{
  "type": "URL",
  "indicator": "https://ftp.regapp8.net",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ftp.regapp8.net",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4121233862,
      "indicator": "https://ftp.regapp8.net",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "69decb6dd1bd6da78fc72d0a",
          "name": "Solarwinds Similarties? Tactics ASP.Net IoC\u2019s ISOLATED",
          "description": "Does this have similarities to the SolarWinds Attack? Anyone?\n\nASP.NET is a web application framework created by Microsoft for building dynamic web applications.\nIt enables developers to create web pages that can interact with databases and respond to user inputs.\nASP.NET supports various programming languages, including C# and VB.NET.\nContext: ASP.NET is widely used for developing modern web applications and services. It allows developers to create interactive and data-driven web pages that can run on various operating systems, including Windows, Linux, and macOS. The framework is open-source and supports various architectures, including MVC (Model-View-Controller) and Web API, which facilitate the organization and development of complex applications.\nIn many instances ASP.net has been seen connected to malicious Tulach , Apple , a browser agent that transmits data to New Relic's collectors by using either of the domains bam.nr-data.net or bam-cell.nr-data.net.",
          "modified": "2026-04-14T23:19:09.495000",
          "created": "2026-04-14T23:19:09.495000",
          "tags": [
            "united",
            "aaaa",
            "certificate",
            "error",
            "read c",
            "rgba",
            "unicode",
            "memcommit",
            "delete",
            "dock",
            "execution",
            "command decode",
            "suricata ipv4",
            "suricata tcpv4",
            "flag",
            "localappdata",
            "windir",
            "openurl c",
            "programfiles",
            "suricata udpv4",
            "win64",
            "click",
            "strings",
            "anon",
            "username",
            "userprofile",
            "mitre att",
            "ck id",
            "ck matrix",
            "appdata",
            "comspec",
            "model",
            "path",
            "april",
            "hybrid",
            "general",
            "learn",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ck techniques",
            "mtb apr",
            "exploit",
            "trojan",
            "backdoor",
            "please",
            "x msedge",
            "all ipv4",
            "ransom",
            "date hash",
            "avast avg",
            "win32orbus apr",
            "dynamicloader",
            "yara rule",
            "high",
            "tofsee",
            "rndhex",
            "rndchar",
            "loaderid",
            "lidfileupd",
            "localcfg",
            "write",
            "stream",
            "push",
            "mtb alerts",
            "ee fc",
            "ff d5",
            "lredmond",
            "malware",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "yara detections",
            "av detections",
            "ids detections",
            "hostile",
            "unknown",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "stop data",
            "typ url",
            "url data",
            "typ no",
            "th all",
            "stop",
            "port",
            "destination",
            "ds detections",
            "tls sni",
            "nrv2x",
            "upxoepplace",
            "alerts",
            "contacted",
            "markus",
            "hostile alerts",
            "less see",
            "all ip",
            "tulach",
            "brian sabey",
            "quasi",
            "link",
            "script urls",
            "record value",
            "script domains",
            "fireeye",
            "create c",
            "as15169",
            "next",
            "all url",
            "http",
            "related pulses",
            "related tags",
            "google safe",
            "code",
            "y se",
            "included review",
            "io excluded",
            "suggeste",
            "ipv4",
            "unknown ns",
            "redacted admin",
            "fax redacted",
            "name redacted",
            "phone redacted",
            "code redacted",
            "redacted tech",
            "christopher ahmann",
            "solarwinds like?"
          ],
          "references": [
            "asp.net \u2022 cdnsrc.asp.net",
            "https://www.countercept.com/assets/Uploads/whitepapers/MWRI-Countercept-Machine-Learning-Whitepaper-2017-04-01.pdf",
            "http://www.phonefactor.com/PfPaWs/ConfirmActivation",
            "IPv4 13.107.253.70 exploit_source \u2022 IPv4 13.107.226.70 malware_hosting",
            "https://wsps.ourschoolpages.com/Account/ForgotPasswor (typo",
            "https://hybrid-analysis.com/sample/529a0b900eef6657ce6c98b1b5bccebe6db2e021aa02a316b7eb2604df810d3f/69de30ef0a22c3b506077a8c",
            "www.fireeye.com",
            "danilovstyle.ru",
            "ns4-04.azure-dns.info",
            "ns4-04.azure-dns.info danilovst) ns4-04.azure-dns.info",
            "www.fireeye.com .",
            "https://hypic-anaivsis.com/sambrerb/a0p9veebo",
            "Are these table SolarWinds attackers? Using same tacktics, good? Unsure.",
            "Tulach\u2019s ASP.Net Open Source destruction"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Ransom:Win32/SodinokibiCrypt.SK!MTB",
              "display_name": "Ransom:Win32/SodinokibiCrypt.SK!MTB",
              "target": "/malware/Ransom:Win32/SodinokibiCrypt.SK!MTB"
            },
            {
              "id": "Win.Ransomware.Tofsee-10015002",
              "display_name": "Win.Ransomware.Tofsee-10015002",
              "target": null
            },
            {
              "id": "Trojan:Win32/Comisproc!gmb I",
              "display_name": "Trojan:Win32/Comisproc!gmb I",
              "target": "/malware/Trojan:Win32/Comisproc!gmb I"
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 88,
            "FileHash-MD5": 211,
            "FileHash-SHA1": 186,
            "FileHash-SHA256": 1366,
            "URL": 1848,
            "domain": 418,
            "email": 4,
            "hostname": 622,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 4764,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "5 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ddeb45c45f6a3cd721397d",
          "name": "Active attacks  \u2022 Apple \u2022 Tulach",
          "description": "Including 360+ Apple\nIoC\u2019s from Malicious Tulac.cc + Virtual Servers Pulses. Ongoing history of malicious attacks, custom malware engineer, malicious media , account control. \n\nI was blocked from VirusToltal. It was Tulach Nextcloud posse. What I am doing now s legal. \n\nReferenced below. URL: \"https://accountapple.com/\" contacted related malicious domain: \"accountapple.com\"\nCONTACTED DOMAIN: \"sqllq.com\" has been identified as malicious",
          "modified": "2026-04-14T07:22:45.250000",
          "created": "2026-04-14T07:22:45.250000",
          "tags": [
            "url http",
            "ipv4",
            "indicator role",
            "active related",
            "united",
            "moved",
            "gmt content",
            "certificate",
            "all domain",
            "msie",
            "chrome",
            "extraction",
            "data upload",
            "twitter",
            "cookie",
            "extra",
            "include data",
            "review locs",
            "exclude",
            "suggested os",
            "onlv",
            "failed",
            "stop data",
            "read c",
            "unicode",
            "rgba",
            "memcommit",
            "delete",
            "dock",
            "write",
            "execution",
            "sc type",
            "extri",
            "include review",
            "exclude sugges",
            "typ data",
            "a domains",
            "present apr",
            "script urls",
            "files",
            "files ip",
            "address",
            "ios",
            "mac",
            "apple",
            "appleid",
            "itunes",
            "next associated",
            "all ipv4",
            "included ic",
            "uny teade",
            "type hostnar",
            "hostnar hostnar",
            "hostnar",
            "macair",
            "macairaustralia",
            "ipad",
            "ipod",
            "cryptexportkey",
            "invalid pointer",
            "cryptgenkey",
            "stream",
            "defender",
            "delphi",
            "class",
            "stack",
            "format",
            "unknown",
            "united states",
            "phishing",
            "password",
            "traffic redirected",
            "service mod",
            "service execution",
            "youtube",
            "music",
            "streams",
            "songs",
            "played songs",
            "music streams",
            "most played",
            "fonelab",
            "indicator",
            "included iocs",
            "manually add",
            "review ocs",
            "exclude inn",
            "sugges data",
            "find",
            "include",
            "url https",
            "enter sc",
            "type",
            "no matchme",
            "search otx",
            "https",
            "references x",
            "analyze",
            "open th",
            "url data",
            "se http",
            "no match",
            "excluded iocs",
            "iocs",
            "ip whitelisted",
            "whitelisted",
            "tcp include",
            "analysis date",
            "file score",
            "medium risk",
            "yara detections",
            "contacted",
            "related tags",
            "x vercel",
            "file type",
            "type indicator",
            "role title",
            "related pulses",
            "mulch virtua",
            "library loade",
            "included i0",
            "review ioc",
            "excluded ic",
            "suggested",
            "find sugt",
            "samuel tulach",
            "unity engine",
            "tulach",
            "sa awareness",
            "sabey",
            "sar cut",
            "autofill",
            "includer review",
            "portiana oney",
            "targeting",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "musickit_1_.js",
            "lazarus",
            "injection",
            "CVE-2017-8570",
            "prefetch2",
            "target",
            "aaaa",
            "ip address",
            "record value",
            "emails",
            "samuel tuachs",
            "sapev",
            "review exclude",
            "monitored target",
            "script",
            "mitre att",
            "ascii text",
            "span",
            "path",
            "iframe",
            "april",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "body",
            "development att",
            "t1055.012 list planting",
            "active"
          ],
          "references": [
            "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
            "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
            "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
            "https://podcasts.apple.com/us/podcast/lazarus",
            "http://help.aiseesoft.jp/video-converter-ultimate/",
            "http://help.aiseesoft.jp/blu-ray-player",
            "http://help.aiseesoft.jp/fonelab/",
            "https://action.aiseesoft.jp/itunes.php",
            "http://help.aiseesoft.jp/total-video-converter",
            "http://help.aiseesoft.jp/total-video-converter/",
            "http://help.aiseesoft.jp/video-converter-ultimate/",
            "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
            "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
            "http://test-firstmile.digitecgalaxus.ch",
            "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
            "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
            "cdn.rss.applemarketingtools.com",
            "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
            "1.bing.com.cn",
            "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
            "www.phantomcameras.cn",
            "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
            "podcasts.apple.com \u2022 23.34.32.21",
            "www.apple.com \u2022 23.34.32.199",
            "js-cdn.music.apple.com \u2022 23.78.51.170",
            "http://firstmile.digitecgalaxus.ch",
            "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
            "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
            "Tulach.cc",
            "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
            "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
            "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
            "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
            "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
            "asp.net domain pointer",
            "developer.x.com",
            "aotx.alienvault.com (aotx.?)",
            "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
            "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1020.001",
              "name": "Traffic Duplication",
              "display_name": "T1020.001 - Traffic Duplication"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591.002",
              "name": "Business Relationships",
              "display_name": "T1591.002 - Business Relationships"
            },
            {
              "id": "T1591.001",
              "name": "Determine Physical Locations",
              "display_name": "T1591.001 - Determine Physical Locations"
            },
            {
              "id": "T1585.001",
              "name": "Social Media Accounts",
              "display_name": "T1585.001 - Social Media Accounts"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1029,
            "domain": 396,
            "email": 7,
            "URL": 2784,
            "FileHash-SHA256": 898,
            "FileHash-MD5": 79,
            "FileHash-SHA1": 68,
            "IPv4": 35,
            "CVE": 1,
            "SSLCertFingerprint": 13
          },
          "indicator_count": 5310,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "5 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d586108786e7be59439809",
          "name": "Bot.io",
          "description": "",
          "modified": "2026-04-07T22:32:48.996000",
          "created": "2026-04-07T22:32:48.996000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69d5859750dfad7fe7989ef4",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "12 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5859750dfad7fe7989ef4",
          "name": "Apple / Cloud/ Data Network within Zergeca / Zerg Botnet \u2022 MacSync_AppleScript_Stealer",
          "description": "",
          "modified": "2026-04-07T22:30:47.312000",
          "created": "2026-04-07T22:30:47.312000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "12 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "699c6ef61298b57cd7275728",
          "name": "Apple Support IOC\u2019s IcedID | Bloored |  Mydoom worm | iOS IOC\u2019s",
          "description": "A list of Apple and Apple related iOS\u2019s linked to a malicious redirect found in an apple.support.com redirect. Two separate Apple ID\u2019s on one iPhone. | Mimecast compromised with Emotet. iCloud siphoning. Related to Pulse  found in references. |  IOC\u2019s came from a single url.",
          "modified": "2026-03-25T07:05:10.628000",
          "created": "2026-02-23T15:15:02.857000",
          "tags": [
            "ipv4",
            "http",
            "passive dns",
            "files domain",
            "united",
            "unknown ns",
            "for privacy",
            "ip address",
            "domain",
            "dynamicloader",
            "antivirus",
            "yara rule",
            "fe ff",
            "write c",
            "msvisualcpp60",
            "rsds",
            "e8 c8",
            "e8 a8",
            "ff e1",
            "unknown",
            "worm",
            "launch",
            "write",
            "explorer",
            "february",
            "push",
            "service",
            "files",
            "reverse dns",
            "america flag",
            "america asn",
            "url add",
            "otx logo",
            "all ipv4",
            "searc",
            "date checked",
            "server response",
            "results dec",
            "unknown soa",
            "present aug",
            "present oct",
            "present sep",
            "present nov",
            "moved",
            "error",
            "title",
            "win32mydoom feb",
            "aaaa",
            "name servers",
            "trojan",
            "servers",
            "virtool",
            "united states",
            "apple",
            "crlf line",
            "unicode text",
            "utf8",
            "ff d5",
            "ascii text",
            "ee fc",
            "suspicious",
            "music",
            "malware",
            "role title",
            "ttl value",
            ".cc",
            "d4 f5",
            "msvisualcpp2002",
            "msvisualcpp2005",
            "apple support",
            ".ch",
            "privaterelay",
            "pattern match",
            "ck id",
            "mitre att",
            "ck matrix",
            "href",
            "et info",
            "general",
            "local",
            "path",
            "click",
            "learn",
            "command",
            "name tactics",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "present jun",
            "backdoor",
            "present may",
            "status",
            "ransom",
            "high",
            "medium",
            "windows",
            "tofsee",
            "loaderid",
            "lidfileupd",
            "localcfg",
            "rndhex",
            "stream",
            "delete",
            "emotet",
            "bot network",
            "mitm",
            "screenshot",
            "mimecast"
          ],
          "references": [
            "http://apple.support.com/ht***** redirect",
            "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
            "mac.store",
            "https://icloud.ch/cn/ipod-touch/",
            "https://icloud.ch/",
            "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
            "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
            "Redirect: schemas.microsoft.com",
            "apple.com(-inc.cc)",
            "oas-japac-domains-applecomputer.cn",
            "robert-aebi.appleid.com",
            "smtp2.icl-privaterelay.appleid.com",
            "http://audaxgroup.appleid.com/",
            "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
            "iphonegermany.com",
            "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
            "https://aspmx.l.google.com/",
            "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
            "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
            "http://www.icloud-sms-alert.com/",
            "monitoring.eurovision.net",
            "https://www.irby.com/iub-en/services/testing-and-monitoring",
            "monitor.kyos.ninja"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/IcedId.DI!MTB",
              "display_name": "Trojan:Win32/IcedId.DI!MTB",
              "target": "/malware/Trojan:Win32/IcedId.DI!MTB"
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            },
            {
              "id": "Worm:Win32/Bloored",
              "display_name": "Worm:Win32/Bloored",
              "target": "/malware/Worm:Win32/Bloored"
            },
            {
              "id": "Win.Malware.Elenooka-6996044-0",
              "display_name": "Win.Malware.Elenooka-6996044-0",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6031,
            "hostname": 1971,
            "domain": 1125,
            "FileHash-SHA256": 1715,
            "email": 18,
            "FileHash-MD5": 317,
            "FileHash-SHA1": 164
          },
          "indicator_count": 11341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "25 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68a23eef53f1124e8dc273fc",
          "name": "Sign in to your account - Anorocuriv",
          "description": "Short link sent to an iPhone user possibly by accident or maybe not. Unraveled :[https://ns4.whichkill.net/]\n[https://l.us-1.a.mimecastprotect.com/l]\n[https://api-glintstage.glintinc.com/api/client/tiaa/token/saml2/consume/includeDeskLink]\n\n[https://api.glintinc.com/api/client/tiaa/token/saml2/consume/includeDeskLink]\t\n\n*api.us1.glintinc.com #malta\n*ALF:Trojan:Win32/Anorocuriv.A.#virtool #LowFI:HookwowLow \n#tracking #tiaa #locate recording #userpics #movies #audio #screen #mobile_assets #https://biccerija.gov.mt/en/contact/",
          "modified": "2025-09-16T20:00:00.565000",
          "created": "2025-08-17T20:43:27.502000",
          "tags": [
            "url http",
            "url https",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "entries",
            "status",
            "msie",
            "chrome",
            "passive dns",
            "urls",
            "date",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "body",
            "http",
            "hostname",
            "files domain",
            "present jan",
            "present dec",
            "united",
            "present aug",
            "present jun",
            "unknown aaaa",
            "present mar",
            "present may",
            "present feb",
            "present jul",
            "error",
            "a domains",
            "gmt content",
            "accept encoding",
            "config nocache",
            "hostname add",
            "pulse submit",
            "content type",
            "certificate",
            "ip address",
            "cookie",
            "mita",
            "next associated",
            "please",
            "x msedge",
            "ipv4 add",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "signing defense",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "pattern match",
            "mitre att",
            "ascii text",
            "null",
            "click",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "strings",
            "refresh",
            "tools",
            "meta",
            "onload",
            "span",
            "adversaries",
            "ssl certificate",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "falcon sandbox",
            "response risk",
            "ck techniques",
            "detection",
            "show process",
            "prefetch8",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "post collect",
            "microsoft edge",
            "nota",
            "brand",
            "class",
            "facebook",
            "ascii",
            "hex dump",
            "extraction",
            "failed",
            "data upload",
            "pul data",
            "enter",
            "s data",
            "type",
            "extr error",
            "href",
            "mask",
            "extra",
            "uta support",
            "include review",
            "exclude sugges",
            "find",
            "wow64",
            "show",
            "observed dns",
            "query",
            "unknown",
            "virtool",
            "copy",
            "write",
            "defender",
            "expiro",
            "malware",
            "next",
            "lowfi",
            "hookwowlow dec",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "trojan",
            "trojandropper",
            "http request",
            "delete",
            "yara detections",
            "pe exe",
            "dll windows",
            "minimal http",
            "february",
            "guard",
            "alerts",
            "analysis date",
            "file score",
            "detections alf",
            "detections http",
            "http executable",
            "retrieved",
            "location united",
            "america flag",
            "america asn",
            "urls show",
            "date checked",
            "url hostname",
            "server response"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 853,
            "hostname": 1835,
            "URL": 7127,
            "email": 3,
            "FileHash-SHA256": 1470,
            "FileHash-MD5": 293,
            "FileHash-SHA1": 284,
            "SSLCertFingerprint": 426,
            "CVE": 1
          },
          "indicator_count": 12292,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "215 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://www.icloud-sms-alert.com/",
        "IPv4 13.107.253.70 exploit_source \u2022 IPv4 13.107.226.70 malware_hosting",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "https://podcasts.apple.com/us/podcast/lazarus",
        "http://apple.support.com/ht***** redirect",
        "js-cdn.music.apple.com \u2022 23.78.51.170",
        "cdn.rss.applemarketingtools.com",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
        "www.phantomcameras.cn",
        "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
        "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "http://help.aiseesoft.jp/blu-ray-player",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "asp.net domain pointer",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Crowdsourced IDS rules:",
        "mac.store",
        "https://icloud.ch/",
        "www.fireeye.com",
        "Tulach.cc",
        "oas-japac-domains-applecomputer.cn",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "monitoring.eurovision.net",
        "https://icloud.ch/cn/ipod-touch/",
        "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
        "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
        "podcasts.apple.com \u2022 23.34.32.21",
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "asp.net \u2022 cdnsrc.asp.net",
        "http://www.bing.lt/search?q=",
        "http://test-firstmile.digitecgalaxus.ch",
        "smtp2.icl-privaterelay.appleid.com",
        "danilovstyle.ru",
        "Yara detected: Xmrig cryptocurrency miner",
        "https://hypic-anaivsis.com/sambrerb/a0p9veebo",
        "apple.com(-inc.cc)",
        "aotx.alienvault.com (aotx.?)",
        "developer.x.com",
        "monitor.kyos.ninja",
        "https://www.irby.com/iub-en/services/testing-and-monitoring",
        "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
        "Zercega \u2022  ootheca.pw",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Zercega \u2022 IPv4 84.54.51.82",
        "https://action.aiseesoft.jp/itunes.php",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
        "http://help.aiseesoft.jp/fonelab/",
        "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
        "Zercega \u2022  multi-user.target",
        "http://www.phonefactor.com/PfPaWs/ConfirmActivation",
        "Are these table SolarWinds attackers? Using same tacktics, good? Unsure.",
        "iphonegermany.com",
        "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "https://hybrid-analysis.com/sample/529a0b900eef6657ce6c98b1b5bccebe6db2e021aa02a316b7eb2604df810d3f/69de30ef0a22c3b506077a8c",
        "Redirect: schemas.microsoft.com",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "https://aspmx.l.google.com/",
        "Win.Malware.Salat-10058846-0",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "ns4-04.azure-dns.info",
        "ns4-04.azure-dns.info danilovst) ns4-04.azure-dns.info",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
        "robert-aebi.appleid.com",
        "https://wsps.ourschoolpages.com/Account/ForgotPasswor (typo",
        "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
        "http://audaxgroup.appleid.com/",
        "http://help.aiseesoft.jp/total-video-converter",
        "Tulach\u2019s ASP.Net Open Source destruction",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f",
        "1.bing.com.cn",
        "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
        "https://www.countercept.com/assets/Uploads/whitepapers/MWRI-Countercept-Machine-Learning-Whitepaper-2017-04-01.pdf",
        "http://help.aiseesoft.jp/total-video-converter/",
        "http://firstmile.digitecgalaxus.ch",
        "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "www.apple.com \u2022 23.34.32.199",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
        "meta.com \u2022 meta.com.apple",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
        "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "www.fireeye.com ."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Emotet",
            "Alf:jasyp:trojandownloader:win32/smallagent!",
            "Win.trojan.emotet-9850453-0",
            "Ransom:win32/sodinokibicrypt.sk!mtb",
            "Trojan:win32/icedid.di!mtb",
            "Trojan:win32/comisproc!gmb i",
            "Mydoom",
            "Win.ransomware.tofsee-10015002",
            "Win.malware.salat-10058846-0",
            "Autoit",
            "Cve-2025-20393",
            "Cve-2023-22518",
            "Win.malware.elenooka-6996044-0",
            "Worm:win32/bloored",
            "Cve-2024-6387",
            "Cve-2014-2321",
            "Worm:win32/autorun!atmn",
            "Zergeca",
            "Botnet",
            "Cve-2018-10562",
            "Win.trojan.tofsee-7102058-0\tbackdoor:win32/tofsee.t"
          ],
          "industries": [],
          "unique_indicators": 37984
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/regapp8.net",
    "whois": "http://whois.domaintools.com/regapp8.net",
    "domain": "regapp8.net",
    "hostname": "ftp.regapp8.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "69decb6dd1bd6da78fc72d0a",
      "name": "Solarwinds Similarties? Tactics ASP.Net IoC\u2019s ISOLATED",
      "description": "Does this have similarities to the SolarWinds Attack? Anyone?\n\nASP.NET is a web application framework created by Microsoft for building dynamic web applications.\nIt enables developers to create web pages that can interact with databases and respond to user inputs.\nASP.NET supports various programming languages, including C# and VB.NET.\nContext: ASP.NET is widely used for developing modern web applications and services. It allows developers to create interactive and data-driven web pages that can run on various operating systems, including Windows, Linux, and macOS. The framework is open-source and supports various architectures, including MVC (Model-View-Controller) and Web API, which facilitate the organization and development of complex applications.\nIn many instances ASP.net has been seen connected to malicious Tulach , Apple , a browser agent that transmits data to New Relic's collectors by using either of the domains bam.nr-data.net or bam-cell.nr-data.net.",
      "modified": "2026-04-14T23:19:09.495000",
      "created": "2026-04-14T23:19:09.495000",
      "tags": [
        "united",
        "aaaa",
        "certificate",
        "error",
        "read c",
        "rgba",
        "unicode",
        "memcommit",
        "delete",
        "dock",
        "execution",
        "command decode",
        "suricata ipv4",
        "suricata tcpv4",
        "flag",
        "localappdata",
        "windir",
        "openurl c",
        "programfiles",
        "suricata udpv4",
        "win64",
        "click",
        "strings",
        "anon",
        "username",
        "userprofile",
        "mitre att",
        "ck id",
        "ck matrix",
        "appdata",
        "comspec",
        "model",
        "path",
        "april",
        "hybrid",
        "general",
        "learn",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "ck techniques",
        "mtb apr",
        "exploit",
        "trojan",
        "backdoor",
        "please",
        "x msedge",
        "all ipv4",
        "ransom",
        "date hash",
        "avast avg",
        "win32orbus apr",
        "dynamicloader",
        "yara rule",
        "high",
        "tofsee",
        "rndhex",
        "rndchar",
        "loaderid",
        "lidfileupd",
        "localcfg",
        "write",
        "stream",
        "push",
        "mtb alerts",
        "ee fc",
        "ff d5",
        "lredmond",
        "malware",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "yara detections",
        "av detections",
        "ids detections",
        "hostile",
        "unknown",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "stop data",
        "typ url",
        "url data",
        "typ no",
        "th all",
        "stop",
        "port",
        "destination",
        "ds detections",
        "tls sni",
        "nrv2x",
        "upxoepplace",
        "alerts",
        "contacted",
        "markus",
        "hostile alerts",
        "less see",
        "all ip",
        "tulach",
        "brian sabey",
        "quasi",
        "link",
        "script urls",
        "record value",
        "script domains",
        "fireeye",
        "create c",
        "as15169",
        "next",
        "all url",
        "http",
        "related pulses",
        "related tags",
        "google safe",
        "code",
        "y se",
        "included review",
        "io excluded",
        "suggeste",
        "ipv4",
        "unknown ns",
        "redacted admin",
        "fax redacted",
        "name redacted",
        "phone redacted",
        "code redacted",
        "redacted tech",
        "christopher ahmann",
        "solarwinds like?"
      ],
      "references": [
        "asp.net \u2022 cdnsrc.asp.net",
        "https://www.countercept.com/assets/Uploads/whitepapers/MWRI-Countercept-Machine-Learning-Whitepaper-2017-04-01.pdf",
        "http://www.phonefactor.com/PfPaWs/ConfirmActivation",
        "IPv4 13.107.253.70 exploit_source \u2022 IPv4 13.107.226.70 malware_hosting",
        "https://wsps.ourschoolpages.com/Account/ForgotPasswor (typo",
        "https://hybrid-analysis.com/sample/529a0b900eef6657ce6c98b1b5bccebe6db2e021aa02a316b7eb2604df810d3f/69de30ef0a22c3b506077a8c",
        "www.fireeye.com",
        "danilovstyle.ru",
        "ns4-04.azure-dns.info",
        "ns4-04.azure-dns.info danilovst) ns4-04.azure-dns.info",
        "www.fireeye.com .",
        "https://hypic-anaivsis.com/sambrerb/a0p9veebo",
        "Are these table SolarWinds attackers? Using same tacktics, good? Unsure.",
        "Tulach\u2019s ASP.Net Open Source destruction"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Ransom:Win32/SodinokibiCrypt.SK!MTB",
          "display_name": "Ransom:Win32/SodinokibiCrypt.SK!MTB",
          "target": "/malware/Ransom:Win32/SodinokibiCrypt.SK!MTB"
        },
        {
          "id": "Win.Ransomware.Tofsee-10015002",
          "display_name": "Win.Ransomware.Tofsee-10015002",
          "target": null
        },
        {
          "id": "Trojan:Win32/Comisproc!gmb I",
          "display_name": "Trojan:Win32/Comisproc!gmb I",
          "target": "/malware/Trojan:Win32/Comisproc!gmb I"
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1132.001",
          "name": "Standard Encoding",
          "display_name": "T1132.001 - Standard Encoding"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 88,
        "FileHash-MD5": 211,
        "FileHash-SHA1": 186,
        "FileHash-SHA256": 1366,
        "URL": 1848,
        "domain": 418,
        "email": 4,
        "hostname": 622,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 4764,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "5 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ddeb45c45f6a3cd721397d",
      "name": "Active attacks  \u2022 Apple \u2022 Tulach",
      "description": "Including 360+ Apple\nIoC\u2019s from Malicious Tulac.cc + Virtual Servers Pulses. Ongoing history of malicious attacks, custom malware engineer, malicious media , account control. \n\nI was blocked from VirusToltal. It was Tulach Nextcloud posse. What I am doing now s legal. \n\nReferenced below. URL: \"https://accountapple.com/\" contacted related malicious domain: \"accountapple.com\"\nCONTACTED DOMAIN: \"sqllq.com\" has been identified as malicious",
      "modified": "2026-04-14T07:22:45.250000",
      "created": "2026-04-14T07:22:45.250000",
      "tags": [
        "url http",
        "ipv4",
        "indicator role",
        "active related",
        "united",
        "moved",
        "gmt content",
        "certificate",
        "all domain",
        "msie",
        "chrome",
        "extraction",
        "data upload",
        "twitter",
        "cookie",
        "extra",
        "include data",
        "review locs",
        "exclude",
        "suggested os",
        "onlv",
        "failed",
        "stop data",
        "read c",
        "unicode",
        "rgba",
        "memcommit",
        "delete",
        "dock",
        "write",
        "execution",
        "sc type",
        "extri",
        "include review",
        "exclude sugges",
        "typ data",
        "a domains",
        "present apr",
        "script urls",
        "files",
        "files ip",
        "address",
        "ios",
        "mac",
        "apple",
        "appleid",
        "itunes",
        "next associated",
        "all ipv4",
        "included ic",
        "uny teade",
        "type hostnar",
        "hostnar hostnar",
        "hostnar",
        "macair",
        "macairaustralia",
        "ipad",
        "ipod",
        "cryptexportkey",
        "invalid pointer",
        "cryptgenkey",
        "stream",
        "defender",
        "delphi",
        "class",
        "stack",
        "format",
        "unknown",
        "united states",
        "phishing",
        "password",
        "traffic redirected",
        "service mod",
        "service execution",
        "youtube",
        "music",
        "streams",
        "songs",
        "played songs",
        "music streams",
        "most played",
        "fonelab",
        "indicator",
        "included iocs",
        "manually add",
        "review ocs",
        "exclude inn",
        "sugges data",
        "find",
        "include",
        "url https",
        "enter sc",
        "type",
        "no matchme",
        "search otx",
        "https",
        "references x",
        "analyze",
        "open th",
        "url data",
        "se http",
        "no match",
        "excluded iocs",
        "iocs",
        "ip whitelisted",
        "whitelisted",
        "tcp include",
        "analysis date",
        "file score",
        "medium risk",
        "yara detections",
        "contacted",
        "related tags",
        "x vercel",
        "file type",
        "type indicator",
        "role title",
        "related pulses",
        "mulch virtua",
        "library loade",
        "included i0",
        "review ioc",
        "excluded ic",
        "suggested",
        "find sugt",
        "samuel tulach",
        "unity engine",
        "tulach",
        "sa awareness",
        "sabey",
        "sar cut",
        "autofill",
        "includer review",
        "portiana oney",
        "targeting",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "musickit_1_.js",
        "lazarus",
        "injection",
        "CVE-2017-8570",
        "prefetch2",
        "target",
        "aaaa",
        "ip address",
        "record value",
        "emails",
        "samuel tuachs",
        "sapev",
        "review exclude",
        "monitored target",
        "script",
        "mitre att",
        "ascii text",
        "span",
        "path",
        "iframe",
        "april",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "body",
        "development att",
        "t1055.012 list planting",
        "active"
      ],
      "references": [
        "https://trade.kraken.com/charts/KRAKEN:APT-USD>+y",
        "https://kraken.com/\\\\r\\\\nSet-Cookie:\t\u2022 https://www.kraken-okta.com/",
        "https://account.apple.com/accept-encoding \u2022 http://apple.santandercustomerusa.com/",
        "https://podcasts.apple.com/us/podcast/lazarus",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "http://help.aiseesoft.jp/blu-ray-player",
        "http://help.aiseesoft.jp/fonelab/",
        "https://action.aiseesoft.jp/itunes.php",
        "http://help.aiseesoft.jp/total-video-converter",
        "http://help.aiseesoft.jp/total-video-converter/",
        "http://help.aiseesoft.jp/video-converter-ultimate/",
        "http://mli.digitecgalaxus.ch http://test-id.digitecgalaxus.ch/",
        "http://sf.digitecgalaxus.ch  http://static.digitecgalaxus.ch",
        "http://test-firstmile.digitecgalaxus.ch",
        "https://druryhotels.kiosoft.com/auth/reset_password/50032174/1/YjM2Y2UyY2VlNmVlOGI0NjZmNmFkZTNhYzBjNGVhNmVlZWQwODZjMDU0Yjg5YWZlZmRlM2RjMDUyNWYyZTRiMGRkNDM1ZjllZDNjYTA4YWJkMDhkMDQxNTEwNjY0YWQ2NTYwM2MzOWFhYTI5NTJiY2UzNzkyYWM2NWJkMzJlYmRCd2c5bjNicFBJRkhRS3dKU0JOREJEMXNjTTlOa0t1K0tlUkd2OEVKUUxUN0g1SlFzc1NoaUVKZ0NFM2YvekVIM29yTGZCTWJHaDBsOE9uL0phNHhwUT09/",
        "No matchine recorde f\u0627\u0648\u0635\u064a\u0647[?]",
        "cdn.rss.applemarketingtools.com",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "1.bing.com.cn",
        "www.akopde.dns-dynamic.net  Hostname www.est.net.google.com.bing.com.yahoo.com.pubgmobile.dns-dynamic.net  Hostname www.jhoexii.dns-dynamic.net",
        "www.phantomcameras.cn",
        "https://podcasts.apple.com/us/podcast/lazarus-rising-with-misha-collins-s4ep1/id1605385289?i=1000614835179\"",
        "podcasts.apple.com \u2022 23.34.32.21",
        "www.apple.com \u2022 23.34.32.199",
        "js-cdn.music.apple.com \u2022 23.78.51.170",
        "http://firstmile.digitecgalaxus.ch",
        "Tulach Virtual Servers https://otx.alienvault.com/pulse/69d9b0e549af1aae2975ebeb",
        "Library Loader \u2022 Tulach https://otx.alienvault.com/pulse/69d8a665177b8f64c7ce5fca",
        "Tulach.cc",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "www.youtube.com/watch?v=GyuMozsVyYs  (targets song / channel be controlled by Tulach) \u2018song about SA awareness\u2019",
        "https://rss.applemarketingtools.com/api/v2/jp/music/most-played/100/songs.json",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290 cdn777.pussyporn.pro \u2022 https://tubepornstars.co/ \u2022 porneramix.xyz porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop https://api.w.org/ \u2022 api.w.org remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-as",
        "Samuel Tulach\u2019s assets connected to M. Brian Sabey, Esq + malicious media + quasi government + State & DGA domains",
        "asp.net domain pointer",
        "developer.x.com",
        "aotx.alienvault.com (aotx.?)",
        "https://otx.alienvault.com/indicator/url/http://asp.net/ApplicationServices/v200/AuthenticationService/LogoutResponseh",
        "https://hybrid-analysis.com/sample/3257a36fae4c3bd3c47b1c37604ff3e30ff75fffd4c07bc52bcfe3ecb189371f"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1020.001",
          "name": "Traffic Duplication",
          "display_name": "T1020.001 - Traffic Duplication"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591.002",
          "name": "Business Relationships",
          "display_name": "T1591.002 - Business Relationships"
        },
        {
          "id": "T1591.001",
          "name": "Determine Physical Locations",
          "display_name": "T1591.001 - Determine Physical Locations"
        },
        {
          "id": "T1585.001",
          "name": "Social Media Accounts",
          "display_name": "T1585.001 - Social Media Accounts"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1029,
        "domain": 396,
        "email": 7,
        "URL": 2784,
        "FileHash-SHA256": 898,
        "FileHash-MD5": 79,
        "FileHash-SHA1": 68,
        "IPv4": 35,
        "CVE": 1,
        "SSLCertFingerprint": 13
      },
      "indicator_count": 5310,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "5 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d586108786e7be59439809",
      "name": "Bot.io",
      "description": "",
      "modified": "2026-04-07T22:32:48.996000",
      "created": "2026-04-07T22:32:48.996000",
      "tags": [
        "added active",
        "related pulses",
        "found",
        "zergeca botnet",
        "zergeca",
        "upx packer",
        "khtml",
        "gecko",
        "united",
        "ids detections",
        "yara detections",
        "https domain",
        "tls sni",
        "ip lookup",
        "external ip",
        "malware",
        "encrypt",
        "techniques",
        "modify system",
        "process",
        "https",
        "performs dns",
        "tls version",
        "reads cpu",
        "proc indicative",
        "urls",
        "downloads",
        "persistence",
        "data upload",
        "extraction",
        "find s",
        "failed",
        "typ don",
        "ipv4 url",
        "canreb",
        "type ipv4",
        "url domail",
        "domail showing",
        "elf conta",
        "typ url",
        "zercega",
        "enter sc",
        "type",
        "include",
        "review",
        "n1 exclude",
        "suggestedincc",
        "a50 typ",
        "ipv4",
        "matches yara",
        "dete data",
        "yara detectea",
        "cro intormation",
        "exclude sugges",
        "sc car",
        "extra lte",
        "referen",
        "l extraction",
        "droo anv",
        "extr referen",
        "lte all",
        "je matches",
        "yara detel",
        "yara dete",
        "include review",
        "exchange lte",
        "je elf",
        "passive dns",
        "certificate",
        "files",
        "trojan",
        "related tags",
        "worm",
        "medium",
        "write c",
        "write",
        "high",
        "binary",
        "yara rule",
        "default",
        "moved",
        "schaan",
        "as834 ipxo",
        "dynamicloader",
        "program",
        "ee fc",
        "users",
        "ff d5",
        "python",
        "windows",
        "autoit",
        "confuserex",
        "stream",
        "guard",
        "launcher",
        "updater",
        "global",
        "america flag",
        "ashburn",
        "america related",
        "tags",
        "indicator facts",
        "historical otx",
        "controller fake",
        "akamai rank",
        "russia",
        "present nov",
        "aaaa",
        "link",
        "a domains",
        "ip address",
        "meta",
        "cve -2014-2321",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "pa status",
        "whois server",
        "included iocs",
        "manually add",
        "iocs o",
        "iocs",
        "sugges",
        "stop show",
        "types",
        "external",
        "ripe",
        "pa abusec",
        "neterra",
        "sofia",
        "bulgaria phone",
        "filtered person",
        "neven dilkov",
        "bg phone",
        "filtered route",
        "a5ip",
        "aa2023",
        "aamirai",
        "a2scanner",
        "apple inc",
        "issuer",
        "valid",
        "algorit",
        "thum",
        "name",
        "a9 a8",
        "status",
        "macho",
        "macho 64bit",
        "mac os",
        "x macho",
        "intel",
        "typ no",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "date",
        "name servers",
        "arial",
        "error",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "contacted",
        "MacSync_AppleScript_Stealer",
        "cve-2018-10562",
        "source",
        "roboto",
        "robotodraft",
        "helvetica",
        "iframe",
        "manually ada",
        "review iocs",
        "abv0",
        "qaeaav0",
        "cptbdev",
        "w4uninitialized",
        "qaeaav01",
        "abv01",
        "qaexn",
        "qbenxz",
        "phoneidentify",
        "qbepaxxz"
      ],
      "references": [
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "Zercega \u2022 IPv4 84.54.51.82",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "Zercega \u2022  multi-user.target",
        "Zercega \u2022  ootheca.pw",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "Crowdsourced IDS rules:",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "Yara detected: Xmrig cryptocurrency miner",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "meta.com \u2022 meta.com.apple",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "http://www.bing.lt/search?q=",
        "Win.Malware.Salat-10058846-0",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Zergeca",
          "display_name": "Zergeca",
          "target": null
        },
        {
          "id": "AutoIT",
          "display_name": "AutoIT",
          "target": null
        },
        {
          "id": "Win.Malware.Salat-10058846-0",
          "display_name": "Win.Malware.Salat-10058846-0",
          "target": null
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
        },
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2024-6387",
          "display_name": "CVE-2024-6387",
          "target": null
        },
        {
          "id": "CVE-2025-20393",
          "display_name": "CVE-2025-20393",
          "target": null
        },
        {
          "id": "CVE-2014-2321",
          "display_name": "CVE-2014-2321",
          "target": null
        },
        {
          "id": "Botnet",
          "display_name": "Botnet",
          "target": null
        },
        {
          "id": "CVE-2018-10562",
          "display_name": "CVE-2018-10562",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1543.002",
          "name": "Systemd Service",
          "display_name": "T1543.002 - Systemd Service"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1037.002",
          "name": "Logon Script (Mac)",
          "display_name": "T1037.002 - Logon Script (Mac)"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "69d5859750dfad7fe7989ef4",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 169,
        "URL": 1871,
        "domain": 393,
        "hostname": 925,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 390,
        "FileHash-SHA256": 2452,
        "CVE": 1,
        "SSLCertFingerprint": 1,
        "IPv6": 9,
        "email": 4,
        "CIDR": 1
      },
      "indicator_count": 6607,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "12 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d5859750dfad7fe7989ef4",
      "name": "Apple / Cloud/ Data Network within Zergeca / Zerg Botnet \u2022 MacSync_AppleScript_Stealer",
      "description": "",
      "modified": "2026-04-07T22:30:47.312000",
      "created": "2026-04-07T22:30:47.312000",
      "tags": [
        "added active",
        "related pulses",
        "found",
        "zergeca botnet",
        "zergeca",
        "upx packer",
        "khtml",
        "gecko",
        "united",
        "ids detections",
        "yara detections",
        "https domain",
        "tls sni",
        "ip lookup",
        "external ip",
        "malware",
        "encrypt",
        "techniques",
        "modify system",
        "process",
        "https",
        "performs dns",
        "tls version",
        "reads cpu",
        "proc indicative",
        "urls",
        "downloads",
        "persistence",
        "data upload",
        "extraction",
        "find s",
        "failed",
        "typ don",
        "ipv4 url",
        "canreb",
        "type ipv4",
        "url domail",
        "domail showing",
        "elf conta",
        "typ url",
        "zercega",
        "enter sc",
        "type",
        "include",
        "review",
        "n1 exclude",
        "suggestedincc",
        "a50 typ",
        "ipv4",
        "matches yara",
        "dete data",
        "yara detectea",
        "cro intormation",
        "exclude sugges",
        "sc car",
        "extra lte",
        "referen",
        "l extraction",
        "droo anv",
        "extr referen",
        "lte all",
        "je matches",
        "yara detel",
        "yara dete",
        "include review",
        "exchange lte",
        "je elf",
        "passive dns",
        "certificate",
        "files",
        "trojan",
        "related tags",
        "worm",
        "medium",
        "write c",
        "write",
        "high",
        "binary",
        "yara rule",
        "default",
        "moved",
        "schaan",
        "as834 ipxo",
        "dynamicloader",
        "program",
        "ee fc",
        "users",
        "ff d5",
        "python",
        "windows",
        "autoit",
        "confuserex",
        "stream",
        "guard",
        "launcher",
        "updater",
        "global",
        "america flag",
        "ashburn",
        "america related",
        "tags",
        "indicator facts",
        "historical otx",
        "controller fake",
        "akamai rank",
        "russia",
        "present nov",
        "aaaa",
        "link",
        "a domains",
        "ip address",
        "meta",
        "cve -2014-2321",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "pa status",
        "whois server",
        "included iocs",
        "manually add",
        "iocs o",
        "iocs",
        "sugges",
        "stop show",
        "types",
        "external",
        "ripe",
        "pa abusec",
        "neterra",
        "sofia",
        "bulgaria phone",
        "filtered person",
        "neven dilkov",
        "bg phone",
        "filtered route",
        "a5ip",
        "aa2023",
        "aamirai",
        "a2scanner",
        "apple inc",
        "issuer",
        "valid",
        "algorit",
        "thum",
        "name",
        "a9 a8",
        "status",
        "macho",
        "macho 64bit",
        "mac os",
        "x macho",
        "intel",
        "typ no",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "date",
        "name servers",
        "arial",
        "error",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "contacted",
        "MacSync_AppleScript_Stealer",
        "cve-2018-10562",
        "source",
        "roboto",
        "robotodraft",
        "helvetica",
        "iframe",
        "manually ada",
        "review iocs",
        "abv0",
        "qaeaav0",
        "cptbdev",
        "w4uninitialized",
        "qaeaav01",
        "abv01",
        "qaexn",
        "qbenxz",
        "phoneidentify",
        "qbepaxxz"
      ],
      "references": [
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "Zercega \u2022 IPv4 84.54.51.82",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "Zercega \u2022  multi-user.target",
        "Zercega \u2022  ootheca.pw",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "Crowdsourced IDS rules:",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "Yara detected: Xmrig cryptocurrency miner",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "meta.com \u2022 meta.com.apple",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "http://www.bing.lt/search?q=",
        "Win.Malware.Salat-10058846-0",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Zergeca",
          "display_name": "Zergeca",
          "target": null
        },
        {
          "id": "AutoIT",
          "display_name": "AutoIT",
          "target": null
        },
        {
          "id": "Win.Malware.Salat-10058846-0",
          "display_name": "Win.Malware.Salat-10058846-0",
          "target": null
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
        },
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2024-6387",
          "display_name": "CVE-2024-6387",
          "target": null
        },
        {
          "id": "CVE-2025-20393",
          "display_name": "CVE-2025-20393",
          "target": null
        },
        {
          "id": "CVE-2014-2321",
          "display_name": "CVE-2014-2321",
          "target": null
        },
        {
          "id": "Botnet",
          "display_name": "Botnet",
          "target": null
        },
        {
          "id": "CVE-2018-10562",
          "display_name": "CVE-2018-10562",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1543.002",
          "name": "Systemd Service",
          "display_name": "T1543.002 - Systemd Service"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1037.002",
          "name": "Logon Script (Mac)",
          "display_name": "T1037.002 - Logon Script (Mac)"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 169,
        "URL": 1871,
        "domain": 393,
        "hostname": 925,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 390,
        "FileHash-SHA256": 2452,
        "CVE": 1,
        "SSLCertFingerprint": 1,
        "IPv6": 9,
        "email": 4,
        "CIDR": 1
      },
      "indicator_count": 6607,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "12 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "699c6ef61298b57cd7275728",
      "name": "Apple Support IOC\u2019s IcedID | Bloored |  Mydoom worm | iOS IOC\u2019s",
      "description": "A list of Apple and Apple related iOS\u2019s linked to a malicious redirect found in an apple.support.com redirect. Two separate Apple ID\u2019s on one iPhone. | Mimecast compromised with Emotet. iCloud siphoning. Related to Pulse  found in references. |  IOC\u2019s came from a single url.",
      "modified": "2026-03-25T07:05:10.628000",
      "created": "2026-02-23T15:15:02.857000",
      "tags": [
        "ipv4",
        "http",
        "passive dns",
        "files domain",
        "united",
        "unknown ns",
        "for privacy",
        "ip address",
        "domain",
        "dynamicloader",
        "antivirus",
        "yara rule",
        "fe ff",
        "write c",
        "msvisualcpp60",
        "rsds",
        "e8 c8",
        "e8 a8",
        "ff e1",
        "unknown",
        "worm",
        "launch",
        "write",
        "explorer",
        "february",
        "push",
        "service",
        "files",
        "reverse dns",
        "america flag",
        "america asn",
        "url add",
        "otx logo",
        "all ipv4",
        "searc",
        "date checked",
        "server response",
        "results dec",
        "unknown soa",
        "present aug",
        "present oct",
        "present sep",
        "present nov",
        "moved",
        "error",
        "title",
        "win32mydoom feb",
        "aaaa",
        "name servers",
        "trojan",
        "servers",
        "virtool",
        "united states",
        "apple",
        "crlf line",
        "unicode text",
        "utf8",
        "ff d5",
        "ascii text",
        "ee fc",
        "suspicious",
        "music",
        "malware",
        "role title",
        "ttl value",
        ".cc",
        "d4 f5",
        "msvisualcpp2002",
        "msvisualcpp2005",
        "apple support",
        ".ch",
        "privaterelay",
        "pattern match",
        "ck id",
        "mitre att",
        "ck matrix",
        "href",
        "et info",
        "general",
        "local",
        "path",
        "click",
        "learn",
        "command",
        "name tactics",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "present jun",
        "backdoor",
        "present may",
        "status",
        "ransom",
        "high",
        "medium",
        "windows",
        "tofsee",
        "loaderid",
        "lidfileupd",
        "localcfg",
        "rndhex",
        "stream",
        "delete",
        "emotet",
        "bot network",
        "mitm",
        "screenshot",
        "mimecast"
      ],
      "references": [
        "http://apple.support.com/ht***** redirect",
        "https://otx.alienvault.com/pulse/699b907c5375efb7ce1639b8",
        "mac.store",
        "https://icloud.ch/cn/ipod-touch/",
        "https://icloud.ch/",
        "https://multicash.smbcgroup.com/gb/App/Authentication/Challenge",
        "https://uatapp.pacificcross.com.ph/Oqapv2uatRedirect/",
        "Redirect: schemas.microsoft.com",
        "apple.com(-inc.cc)",
        "oas-japac-domains-applecomputer.cn",
        "robert-aebi.appleid.com",
        "smtp2.icl-privaterelay.appleid.com",
        "http://audaxgroup.appleid.com/",
        "https://otx.alienvault.com/indicator/url/http://ipodtouch.co/?cid=oas-japac-domains-applecomputer.com.cn/ing/product+validatie.php",
        "iphonegermany.com",
        "api.mr-2538.dev-phoenix.diagnostics.si.siemens.cloud",
        "https://aspmx.l.google.com/",
        "api.us-1.a.mimecastprotect.com  l.uk-1.a.mimecastprotect.com",
        "de-smtp-inbound-1.mimecast.com  de-smtp-inbound-2.mimecast.com",
        "http://www.icloud-sms-alert.com/",
        "monitoring.eurovision.net",
        "https://www.irby.com/iub-en/services/testing-and-monitoring",
        "monitor.kyos.ninja"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/IcedId.DI!MTB",
          "display_name": "Trojan:Win32/IcedId.DI!MTB",
          "target": "/malware/Trojan:Win32/IcedId.DI!MTB"
        },
        {
          "id": "MyDoom",
          "display_name": "MyDoom",
          "target": null
        },
        {
          "id": "Worm:Win32/Bloored",
          "display_name": "Worm:Win32/Bloored",
          "target": "/malware/Worm:Win32/Bloored"
        },
        {
          "id": "Win.Malware.Elenooka-6996044-0",
          "display_name": "Win.Malware.Elenooka-6996044-0",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6031,
        "hostname": 1971,
        "domain": 1125,
        "FileHash-SHA256": 1715,
        "email": 18,
        "FileHash-MD5": 317,
        "FileHash-SHA1": 164
      },
      "indicator_count": 11341,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "25 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68a23eef53f1124e8dc273fc",
      "name": "Sign in to your account - Anorocuriv",
      "description": "Short link sent to an iPhone user possibly by accident or maybe not. Unraveled :[https://ns4.whichkill.net/]\n[https://l.us-1.a.mimecastprotect.com/l]\n[https://api-glintstage.glintinc.com/api/client/tiaa/token/saml2/consume/includeDeskLink]\n\n[https://api.glintinc.com/api/client/tiaa/token/saml2/consume/includeDeskLink]\t\n\n*api.us1.glintinc.com #malta\n*ALF:Trojan:Win32/Anorocuriv.A.#virtool #LowFI:HookwowLow \n#tracking #tiaa #locate recording #userpics #movies #audio #screen #mobile_assets #https://biccerija.gov.mt/en/contact/",
      "modified": "2025-09-16T20:00:00.565000",
      "created": "2025-08-17T20:43:27.502000",
      "tags": [
        "url http",
        "url https",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "entries",
        "status",
        "msie",
        "chrome",
        "passive dns",
        "urls",
        "date",
        "pulse pulses",
        "files",
        "domain",
        "files ip",
        "body",
        "http",
        "hostname",
        "files domain",
        "present jan",
        "present dec",
        "united",
        "present aug",
        "present jun",
        "unknown aaaa",
        "present mar",
        "present may",
        "present feb",
        "present jul",
        "error",
        "a domains",
        "gmt content",
        "accept encoding",
        "config nocache",
        "hostname add",
        "pulse submit",
        "content type",
        "certificate",
        "ip address",
        "cookie",
        "mita",
        "next associated",
        "please",
        "x msedge",
        "ipv4 add",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "signing defense",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "pattern match",
        "mitre att",
        "ascii text",
        "null",
        "click",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "strings",
        "refresh",
        "tools",
        "meta",
        "onload",
        "span",
        "adversaries",
        "ssl certificate",
        "logo",
        "av detection",
        "default browser",
        "guest system",
        "professional",
        "falcon sandbox",
        "response risk",
        "ck techniques",
        "detection",
        "show process",
        "prefetch8",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "post collect",
        "microsoft edge",
        "nota",
        "brand",
        "class",
        "facebook",
        "ascii",
        "hex dump",
        "extraction",
        "failed",
        "data upload",
        "pul data",
        "enter",
        "s data",
        "type",
        "extr error",
        "href",
        "mask",
        "extra",
        "uta support",
        "include review",
        "exclude sugges",
        "find",
        "wow64",
        "show",
        "observed dns",
        "query",
        "unknown",
        "virtool",
        "copy",
        "write",
        "defender",
        "expiro",
        "malware",
        "next",
        "lowfi",
        "hookwowlow dec",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "trojan",
        "trojandropper",
        "http request",
        "delete",
        "yara detections",
        "pe exe",
        "dll windows",
        "minimal http",
        "february",
        "guard",
        "alerts",
        "analysis date",
        "file score",
        "detections alf",
        "detections http",
        "http executable",
        "retrieved",
        "location united",
        "america flag",
        "america asn",
        "urls show",
        "date checked",
        "url hostname",
        "server response"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 853,
        "hostname": 1835,
        "URL": 7127,
        "email": 3,
        "FileHash-SHA256": 1470,
        "FileHash-MD5": 293,
        "FileHash-SHA1": 284,
        "SSLCertFingerprint": 426,
        "CVE": 1
      },
      "indicator_count": 12292,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "215 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ftp.regapp8.net",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ftp.regapp8.net",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641622.5750382
}