATOR-COMPROMISE Suspicious .top dns query\n* MALWARE TROJAN\n#emotet\n More\u2026",
          "modified": "2025-07-14T01:04:45.357000",
          "created": "2025-06-14T02:00:13.883000",
          "tags": [
            "united",
            "date",
            "flag",
            "server",
            "gandi sas",
            "name server",
            "proxy",
            "llc name",
            "overview dns",
            "requests domain",
            "logo analysis",
            "size45b type",
            "threat score",
            "av detection",
            "community score",
            "url scan",
            "analysis no",
            "domain scam",
            "score clean",
            "domain abuse",
            "error",
            "june",
            "malicious",
            "falcon sandbox",
            "march",
            "score",
            "size426kib type",
            "mime",
            "scan analysis",
            "upgrade",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "spawns",
            "mitre att",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "ascii text",
            "sha256",
            "show",
            "null",
            "body",
            "class",
            "refresh",
            "span",
            "window",
            "hybrid",
            "possible",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "false",
            "look",
            "verify",
            "restart",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr10",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "rsa public",
            "dynadot",
            "dynadot llc",
            "dynadot inc",
            "thumbprint",
            "win32 exe",
            "pe32",
            "ms windows",
            "win16 ne",
            "icons library",
            "os2 executable",
            "generic windos",
            "executable",
            "pe64 compiler",
            "ltcgc",
            "file type",
            "google update",
            "setup",
            "kb file",
            "ico mainicon",
            "javascript",
            "redacted for",
            "privacy create",
            "domain",
            "registrant fax",
            "privacy update",
            "defense evasion",
            "access ta0006",
            "ta0008 command",
            "control ta0011",
            "ob0002 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "system oc0008",
            "ja3s",
            "azure tls",
            "issuing ca",
            "cus subject",
            "stwa lredmond",
            "resolved ips",
            "ip traffic",
            "tls sni",
            "delphi generic",
            "intel",
            "dos borland",
            "pe32 compiler",
            "borland delphi",
            "linker",
            "delphi",
            "get http",
            "post http",
            "rstunf",
            "tad436770",
            "productname",
            "subid",
            "encodedpixel",
            "dns resolutions",
            "privacy",
            "internal name",
            "adobe help",
            "viewer file",
            "version"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 449,
            "hostname": 504,
            "FileHash-SHA256": 2208,
            "URL": 1109,
            "FileHash-MD5": 201,
            "FileHash-SHA1": 204,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 4684,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "279 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 5369
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/foxcentral.com",
    "whois": "http://whois.domaintools.com/foxcentral.com",
    "domain": "foxcentral.com",
    "hostname": "forums.foxcentral.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "684cd7ad87254fdda87d3054",
      "name": "Devilspen.com (awsdns) | Strictor/ Installmonster | Emotet",
      "description": "\u2022 Python Initiated Connection by frack113\n\u2022 Creation of an Executable by an Executable by frack113\n\u2022 ET DNS Query to a *.top domain - Likely Hostile\n\u2022 ET INFO TLS Handshake Failure\n\u2022 INDICATOR-COMPROMISE Suspicious .top dns query\n* MALWARE TROJAN\n#emotet\n More\u2026",
      "modified": "2025-07-14T01:04:45.357000",
      "created": "2025-06-14T02:00:13.883000",
      "tags": [
        "united",
        "date",
        "flag",
        "server",
        "gandi sas",
        "name server",
        "proxy",
        "llc name",
        "overview dns",
        "requests domain",
        "logo analysis",
        "size45b type",
        "threat score",
        "av detection",
        "community score",
        "url scan",
        "analysis no",
        "domain scam",
        "score clean",
        "domain abuse",
        "error",
        "june",
        "malicious",
        "falcon sandbox",
        "march",
        "score",
        "size426kib type",
        "mime",
        "scan analysis",
        "upgrade",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "spawns",
        "mitre att",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "ascii text",
        "sha256",
        "show",
        "null",
        "body",
        "class",
        "refresh",
        "span",
        "window",
        "hybrid",
        "possible",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "false",
        "look",
        "verify",
        "restart",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr10",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "rsa public",
        "dynadot",
        "dynadot llc",
        "dynadot inc",
        "thumbprint",
        "win32 exe",
        "pe32",
        "ms windows",
        "win16 ne",
        "icons library",
        "os2 executable",
        "generic windos",
        "executable",
        "pe64 compiler",
        "ltcgc",
        "file type",
        "google update",
        "setup",
        "kb file",
        "ico mainicon",
        "javascript",
        "redacted for",
        "privacy create",
        "domain",
        "registrant fax",
        "privacy update",
        "defense evasion",
        "access ta0006",
        "ta0008 command",
        "control ta0011",
        "ob0002 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "system oc0008",
        "ja3s",
        "azure tls",
        "issuing ca",
        "cus subject",
        "stwa lredmond",
        "resolved ips",
        "ip traffic",
        "tls sni",
        "delphi generic",
        "intel",
        "dos borland",
        "pe32 compiler",
        "borland delphi",
        "linker",
        "delphi",
        "get http",
        "post http",
        "rstunf",
        "tad436770",
        "productname",
        "subid",
        "encodedpixel",
        "dns resolutions",
        "privacy",
        "internal name",
        "adobe help",
        "viewer file",
        "version"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 449,
        "hostname": 504,
        "FileHash-SHA256": 2208,
        "URL": 1109,
        "FileHash-MD5": 201,
        "FileHash-SHA1": 204,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 4684,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "279 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://forums.foxcentral.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://forums.foxcentral.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638330.8206413
}