{
  "type": "URL",
  "indicator": "https://freeskin.eventkrafton.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://freeskin.eventkrafton.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4278495572,
      "indicator": "https://freeskin.eventkrafton.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "69c4281f5f232316375b225e",
          "name": "CoolWebSearch \u2022 Engine \u2022 Browser Hijack | Ransomware | Checkin | Tracking | Installer #pegasus_related",
          "description": "",
          "modified": "2026-03-25T18:23:27.601000",
          "created": "2026-03-25T18:23:27.601000",
          "tags": [
            "lowfi",
            "ransom",
            "trojan",
            "mtb oct",
            "win32",
            "kingwe",
            "files",
            "files ip",
            "all ipv4",
            "america flag",
            "United States",
            "win32mydoom",
            "otx logo",
            "urls",
            "reverse dns",
            "cnc style",
            "cnc checkin",
            "style",
            "install cnc",
            "initial install",
            "activity",
            "win32mydoom sep",
            "worm",
            "win32mydoom oct",
            "win32getnow oct",
            "unknown ns",
            "search",
            "browser",
            "hijackers",
            "file format",
            "malwarerid",
            "majauskas",
            "google",
            "report",
            "once",
            "malicious",
            "malware",
            "overview ip",
            "address",
            "asn as46475",
            "nameservers",
            "related tags",
            "spf record",
            "tags",
            "domain",
            "name",
            "query time",
            "cyprus update",
            "united states",
            "browser hijacker",
            "install",
            "handle",
            "entity",
            "key identifier",
            "x509v3 subject",
            "host name",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr12",
            "ttl value",
            "thumbprint",
            "enabled",
            "malvertising",
            "encoded_htm!",
            "new_domain",
            "suspicious_redirect",
            "proximity",
            "tracking_infrastructure",
            "passive dns",
            "http",
            "ip address",
            "related nids",
            "files location",
            "checkin worm",
            "mydoom checkin",
            "useragent",
            "checkin cnc",
            "acti cnc",
            "beac track",
            "failed\u0661\u0668",
            "data upload",
            "extraction",
            "winsoft",
            "checkin",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "defense evasion",
            "spawns",
            "over",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "body",
            "title",
            "encrypt",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "dynamicloader",
            "medium",
            "high",
            "et exploit",
            "write c",
            "default",
            "probe ms17010",
            "write",
            "copy",
            "pegasus related"
          ],
          "references": [
            "coolwebsearch.info | browser hijacker, malware , malicious",
            "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
            "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
            "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
            "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
            "CnC Beacon Win32/InstallCore Initial Install Activity 2",
            "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Malware.Generickdz-9918324-0",
              "display_name": "Win.Malware.Generickdz-9918324-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0",
              "display_name": "Win.Trojan.Generic-9909777-0",
              "target": null
            },
            {
              "id": "Win.Malware.Installcore-9794583-0",
              "display_name": "Win.Malware.Installcore-9794583-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Win.Dropper.DarkKomet-9370806-0",
              "display_name": "Win.Dropper.DarkKomet-9370806-0",
              "target": null
            },
            {
              "id": "Win.Malware.Generic-9963787-0",
              "display_name": "Win.Malware.Generic-9963787-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "target": null
            },
            {
              "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "target": null
            },
            {
              "id": "Tags",
              "display_name": "Tags",
              "target": null
            },
            {
              "id": "Winsoft",
              "display_name": "Winsoft",
              "target": null
            },
            {
              "id": "Checkin",
              "display_name": "Checkin",
              "target": null
            },
            {
              "id": "CoolWebService",
              "display_name": "CoolWebService",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69c425ecfef08de19b962774",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 1541,
            "URL": 2403,
            "domain": 328,
            "hostname": 593,
            "FileHash-MD5": 142,
            "FileHash-SHA1": 176,
            "FileHash-SHA256": 574,
            "email": 3,
            "SSLCertFingerprint": 10
          },
          "indicator_count": 5770,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "24 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c425ecfef08de19b962774",
          "name": "CoolWebSearc \u2022 Engine -Browser Hijack | Affects DropBox + other services | Checkin | Tracking | Installer #pegasus_related",
          "description": "",
          "modified": "2026-03-25T18:14:04.398000",
          "created": "2026-03-25T18:14:04.398000",
          "tags": [
            "lowfi",
            "ransom",
            "trojan",
            "mtb oct",
            "win32",
            "kingwe",
            "files",
            "files ip",
            "all ipv4",
            "america flag",
            "United States",
            "win32mydoom",
            "otx logo",
            "urls",
            "reverse dns",
            "cnc style",
            "cnc checkin",
            "style",
            "install cnc",
            "initial install",
            "activity",
            "win32mydoom sep",
            "worm",
            "win32mydoom oct",
            "win32getnow oct",
            "unknown ns",
            "search",
            "browser",
            "hijackers",
            "file format",
            "malwarerid",
            "majauskas",
            "google",
            "report",
            "once",
            "malicious",
            "malware",
            "overview ip",
            "address",
            "asn as46475",
            "nameservers",
            "related tags",
            "spf record",
            "tags",
            "domain",
            "name",
            "query time",
            "cyprus update",
            "united states",
            "browser hijacker",
            "install",
            "handle",
            "entity",
            "key identifier",
            "x509v3 subject",
            "host name",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr12",
            "ttl value",
            "thumbprint",
            "enabled",
            "malvertising",
            "encoded_htm!",
            "new_domain",
            "suspicious_redirect",
            "proximity",
            "tracking_infrastructure",
            "passive dns",
            "http",
            "ip address",
            "related nids",
            "files location",
            "checkin worm",
            "mydoom checkin",
            "useragent",
            "checkin cnc",
            "acti cnc",
            "beac track",
            "failed\u0661\u0668",
            "data upload",
            "extraction",
            "winsoft",
            "checkin",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "defense evasion",
            "spawns",
            "over",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "body",
            "title",
            "encrypt",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "dynamicloader",
            "medium",
            "high",
            "et exploit",
            "write c",
            "default",
            "probe ms17010",
            "write",
            "copy",
            "pegasus related"
          ],
          "references": [
            "coolwebsearch.info | browser hijacker, malware , malicious",
            "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
            "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
            "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
            "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
            "CnC Beacon Win32/InstallCore Initial Install Activity 2",
            "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Malware.Generickdz-9918324-0",
              "display_name": "Win.Malware.Generickdz-9918324-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0",
              "display_name": "Win.Trojan.Generic-9909777-0",
              "target": null
            },
            {
              "id": "Win.Malware.Installcore-9794583-0",
              "display_name": "Win.Malware.Installcore-9794583-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Win.Dropper.DarkKomet-9370806-0",
              "display_name": "Win.Dropper.DarkKomet-9370806-0",
              "target": null
            },
            {
              "id": "Win.Malware.Generic-9963787-0",
              "display_name": "Win.Malware.Generic-9963787-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "target": null
            },
            {
              "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "target": null
            },
            {
              "id": "Tags",
              "display_name": "Tags",
              "target": null
            },
            {
              "id": "Winsoft",
              "display_name": "Winsoft",
              "target": null
            },
            {
              "id": "Checkin",
              "display_name": "Checkin",
              "target": null
            },
            {
              "id": "CoolWebService",
              "display_name": "CoolWebService",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69c41ac489f8cd00a59ef43e",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 1541,
            "URL": 2403,
            "domain": 328,
            "hostname": 593,
            "FileHash-MD5": 142,
            "FileHash-SHA1": 176,
            "FileHash-SHA256": 574,
            "email": 3,
            "SSLCertFingerprint": 10
          },
          "indicator_count": 5770,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "24 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c41ac489f8cd00a59ef43e",
          "name": "CoolWebService -Browser Hijack | Affects DropBox and other services | Checkin",
          "description": "CoolWebService -Browser Hijack | Affects DropBox and other services | Checkin | Tracking \n| Search Engine Installer \n#pegasus_related",
          "modified": "2026-03-25T17:26:28.750000",
          "created": "2026-03-25T17:26:28.750000",
          "tags": [
            "lowfi",
            "ransom",
            "trojan",
            "mtb oct",
            "win32",
            "kingwe",
            "files",
            "files ip",
            "all ipv4",
            "america flag",
            "United States",
            "win32mydoom",
            "otx logo",
            "urls",
            "reverse dns",
            "cnc style",
            "cnc checkin",
            "style",
            "install cnc",
            "initial install",
            "activity",
            "win32mydoom sep",
            "worm",
            "win32mydoom oct",
            "win32getnow oct",
            "unknown ns",
            "search",
            "browser",
            "hijackers",
            "file format",
            "malwarerid",
            "majauskas",
            "google",
            "report",
            "once",
            "malicious",
            "malware",
            "overview ip",
            "address",
            "asn as46475",
            "nameservers",
            "related tags",
            "spf record",
            "tags",
            "domain",
            "name",
            "query time",
            "cyprus update",
            "united states",
            "browser hijacker",
            "install",
            "handle",
            "entity",
            "key identifier",
            "x509v3 subject",
            "host name",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr12",
            "ttl value",
            "thumbprint",
            "enabled",
            "malvertising",
            "encoded_htm!",
            "new_domain",
            "suspicious_redirect",
            "proximity",
            "tracking_infrastructure",
            "passive dns",
            "http",
            "ip address",
            "related nids",
            "files location",
            "checkin worm",
            "mydoom checkin",
            "useragent",
            "checkin cnc",
            "acti cnc",
            "beac track",
            "failed\u0661\u0668",
            "data upload",
            "extraction",
            "winsoft",
            "checkin",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "defense evasion",
            "spawns",
            "over",
            "mitre att",
            "show technique",
            "ck matrix",
            "ascii text",
            "body",
            "title",
            "encrypt",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "dynamicloader",
            "medium",
            "high",
            "et exploit",
            "write c",
            "default",
            "probe ms17010",
            "write",
            "copy",
            "pegasus related"
          ],
          "references": [
            "coolwebsearch.info | browser hijacker, malware , malicious",
            "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
            "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
            "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
            "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
            "CnC Beacon Win32/InstallCore Initial Install Activity 2",
            "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Malware.Generickdz-9918324-0",
              "display_name": "Win.Malware.Generickdz-9918324-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0",
              "display_name": "Win.Trojan.Generic-9909777-0",
              "target": null
            },
            {
              "id": "Win.Malware.Installcore-9794583-0",
              "display_name": "Win.Malware.Installcore-9794583-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Win.Dropper.DarkKomet-9370806-0",
              "display_name": "Win.Dropper.DarkKomet-9370806-0",
              "target": null
            },
            {
              "id": "Win.Malware.Generic-9963787-0",
              "display_name": "Win.Malware.Generic-9963787-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
              "target": null
            },
            {
              "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
              "target": null
            },
            {
              "id": "Tags",
              "display_name": "Tags",
              "target": null
            },
            {
              "id": "Winsoft",
              "display_name": "Winsoft",
              "target": null
            },
            {
              "id": "Checkin",
              "display_name": "Checkin",
              "target": null
            },
            {
              "id": "CoolWebService",
              "display_name": "CoolWebService",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 1541,
            "URL": 2403,
            "domain": 328,
            "hostname": 593,
            "FileHash-MD5": 142,
            "FileHash-SHA1": 176,
            "FileHash-SHA256": 574,
            "email": 3,
            "SSLCertFingerprint": 10
          },
          "indicator_count": 5770,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "24 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c06ca9341d6c063f652e33",
          "name": "ETERNALBLUE Probe MS17-010 | Wannacry Ransomware Domain - related to NSO Group Pegasus",
          "description": "Quasi governmental, Healthcare Law Firms , legal entities , as well as direct safety threats such as NSO Group Pegasus, Enterprise Cellebrite (in references) and other dangerous intimidation and life endangering tactics directed against a crime victim. Continuous harassment and threats of violence against victims family including 83 yo father. Veteran & hand picked  Sr Systems Analyst and Engineer for Aegis Weapon System Team of 24. You\u2019re welcome America.. Victim left zero evidence with family. Documents shredded. Data stolen by parties named. She isn\u2019t the only one. These people do this for a living. Abuse of Palantir & Foundry tools.",
          "modified": "2026-03-22T22:26:49.205000",
          "created": "2026-03-22T22:26:49.205000",
          "tags": [
            "ransomware",
            "united",
            "search",
            "asnone",
            "regsetvalueexa",
            "service",
            "regdword",
            "medium",
            "get na",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "playgame",
            "unknown",
            "exploit",
            "cve",
            "wncry",
            "wannacry",
            "passive dns",
            "urls",
            "british virgin",
            "all url",
            "http",
            "ip address",
            "related nids",
            "files location",
            "virgin islands",
            "islands",
            "bgp",
            "virgin islands",
            "hijacked",
            "data upload",
            "extraction",
            "failed",
            "review iocs",
            "include ovo",
            "tovary review",
            "ids detec",
            "yara dete",
            "trior texarag",
            "drop or",
            "rrowse",
            "type",
            "extra data",
            "hurricane electric",
            "p2404",
            "p11629470400",
            "p11629107633",
            "artifacts v",
            "full reports",
            "v help",
            "info",
            "low l",
            "high ta0002",
            "techniques",
            "t1053",
            "command",
            "scripting inte",
            "low ta0003",
            "techniques high",
            "t1053 ite",
            "modify system",
            "pl t1543",
            "boot",
            "logon autostart",
            "ex t1547",
            "checks-disk-space",
            "checks-network-adapters",
            "detect-debug-environment",
            "direct-cpu-clock-access",
            "long-sleeps",
            "runtime-modules",
            "get http",
            "head http",
            "dns resolutions",
            "ip traffic",
            "53 tcp",
            "tls sni",
            "apple id",
            "webdisk",
            "expiration",
            "url http",
            "hostname",
            "no expiration",
            "iocs",
            "url https",
            "es included",
            "win32 exe",
            "pe32 executable",
            "ms windows",
            "intel",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "t1204 user",
            "defense evasion",
            "over",
            "mitre att",
            "ck matrix",
            "ascii text",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "javascript",
            "ssl certificate",
            "encrypt",
            "accept",
            "russia unknown",
            "meta",
            "record value",
            "aaaa",
            "link",
            "present jun",
            "apple",
            "remote access",
            "otx logo",
            "all ipv4",
            "url analysis",
            "files",
            "accept ch",
            "present dec",
            "content type",
            "x pcrew",
            "name servers",
            "present may",
            "body doctype",
            "title",
            "all domain",
            "servers",
            "china unknown",
            "found content",
            "gmt p3p",
            "cp oti",
            "dsp cor",
            "iva our",
            "ind com",
            "domain",
            "cname",
            "entries",
            "brian sabey",
            "hallrender",
            "christopher ahmann",
            "t1480 execution",
            "discovery att",
            "heur",
            "virtool",
            "win64",
            "mtb win32",
            "backdoor",
            "location china",
            "hangzhou",
            "china asn",
            "ransom",
            "wannadecryptor",
            "filehash",
            "yara detections",
            "msvisualcpp60",
            "related tags",
            "none file",
            "type pexe",
            "copy",
            "beginstring",
            "null",
            "refresh",
            "body",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "expl",
            "unknown cname",
            "hacktool",
            "domain address",
            "contacted hosts",
            "process details",
            "flag",
            "ipv4 add",
            "location united",
            "america flag",
            "exploit",
            "show",
            "all filehash",
            "expiration date",
            "gmt location",
            "gmt max",
            "domain add",
            "elite",
            "date",
            "cowboy",
            "United States",
            "present feb",
            "present oct",
            "creation date",
            "present nov",
            "moved",
            "emails"
          ],
          "references": [
            "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
            "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
            "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
            "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
            "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
            "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
            "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
            "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
            "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
            "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
            "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
            "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
            "Alerts:  peid_packer pe_unknown_resource_name",
            "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
            "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
            "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
            "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
            "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
            "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
            "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
            "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
            "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
            "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
            "apple.com-verify.account.manage.test2.aptaforum.com.cn",
            "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
            "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
            "web-secure-appleid-login.com.test2.aptaforum.com.cn",
            "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
            "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
            "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
            "findmy.apple-uk.live",
            "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
            "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
            "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
            "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
            "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
            "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
            "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
            "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
            "KeenDNS | keendnsaclremote805717135272048.qeenetic.link",
            "https://fonts.googleapis.com/css",
            "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
            "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless",
            "www.remoteaccess.allied-media.com",
            "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
            "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
            "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
            "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
            "dns17.hichina.com",
            "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
            "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
            "https://otx.alienvault.com/indicator/domain/qeenetic.link",
            "okg.and.googletagmanagers.com",
            "pcy.and.googletagmanagers.com",
            "pgj.and.googletagmanagers.com",
            "prb.and.googletagmanagers.com",
            "lkp.and.googletagmanagers.com",
            "jgw.and.googletagmanagers.com",
            "bzx.and.googletagmanagers.com",
            "msedge.b.tlu.dl.delivery.mp.microsoft.com",
            "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
            "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
            "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
            "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
            "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
            "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
            "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
            "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
            "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Win.Ransomware.WannaCry-6313787-0",
              "display_name": "Win.Ransomware.WannaCry-6313787-0",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147.A",
              "display_name": "Exploit:Win32/CVE-2017-0147.A",
              "target": "/malware/Exploit:Win32/CVE-2017-0147.A"
            },
            {
              "id": "Trojan/JS.Redirector.QNO",
              "display_name": "Trojan/JS.Redirector.QNO",
              "target": null
            },
            {
              "id": "Win.Trojan.Application-1955.",
              "display_name": "Win.Trojan.Application-1955.",
              "target": null
            },
            {
              "id": "Win32:Banker-LAA\\ [Trj]",
              "display_name": "Win32:Banker-LAA\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Malware.Snojan-6775202-0",
              "display_name": "Win.Malware.Snojan-6775202-0",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Trj]",
              "display_name": "Win32:Evo-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win64:Expiro-AJ\\ [Inf]",
              "display_name": "Win64:Expiro-AJ\\ [Inf]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fugrafa-9733007-0",
              "display_name": "Win.Trojan.Fugrafa-9733007-0",
              "target": null
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6989114-0",
              "display_name": "Win.Trojan.VBGeneric-6989114-0",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.YA!MTB",
              "display_name": "VirTool:Win32/VBInject.YA!MTB",
              "target": "/malware/VirTool:Win32/VBInject.YA!MTB"
            },
            {
              "id": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
              "display_name": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator",
              "display_name": "#VirTool:Win32/Obfuscator",
              "target": "/malware/#VirTool:Win32/Obfuscator"
            },
            {
              "id": "Backdoor:Win32/Small.IR",
              "display_name": "Backdoor:Win32/Small.IR",
              "target": "/malware/Backdoor:Win32/Small.IR"
            },
            {
              "id": "Win64:Expiro-AJ\\ [Inf]",
              "display_name": "Win64:Expiro-AJ\\ [Inf]",
              "target": null
            },
            {
              "id": "Win32:Dh-A\\",
              "display_name": "Win32:Dh-A\\",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "Ransom:Win32/CVE-2017-0147.A",
              "display_name": "Ransom:Win32/CVE-2017-0147.A",
              "target": "/malware/Ransom:Win32/CVE-2017-0147.A"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Malware.Flystudio-6738927-0",
              "display_name": "Win.Malware.Flystudio-6738927-0",
              "target": null
            },
            {
              "id": "ALF:SpikeAexR.PEVPOPC",
              "display_name": "ALF:SpikeAexR.PEVPOPC",
              "target": null
            },
            {
              "id": "Sf:WNCryLdr-A\\ [Trj]",
              "display_name": "Sf:WNCryLdr-A\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Ransomware.WannaCry-6313787-0",
              "display_name": "Win.Ransomware.WannaCry-6313787-0",
              "target": null
            },
            {
              "id": "ransom:Win32/WannaCrypt.H",
              "display_name": "ransom:Win32/WannaCrypt.H",
              "target": "/malware/ransom:Win32/WannaCrypt.H"
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1198",
              "name": "SIP and Trust Provider Hijacking",
              "display_name": "T1198 - SIP and Trust Provider Hijacking"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1543.001",
              "name": "Launch Agent",
              "display_name": "T1543.001 - Launch Agent"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            }
          ],
          "industries": [
            "Government",
            "Legal",
            "Technology",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3779,
            "FileHash-MD5": 422,
            "FileHash-SHA1": 411,
            "FileHash-SHA256": 1824,
            "IPv4": 666,
            "domain": 979,
            "hostname": 2082,
            "CVE": 1,
            "BitcoinAddress": 3,
            "SSLCertFingerprint": 6,
            "email": 8
          },
          "indicator_count": 10181,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "27 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
        "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
        "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72",
        "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
        "apple.com-verify.account.manage.test2.aptaforum.com.cn",
        "web-secure-appleid-login.com.test2.aptaforum.com.cn",
        "https://otx.alienvault.com/indicator/domain/qeenetic.link",
        "pcy.and.googletagmanagers.com",
        "lkp.and.googletagmanagers.com",
        "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
        "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
        "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
        "okg.and.googletagmanagers.com",
        "prb.and.googletagmanagers.com",
        "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
        "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
        "msedge.b.tlu.dl.delivery.mp.microsoft.com",
        "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
        "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
        "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
        "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "https://fonts.googleapis.com/css",
        "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL",
        "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
        "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
        "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
        "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
        "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
        "Alerts:  peid_packer pe_unknown_resource_name",
        "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
        "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
        "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "dns17.hichina.com",
        "coolwebsearch.info | browser hijacker, malware , malicious",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
        "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
        "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
        "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
        "jgw.and.googletagmanagers.com",
        "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
        "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
        "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
        "pgj.and.googletagmanagers.com",
        "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
        "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
        "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
        "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
        "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
        "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
        "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
        "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
        "www.remoteaccess.allied-media.com",
        "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
        "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
        "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
        "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
        "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
        "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
        "CnC Beacon Win32/InstallCore Initial Install Activity 2",
        "bzx.and.googletagmanagers.com",
        "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless",
        "findmy.apple-uk.live",
        "KeenDNS | keendnsaclremote805717135272048.qeenetic.link"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.malware.mydoom-6804696-0\tworm:win32/mydoom win.malware.mydoom-6804696-0\tworm:win32/mydoom sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#lowfi:hstr:optimuminstal",
            "Backdoor:win32/small.ir",
            "Trojan/js.redirector.qno",
            "Win.ransomware.wannacry-6313787-0",
            "Win32:banker-laa\\ [trj]",
            "Win.trojan.generic-9909777-0",
            "Coolwebservice",
            "Cve-2017-0147",
            "Exploit:win32/cve-2017-0147.a",
            "Ransom:win32/wannacrypt.h",
            "Win.malware.generickdz-9918324-0",
            "Checkin",
            "Win.trojan.application-1955.",
            "Win.trojan.vbgeneric-6989114-0",
            "#virtool:win32/obfuscator",
            "Win.malware.installcore-9794583-0",
            "Win.dropper.darkkomet-9370806-0",
            "Ransom:win32/cve-2017-0147.a",
            "Alf:spikeaexr.pevpopc",
            "Virtool:win32/vbinject.ya!mtb",
            "Win32:malware-gen",
            "Win.malware.snojan-6775202-0",
            "Alf:heraklezeval:pua:win32/installcore.r",
            "Win32:dh-a\\ [win32:fileinfector-c\\ [heur]",
            "Win32:dh-a\\",
            "Win32:trojanx-gen\\ [trj]",
            "Win.trojan.fugrafa-9733007-0",
            "Winsoft",
            "Tags",
            "Win.trojan.generic-9909777-0 #lowfi:hstr:optimuminstaller",
            "Win64:expiro-aj\\ [inf]",
            "Trojan:win32/mydoom",
            "Win.malware.generic-9963787-0",
            "Win32:evo-gen\\ [trj]",
            "Ransomware",
            "Win.malware.flystudio-6738927-0",
            "Sf:wncryldr-a\\ [trj]"
          ],
          "industries": [
            "Government",
            "Technology",
            "Legal",
            "Healthcare"
          ],
          "unique_indicators": 15648
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/eventkrafton.com",
    "whois": "http://whois.domaintools.com/eventkrafton.com",
    "domain": "eventkrafton.com",
    "hostname": "freeskin.eventkrafton.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "69c4281f5f232316375b225e",
      "name": "CoolWebSearch \u2022 Engine \u2022 Browser Hijack | Ransomware | Checkin | Tracking | Installer #pegasus_related",
      "description": "",
      "modified": "2026-03-25T18:23:27.601000",
      "created": "2026-03-25T18:23:27.601000",
      "tags": [
        "lowfi",
        "ransom",
        "trojan",
        "mtb oct",
        "win32",
        "kingwe",
        "files",
        "files ip",
        "all ipv4",
        "america flag",
        "United States",
        "win32mydoom",
        "otx logo",
        "urls",
        "reverse dns",
        "cnc style",
        "cnc checkin",
        "style",
        "install cnc",
        "initial install",
        "activity",
        "win32mydoom sep",
        "worm",
        "win32mydoom oct",
        "win32getnow oct",
        "unknown ns",
        "search",
        "browser",
        "hijackers",
        "file format",
        "malwarerid",
        "majauskas",
        "google",
        "report",
        "once",
        "malicious",
        "malware",
        "overview ip",
        "address",
        "asn as46475",
        "nameservers",
        "related tags",
        "spf record",
        "tags",
        "domain",
        "name",
        "query time",
        "cyprus update",
        "united states",
        "browser hijacker",
        "install",
        "handle",
        "entity",
        "key identifier",
        "x509v3 subject",
        "host name",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr12",
        "ttl value",
        "thumbprint",
        "enabled",
        "malvertising",
        "encoded_htm!",
        "new_domain",
        "suspicious_redirect",
        "proximity",
        "tracking_infrastructure",
        "passive dns",
        "http",
        "ip address",
        "related nids",
        "files location",
        "checkin worm",
        "mydoom checkin",
        "useragent",
        "checkin cnc",
        "acti cnc",
        "beac track",
        "failed\u0661\u0668",
        "data upload",
        "extraction",
        "winsoft",
        "checkin",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "defense evasion",
        "spawns",
        "over",
        "mitre att",
        "show technique",
        "ck matrix",
        "ascii text",
        "body",
        "title",
        "encrypt",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "dynamicloader",
        "medium",
        "high",
        "et exploit",
        "write c",
        "default",
        "probe ms17010",
        "write",
        "copy",
        "pegasus related"
      ],
      "references": [
        "coolwebsearch.info | browser hijacker, malware , malicious",
        "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
        "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
        "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
        "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
        "CnC Beacon Win32/InstallCore Initial Install Activity 2",
        "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Malware.Generickdz-9918324-0",
          "display_name": "Win.Malware.Generickdz-9918324-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0",
          "display_name": "Win.Trojan.Generic-9909777-0",
          "target": null
        },
        {
          "id": "Win.Malware.Installcore-9794583-0",
          "display_name": "Win.Malware.Installcore-9794583-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.H",
          "display_name": "Ransom:Win32/WannaCrypt.H",
          "target": "/malware/Ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Win.Dropper.DarkKomet-9370806-0",
          "display_name": "Win.Dropper.DarkKomet-9370806-0",
          "target": null
        },
        {
          "id": "Win.Malware.Generic-9963787-0",
          "display_name": "Win.Malware.Generic-9963787-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "target": null
        },
        {
          "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "target": null
        },
        {
          "id": "Tags",
          "display_name": "Tags",
          "target": null
        },
        {
          "id": "Winsoft",
          "display_name": "Winsoft",
          "target": null
        },
        {
          "id": "Checkin",
          "display_name": "Checkin",
          "target": null
        },
        {
          "id": "CoolWebService",
          "display_name": "CoolWebService",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "69c425ecfef08de19b962774",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 1541,
        "URL": 2403,
        "domain": 328,
        "hostname": 593,
        "FileHash-MD5": 142,
        "FileHash-SHA1": 176,
        "FileHash-SHA256": 574,
        "email": 3,
        "SSLCertFingerprint": 10
      },
      "indicator_count": 5770,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "24 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69c425ecfef08de19b962774",
      "name": "CoolWebSearc \u2022 Engine -Browser Hijack | Affects DropBox + other services | Checkin | Tracking | Installer #pegasus_related",
      "description": "",
      "modified": "2026-03-25T18:14:04.398000",
      "created": "2026-03-25T18:14:04.398000",
      "tags": [
        "lowfi",
        "ransom",
        "trojan",
        "mtb oct",
        "win32",
        "kingwe",
        "files",
        "files ip",
        "all ipv4",
        "america flag",
        "United States",
        "win32mydoom",
        "otx logo",
        "urls",
        "reverse dns",
        "cnc style",
        "cnc checkin",
        "style",
        "install cnc",
        "initial install",
        "activity",
        "win32mydoom sep",
        "worm",
        "win32mydoom oct",
        "win32getnow oct",
        "unknown ns",
        "search",
        "browser",
        "hijackers",
        "file format",
        "malwarerid",
        "majauskas",
        "google",
        "report",
        "once",
        "malicious",
        "malware",
        "overview ip",
        "address",
        "asn as46475",
        "nameservers",
        "related tags",
        "spf record",
        "tags",
        "domain",
        "name",
        "query time",
        "cyprus update",
        "united states",
        "browser hijacker",
        "install",
        "handle",
        "entity",
        "key identifier",
        "x509v3 subject",
        "host name",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr12",
        "ttl value",
        "thumbprint",
        "enabled",
        "malvertising",
        "encoded_htm!",
        "new_domain",
        "suspicious_redirect",
        "proximity",
        "tracking_infrastructure",
        "passive dns",
        "http",
        "ip address",
        "related nids",
        "files location",
        "checkin worm",
        "mydoom checkin",
        "useragent",
        "checkin cnc",
        "acti cnc",
        "beac track",
        "failed\u0661\u0668",
        "data upload",
        "extraction",
        "winsoft",
        "checkin",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "defense evasion",
        "spawns",
        "over",
        "mitre att",
        "show technique",
        "ck matrix",
        "ascii text",
        "body",
        "title",
        "encrypt",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "dynamicloader",
        "medium",
        "high",
        "et exploit",
        "write c",
        "default",
        "probe ms17010",
        "write",
        "copy",
        "pegasus related"
      ],
      "references": [
        "coolwebsearch.info | browser hijacker, malware , malicious",
        "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
        "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
        "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
        "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
        "CnC Beacon Win32/InstallCore Initial Install Activity 2",
        "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Malware.Generickdz-9918324-0",
          "display_name": "Win.Malware.Generickdz-9918324-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0",
          "display_name": "Win.Trojan.Generic-9909777-0",
          "target": null
        },
        {
          "id": "Win.Malware.Installcore-9794583-0",
          "display_name": "Win.Malware.Installcore-9794583-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.H",
          "display_name": "Ransom:Win32/WannaCrypt.H",
          "target": "/malware/Ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Win.Dropper.DarkKomet-9370806-0",
          "display_name": "Win.Dropper.DarkKomet-9370806-0",
          "target": null
        },
        {
          "id": "Win.Malware.Generic-9963787-0",
          "display_name": "Win.Malware.Generic-9963787-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "target": null
        },
        {
          "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "target": null
        },
        {
          "id": "Tags",
          "display_name": "Tags",
          "target": null
        },
        {
          "id": "Winsoft",
          "display_name": "Winsoft",
          "target": null
        },
        {
          "id": "Checkin",
          "display_name": "Checkin",
          "target": null
        },
        {
          "id": "CoolWebService",
          "display_name": "CoolWebService",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "69c41ac489f8cd00a59ef43e",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 1541,
        "URL": 2403,
        "domain": 328,
        "hostname": 593,
        "FileHash-MD5": 142,
        "FileHash-SHA1": 176,
        "FileHash-SHA256": 574,
        "email": 3,
        "SSLCertFingerprint": 10
      },
      "indicator_count": 5770,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "24 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69c41ac489f8cd00a59ef43e",
      "name": "CoolWebService -Browser Hijack | Affects DropBox and other services | Checkin",
      "description": "CoolWebService -Browser Hijack | Affects DropBox and other services | Checkin | Tracking \n| Search Engine Installer \n#pegasus_related",
      "modified": "2026-03-25T17:26:28.750000",
      "created": "2026-03-25T17:26:28.750000",
      "tags": [
        "lowfi",
        "ransom",
        "trojan",
        "mtb oct",
        "win32",
        "kingwe",
        "files",
        "files ip",
        "all ipv4",
        "america flag",
        "United States",
        "win32mydoom",
        "otx logo",
        "urls",
        "reverse dns",
        "cnc style",
        "cnc checkin",
        "style",
        "install cnc",
        "initial install",
        "activity",
        "win32mydoom sep",
        "worm",
        "win32mydoom oct",
        "win32getnow oct",
        "unknown ns",
        "search",
        "browser",
        "hijackers",
        "file format",
        "malwarerid",
        "majauskas",
        "google",
        "report",
        "once",
        "malicious",
        "malware",
        "overview ip",
        "address",
        "asn as46475",
        "nameservers",
        "related tags",
        "spf record",
        "tags",
        "domain",
        "name",
        "query time",
        "cyprus update",
        "united states",
        "browser hijacker",
        "install",
        "handle",
        "entity",
        "key identifier",
        "x509v3 subject",
        "host name",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr12",
        "ttl value",
        "thumbprint",
        "enabled",
        "malvertising",
        "encoded_htm!",
        "new_domain",
        "suspicious_redirect",
        "proximity",
        "tracking_infrastructure",
        "passive dns",
        "http",
        "ip address",
        "related nids",
        "files location",
        "checkin worm",
        "mydoom checkin",
        "useragent",
        "checkin cnc",
        "acti cnc",
        "beac track",
        "failed\u0661\u0668",
        "data upload",
        "extraction",
        "winsoft",
        "checkin",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "defense evasion",
        "spawns",
        "over",
        "mitre att",
        "show technique",
        "ck matrix",
        "ascii text",
        "body",
        "title",
        "encrypt",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "dynamicloader",
        "medium",
        "high",
        "et exploit",
        "write c",
        "default",
        "probe ms17010",
        "write",
        "copy",
        "pegasus related"
      ],
      "references": [
        "coolwebsearch.info | browser hijacker, malware , malicious",
        "Winsoft.E Checkin 3 Trojan.Generic.KDV.91800 Checkin PUP Win32/GetNow.B",
        "Checkin Worm.Mydoom Checkin User-Agent (explwer) Win32/Fosniw MacTryCnt CnC Style",
        "Checkin Win32/Fosniw CnC Checkin Style 2 Win32/Adware.iBryte.BO",
        "CnC Activity W32/SpeedingUpMyPC.Rootkit Install",
        "CnC Beacon Win32/InstallCore Initial Install Activity 2",
        "track.aptitudemedia.co/redirect?target=BASE64aHR0cDovL3RyYWNrLmNxcXNmLmNvbS9hZmZfYz9vZmZlcl9pZD0zNDI3JmFmZl9pZD0yNDM4NyZzb3VyY2U9OTI0MzhmOTktOGM5Yi00ODBjLWJjN2ItZGRiYzc2NDRhMjI3JmFmZl9zdWI9d001T0gxUUtVNzk5MUJUS0hDUklMSjhL"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Malware.Generickdz-9918324-0",
          "display_name": "Win.Malware.Generickdz-9918324-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "display_name": "ALF:HeraklezEval:PUA:Win32/InstallCore.R",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0",
          "display_name": "Win.Trojan.Generic-9909777-0",
          "target": null
        },
        {
          "id": "Win.Malware.Installcore-9794583-0",
          "display_name": "Win.Malware.Installcore-9794583-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.H",
          "display_name": "Ransom:Win32/WannaCrypt.H",
          "target": "/malware/Ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Win.Dropper.DarkKomet-9370806-0",
          "display_name": "Win.Dropper.DarkKomet-9370806-0",
          "target": null
        },
        {
          "id": "Win.Malware.Generic-9963787-0",
          "display_name": "Win.Malware.Generic-9963787-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "display_name": "Win.Trojan.Generic-9909777-0 #LowFi:HSTR:OptimumInstaller",
          "target": null
        },
        {
          "id": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "display_name": "Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Win.Malware.Mydoom-6804696-0\tWorm:Win32/Mydoom Sep 18, 2023\t0d35f0736ce0f4d24c31ec3e940ffb1378d3151d7038a859819d2640cab30da1\t\t\t\t#LowFi:HSTR:OptimumInstal",
          "target": null
        },
        {
          "id": "Tags",
          "display_name": "Tags",
          "target": null
        },
        {
          "id": "Winsoft",
          "display_name": "Winsoft",
          "target": null
        },
        {
          "id": "Checkin",
          "display_name": "Checkin",
          "target": null
        },
        {
          "id": "CoolWebService",
          "display_name": "CoolWebService",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 1541,
        "URL": 2403,
        "domain": 328,
        "hostname": 593,
        "FileHash-MD5": 142,
        "FileHash-SHA1": 176,
        "FileHash-SHA256": 574,
        "email": 3,
        "SSLCertFingerprint": 10
      },
      "indicator_count": 5770,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "24 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69c06ca9341d6c063f652e33",
      "name": "ETERNALBLUE Probe MS17-010 | Wannacry Ransomware Domain - related to NSO Group Pegasus",
      "description": "Quasi governmental, Healthcare Law Firms , legal entities , as well as direct safety threats such as NSO Group Pegasus, Enterprise Cellebrite (in references) and other dangerous intimidation and life endangering tactics directed against a crime victim. Continuous harassment and threats of violence against victims family including 83 yo father. Veteran & hand picked  Sr Systems Analyst and Engineer for Aegis Weapon System Team of 24. You\u2019re welcome America.. Victim left zero evidence with family. Documents shredded. Data stolen by parties named. She isn\u2019t the only one. These people do this for a living. Abuse of Palantir & Foundry tools.",
      "modified": "2026-03-22T22:26:49.205000",
      "created": "2026-03-22T22:26:49.205000",
      "tags": [
        "ransomware",
        "united",
        "search",
        "asnone",
        "regsetvalueexa",
        "service",
        "regdword",
        "medium",
        "get na",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "playgame",
        "unknown",
        "exploit",
        "cve",
        "wncry",
        "wannacry",
        "passive dns",
        "urls",
        "british virgin",
        "all url",
        "http",
        "ip address",
        "related nids",
        "files location",
        "virgin islands",
        "islands",
        "bgp",
        "virgin islands",
        "hijacked",
        "data upload",
        "extraction",
        "failed",
        "review iocs",
        "include ovo",
        "tovary review",
        "ids detec",
        "yara dete",
        "trior texarag",
        "drop or",
        "rrowse",
        "type",
        "extra data",
        "hurricane electric",
        "p2404",
        "p11629470400",
        "p11629107633",
        "artifacts v",
        "full reports",
        "v help",
        "info",
        "low l",
        "high ta0002",
        "techniques",
        "t1053",
        "command",
        "scripting inte",
        "low ta0003",
        "techniques high",
        "t1053 ite",
        "modify system",
        "pl t1543",
        "boot",
        "logon autostart",
        "ex t1547",
        "checks-disk-space",
        "checks-network-adapters",
        "detect-debug-environment",
        "direct-cpu-clock-access",
        "long-sleeps",
        "runtime-modules",
        "get http",
        "head http",
        "dns resolutions",
        "ip traffic",
        "53 tcp",
        "tls sni",
        "apple id",
        "webdisk",
        "expiration",
        "url http",
        "hostname",
        "no expiration",
        "iocs",
        "url https",
        "es included",
        "win32 exe",
        "pe32 executable",
        "ms windows",
        "intel",
        "ms visual",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "t1204 user",
        "defense evasion",
        "over",
        "mitre att",
        "ck matrix",
        "ascii text",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "javascript",
        "ssl certificate",
        "encrypt",
        "accept",
        "russia unknown",
        "meta",
        "record value",
        "aaaa",
        "link",
        "present jun",
        "apple",
        "remote access",
        "otx logo",
        "all ipv4",
        "url analysis",
        "files",
        "accept ch",
        "present dec",
        "content type",
        "x pcrew",
        "name servers",
        "present may",
        "body doctype",
        "title",
        "all domain",
        "servers",
        "china unknown",
        "found content",
        "gmt p3p",
        "cp oti",
        "dsp cor",
        "iva our",
        "ind com",
        "domain",
        "cname",
        "entries",
        "brian sabey",
        "hallrender",
        "christopher ahmann",
        "t1480 execution",
        "discovery att",
        "heur",
        "virtool",
        "win64",
        "mtb win32",
        "backdoor",
        "location china",
        "hangzhou",
        "china asn",
        "ransom",
        "wannadecryptor",
        "filehash",
        "yara detections",
        "msvisualcpp60",
        "related tags",
        "none file",
        "type pexe",
        "copy",
        "beginstring",
        "null",
        "refresh",
        "body",
        "span",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "expl",
        "unknown cname",
        "hacktool",
        "domain address",
        "contacted hosts",
        "process details",
        "flag",
        "ipv4 add",
        "location united",
        "america flag",
        "exploit",
        "show",
        "all filehash",
        "expiration date",
        "gmt location",
        "gmt max",
        "domain add",
        "elite",
        "date",
        "cowboy",
        "United States",
        "present feb",
        "present oct",
        "creation date",
        "present nov",
        "moved",
        "emails"
      ],
      "references": [
        "http://ww17.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/",
        "Win32:CVE-2017-0147-B\\ [Expl] ,  Win.Ransomware.WannaCry-6313787-0 ,  Exploit:Win32/CVE-2017-0147.A",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (MSF style) ETERNALBLUE Probe Vulnerable System Response MS17-010",
        "IDS Detections: Possible ETERNALBLUE Probe MS17-010 (Generic Flags)",
        "IDS Detections: Behavioral Unusual Port 445 traffic Potential Scan or Infection SMB-DS",
        "IDS Detections: IPC$ share access \u2022 SMB-DS IPC$ unicode share access \u2022 403 Forbidden",
        "Yara Detections: WannaCry_Ransomware ,  Wanna_Cry_Ransomware_Generic ,  WannaDecryptor",
        "Yara Detections: MS17_010_WanaCry_worm  ,  stack_string , MS_Visual_Cpp_6_0 ,  Armadillov1xxv2xx",
        "Alerts: network_icmp nolookup_communication persistence_autorun modifies_proxy_wpad",
        "Alerts: network_cnc_http network_http allocates_rwx creates_exe creates_hidden_file",
        "Alerts: creates_service stealth_window antivm_network_adapters checks_debugger",
        "Alerts:  peid_packer pe_unknown_resource_name",
        "IP\u2019s Contacted: 103.224.212.220  105.242.60.208  117.13.61.219  117.180.208.83  12.105.46.122",
        "IP\u2019s Contacted: 121.105.233.189  128.251.173.246  13.248.148.254  132.124.155.52  139.246.30.108",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "Domains Contacted: ww38.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com",
        "FileHash-SHA256 002dee2db8b07b98b543ad99d0dd4e3e0ba7624f956d719ba803f57b426e30e7",
        "Names: Photo.scr \u2022 85115B0142902832C864B3009CAB1A00.RS (names of FileHash above)",
        "Crowdsourced IDS: Matches rule MALWARE-CNC DNS",
        "Crowdsourced IDS: Fast Flux attempt Matches rule ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)",
        "Crowdsourced IDS: Matches rule ET POLICY PE EXE or DLL Windows file download HTTP",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "apple.com-verify.account.manage.test2.aptaforum.com.cn",
        "appleid.apple.com-signin-8491e.test2.aptaforum.com.cn",
        "appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn",
        "web-secure-appleid-login.com.test2.aptaforum.com.cn",
        "http://apple.com-verify.account.manage.test2.aptaforum.com.cn/",
        "http://appleid.apple.com-signin-8491e.test2.aptaforum.com.cn/",
        "http://apple.sweetycat.com/ \u2022 https://apple.sweetycat.com/",
        "findmy.apple-uk.live",
        "apple.haipaoapp.com \u2022 http://apple.haipaoapp.com \u2022 http://apple.haipaoapp.com/ \u2022 https://apple.haipaoapp.com/",
        "http://apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn/",
        "http://appleid.apple.com.secure1account.pagelogin.test2.aptaforum.com.cn/",
        "http://web-secure-appleid-login.com.test2.aptaforum.com.cn/",
        "Trojan/JS.Redirector.QNO SHA256:9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "VO7MU1HA.htm : https://hybrid-analysis.com/sample/9e6e93c05a9736b95426fe0f492a18a2ac409bd9fb572dd3c982cb6de3ba0dbc",
        "https://hybrid-analysis.com/sample/a638ece11c81bcac0002363eb3f75de35a46ce0e080b5de41162093181079a6b/69c018efcb875e4fb30cdfcc",
        "https://hybrid-analysis.com/sample/09610b7c855ef132a31f2e0136b4d62b9dbb04c6fcb42160d6d8409ef6394e40/69c0189c5e0483a78907cc39",
        "KeenDNS | keendnsaclremote805717135272048.qeenetic.link",
        "https://fonts.googleapis.com/css",
        "http://e7.c.lencr.org/74.crl \u2022 http://e7.i.lencr.org/",
        "Quasi Gov - Law firms stole victims clouds. Evidence, $Intellectual property, Memories of & victims family. Merciless",
        "www.remoteaccess.allied-media.com",
        "apple.com-index.php-account-locked-verification.test2.aptaforum.com.cn",
        "aptaforum.com.cn   182.61.201.90 ,  182.61.201.91   China ASN AS38365 beijing baidu netcom science and technology co. ltd",
        "Emails:yejun.shou@yxips.com Name:\u7ebd\u8fea\u5e0c\u4e9a\u751f\u547d\u65e9\u671f\u8425\u517b\u54c1\u7ba1\u7406(\u4e0a\u6d77)\u6709\u9650\u516c\u53f8 Name Servers: dns17.hichina.com",
        "*unsigned Domain: aptaforum.com.cn  Name Servers: dns18.hichina.com Registrar: \u963f\u91cc\u4e91\u8ba1\u7b97\u6709\u9650\u516c\u53f8\uff08\u4e07\u7f51\uff09Status: ok",
        "dns17.hichina.com",
        "dropbox.com - deleted victims DB post assault. Sabey + Ahmann repeatedly erased DB (ILLEGAL)",
        "Protected:SA\u2019r Jeffrey Scott Reimer, Mark Montano MD, John T. Sasha MD, Frederick P. Scherr , others.",
        "https://otx.alienvault.com/indicator/domain/qeenetic.link",
        "okg.and.googletagmanagers.com",
        "pcy.and.googletagmanagers.com",
        "pgj.and.googletagmanagers.com",
        "prb.and.googletagmanagers.com",
        "lkp.and.googletagmanagers.com",
        "jgw.and.googletagmanagers.com",
        "bzx.and.googletagmanagers.com",
        "msedge.b.tlu.dl.delivery.mp.microsoft.com",
        "http://prtests.ru/test.html?15%0Ahttp://profetest.ru/test.html?2%0Ahttp://qptest.ru/test.html?5%0Ahttp://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3cf71a18-f999-4372-beac-67715d51bb62?P1=1629470400&P2=404&P3=2&P4=d%2520arRdiatcalmlQRKq2gm1LlFitNgIcLpnyzCIHYtf%2520ByXQF0JNptZ0rBDMKlLL%2520qsOzZdPICJjC7MWkkdm1Hg==%0Ahttp://stafftest.ru/test.html?0%0Ahttp://iqtesti.ru/test.html?17%0Ahttp://hrtests.ru/test.html?1%0Ahttp://pstests.ru/test.html?4%0Ahttp://prtests.ru/test.html?6%0Ahttp:/",
        "HallRender.com | Law Firm M. Brian Sabey Esq. | Pegasus related",
        "TAM Legal\u2019s Christopher P. \u2018Buzz\u2019 Ahmann Esq works for State Quasi Government in tandem w/ Hall Render",
        "https://otx.alienvault.com/pulse/69bf8e2663d5480917ddb699",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "https://otx.alienvault.com/pulse/69bea426487bffa5384c6f38",
        "(?) https://living-sun.com/applescript/68281-is-there-a-way-to-disable-force-quit-while-applescript-application-is-still-running-applescript-quit.html",
        "https://otx.alienvault.com/pulse/69bf261cc4e399447d78776c",
        "https://otx.alienvault.com/pulse/69b49ad5dd40a24d83cd6a72"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Win.Ransomware.WannaCry-6313787-0",
          "display_name": "Win.Ransomware.WannaCry-6313787-0",
          "target": null
        },
        {
          "id": "Exploit:Win32/CVE-2017-0147.A",
          "display_name": "Exploit:Win32/CVE-2017-0147.A",
          "target": "/malware/Exploit:Win32/CVE-2017-0147.A"
        },
        {
          "id": "Trojan/JS.Redirector.QNO",
          "display_name": "Trojan/JS.Redirector.QNO",
          "target": null
        },
        {
          "id": "Win.Trojan.Application-1955.",
          "display_name": "Win.Trojan.Application-1955.",
          "target": null
        },
        {
          "id": "Win32:Banker-LAA\\ [Trj]",
          "display_name": "Win32:Banker-LAA\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Malware.Snojan-6775202-0",
          "display_name": "Win.Malware.Snojan-6775202-0",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Trj]",
          "display_name": "Win32:Evo-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win64:Expiro-AJ\\ [Inf]",
          "display_name": "Win64:Expiro-AJ\\ [Inf]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fugrafa-9733007-0",
          "display_name": "Win.Trojan.Fugrafa-9733007-0",
          "target": null
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6989114-0",
          "display_name": "Win.Trojan.VBGeneric-6989114-0",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.YA!MTB",
          "display_name": "VirTool:Win32/VBInject.YA!MTB",
          "target": "/malware/VirTool:Win32/VBInject.YA!MTB"
        },
        {
          "id": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
          "display_name": "Win32:Dh-A\\ [Win32:FileInfector-C\\ [Heur]",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator",
          "display_name": "#VirTool:Win32/Obfuscator",
          "target": "/malware/#VirTool:Win32/Obfuscator"
        },
        {
          "id": "Backdoor:Win32/Small.IR",
          "display_name": "Backdoor:Win32/Small.IR",
          "target": "/malware/Backdoor:Win32/Small.IR"
        },
        {
          "id": "Win64:Expiro-AJ\\ [Inf]",
          "display_name": "Win64:Expiro-AJ\\ [Inf]",
          "target": null
        },
        {
          "id": "Win32:Dh-A\\",
          "display_name": "Win32:Dh-A\\",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "Ransom:Win32/CVE-2017-0147.A",
          "display_name": "Ransom:Win32/CVE-2017-0147.A",
          "target": "/malware/Ransom:Win32/CVE-2017-0147.A"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win.Malware.Flystudio-6738927-0",
          "display_name": "Win.Malware.Flystudio-6738927-0",
          "target": null
        },
        {
          "id": "ALF:SpikeAexR.PEVPOPC",
          "display_name": "ALF:SpikeAexR.PEVPOPC",
          "target": null
        },
        {
          "id": "Sf:WNCryLdr-A\\ [Trj]",
          "display_name": "Sf:WNCryLdr-A\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Ransomware.WannaCry-6313787-0",
          "display_name": "Win.Ransomware.WannaCry-6313787-0",
          "target": null
        },
        {
          "id": "ransom:Win32/WannaCrypt.H",
          "display_name": "ransom:Win32/WannaCrypt.H",
          "target": "/malware/ransom:Win32/WannaCrypt.H"
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1198",
          "name": "SIP and Trust Provider Hijacking",
          "display_name": "T1198 - SIP and Trust Provider Hijacking"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1543.001",
          "name": "Launch Agent",
          "display_name": "T1543.001 - Launch Agent"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        }
      ],
      "industries": [
        "Government",
        "Legal",
        "Technology",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3779,
        "FileHash-MD5": 422,
        "FileHash-SHA1": 411,
        "FileHash-SHA256": 1824,
        "IPv4": 666,
        "domain": 979,
        "hostname": 2082,
        "CVE": 1,
        "BitcoinAddress": 3,
        "SSLCertFingerprint": 6,
        "email": 8
      },
      "indicator_count": 10181,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "27 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://freeskin.eventkrafton.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://freeskin.eventkrafton.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776618465.0927253
}