{
  "type": "URL",
  "indicator": "https://g.a.call/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://g.a.call/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3857667515,
      "indicator": "https://g.a.call/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 13,
      "pulses": [
        {
          "id": "693cdc5b8ebc10664439c2fb",
          "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - Freeman Mathis & Gary for The State of Colorado",
          "description": "State of Colorado attackers use  DGA domains set up multiple Law Firms.. Christopher P.  \u2019Buzz\u2019  Ahmann  Is a legal consultant / attorney./ hacker \nWorks for the State of Colorado/ quasi. Is malicious and doesn\u2019t work alone. Continues to target \nState had relative contacted by a fake entity \u2018Goodness Health\u2019\nLeft vague VM for relative message \u201cWe work on the Medicare side of things.\u201d and? \nSocial engineering call , malicious domain. The State of Colorado has been on a relentless pursuit against target. Fully compromised targets relatives brand new phone. Hacked target since 10/2013.\nMultiple cyber and physical attacks carried out  against target and family members.. There are attacks make  to look like accidents or malfunctions. This harmful, silencing behavior is somehow illegal for anyone else.",
          "modified": "2026-02-10T06:05:39.764000",
          "created": "2025-12-13T03:24:11.414000",
          "tags": [
            "colorado state",
            "freeman mathis",
            "history",
            "cyber risk",
            "aspen insureds",
            "gaig insureds",
            "landy insureds",
            "nip group",
            "purm insureds",
            "overview core",
            "united",
            "ip address",
            "present nov",
            "present may",
            "moved",
            "encrypt",
            "unknown",
            "backdoor",
            "passive dns",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "twitter",
            "trojan",
            "data upload",
            "extraction",
            "failed",
            "united states",
            "server response",
            "google safe",
            "results may",
            "lowfi",
            "virtool",
            "mtb alf",
            "mh alf",
            "port",
            "windows nt",
            "destination",
            "msie",
            "khtml",
            "gecko",
            "unknown aaaa",
            "a domains",
            "meta",
            "for privacy",
            "cop supply",
            "urls",
            "as139646 hong",
            "hostname",
            "files",
            "hong kong",
            "domain add",
            "ip related",
            "hash avast",
            "avg clamav",
            "msdefender may",
            "ddos",
            "as13335",
            "ipv4",
            "certificate",
            "hostname add",
            "url analysis",
            "files ip",
            "name strings",
            "category",
            "united states",
            "pulse indicator",
            "address",
            "error",
            "null",
            "object",
            "string",
            "number",
            "google maps",
            "promise",
            "javascript api",
            "dataset",
            "bigint",
            "dark",
            "android",
            "infinity",
            "internal",
            "roboto",
            "trident",
            "void",
            "small",
            "lightrail",
            "false",
            "span",
            "close",
            "light",
            "hybrid",
            "embed",
            "iframe",
            "keygen",
            "this",
            "february",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "present dec",
            "pulses otx",
            "aaaa",
            "asnone country",
            "record value",
            "title",
            "pulse pulses",
            "pulses",
            "showing",
            "unknown cname",
            "unknown soa",
            "next associated",
            "ipv4 add",
            "cycbot",
            "extract indic",
            "sneaker bots",
            "proxies data",
            "script script",
            "adult content",
            "nextimage",
            "porn site",
            "div div",
            "platform make",
            "cloudfront x",
            "hio52 p3",
            "unknown ns",
            "pulse submit",
            "title error",
            "reverse dns",
            "status",
            "servers",
            "name servers",
            "vashti hostname",
            "scan endpoints",
            "url http",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "dnssec",
            "sec ch",
            "ch ua",
            "ua full",
            "ua platform",
            "ua bitness",
            "ua arch",
            "version sec",
            "mobile sec",
            "model sec",
            "version list",
            "domain",
            "emails",
            "cookie",
            "url https",
            "show",
            "filehash",
            "urls show",
            "date checked",
            "url hostname",
            "results nov",
            "win32",
            "type",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "defense evasion",
            "spawns",
            "flag",
            "llc name",
            "server",
            "markmonitor",
            "name server",
            "windir",
            "openurl c",
            "prefetch2",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "sha1",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "germany unknown",
            "date",
            "registrar",
            "ip whois",
            "dynamicloader",
            "high",
            "medium",
            "search",
            "displayname",
            "tofsee",
            "win64",
            "write",
            "stream",
            "malware",
            "push",
            "entries",
            "tls handshake",
            "failure",
            "forbidden",
            "tlsv1",
            "april",
            "next",
            "write c",
            "intel",
            "ms windows",
            "sha1 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "sha256 add",
            "present jun",
            "present mar",
            "medelln",
            "colombia asn",
            "dns resolutions",
            "address domain",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "present sep",
            "present aug",
            "as54113",
            "present jul",
            "as8068",
            "gmt content",
            "total",
            "read",
            "delete",
            "top source",
            "quasi",
            "murderers",
            "christopher ahmann",
            "buzz ahmann",
            "wow64",
            "slcc2",
            "media center",
            "labor",
            "employment",
            "cdle",
            "dowc",
            "colorado",
            "workers",
            "coloradoif",
            "independent",
            "state",
            "company",
            "entity type",
            "authorized line",
            "analysis",
            "tor analysis",
            "process details",
            "network traffic",
            "t1071",
            "potential ip",
            "click",
            "found",
            "t1480 execution",
            "bad traffic",
            "et info",
            "ck techniques",
            "evasion att",
            "t1057",
            "refresh",
            "body",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "cname",
            "form",
            "pulse",
            "script domains",
            "script urls",
            "administrator",
            "services llc",
            "dns admin",
            "domain admin",
            "global llc",
            "domain manager",
            "computer system",
            "ltd domain",
            "network",
            "alibaba",
            "facebook",
            "phishme",
            "sogou",
            "present jan",
            "present feb",
            "present oct"
          ],
          "references": [
            "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
            "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
            "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
            "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
            "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
            "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
            "https://maps.googleapis.com/maps/api/js?sensor=false",
            "cell-0.af-south-1.prod.telemetry.console.api.aws",
            "howtoworkacrickoutofyourneck2.pages.dev",
            "firebase-auth-eich0v.pages.dev",
            "http://ianswertomom.com/develop-wise-woman-within-yourself",
            "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
            "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
            "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
            "https://khmerpornvideo.signup0.y.id/",
            "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
            "https://clear.ml/infrastructure-control-plane",
            "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
            "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
            "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
            "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
            "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
            "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
            "Legal court documented  agreement to allow and pay target to hire cyber investigators",
            "Attacks are being carried out by The State of Colorado"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "France",
            "Ireland",
            "Spain",
            "Italy",
            "Aruba",
            "Australia",
            "Denmark",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "T\u00fcrkiye",
            "Indonesia"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.GravityRAT-6511862-0",
              "display_name": "Win.Trojan.GravityRAT-6511862-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Systex.A",
              "display_name": "TrojanDropper:Win32/Systex.A",
              "target": "/malware/TrojanDropper:Win32/Systex.A"
            },
            {
              "id": "Win.Trojan.Tepfer-61",
              "display_name": "Win.Trojan.Tepfer-61",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.gen!MH",
              "display_name": "VirTool:Win32/VBInject.gen!MH",
              "target": "/malware/VirTool:Win32/VBInject.gen!MH"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "#LOWFI:HSTR:Criakl.B1",
              "display_name": "#LOWFI:HSTR:Criakl.B1",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Arwobot.B",
              "display_name": "Backdoor:Win32/Arwobot.B",
              "target": "/malware/Backdoor:Win32/Arwobot.B"
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Win.Downloader.Small-4507",
              "display_name": "Win.Downloader.Small-4507",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Win.Malware.Mikey-9949492-0",
              "display_name": "Win.Malware.Mikey-9949492-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981154-0",
              "display_name": "Unix.Trojan.Gafgyt-6981154-0",
              "target": null
            },
            {
              "id": "DDOS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-11882",
              "display_name": "CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Worm",
              "display_name": "Worm",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1574.008",
              "name": "Path Interception by Search Order Hijacking",
              "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1593.002",
              "name": "Search Engines",
              "display_name": "T1593.002 - Search Engines"
            }
          ],
          "industries": [
            "Insurance",
            "Construction"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 54118,
            "domain": 11153,
            "hostname": 18578,
            "email": 21,
            "FileHash-SHA256": 4905,
            "FileHash-MD5": 548,
            "FileHash-SHA1": 534,
            "CVE": 7,
            "SSLCertFingerprint": 20,
            "CIDR": 1
          },
          "indicator_count": 89885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "68 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6963596c4cd594b77b4675ec",
          "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - PalantirFoundry | The State of Colorado | ",
          "description": "",
          "modified": "2026-02-10T06:05:39.764000",
          "created": "2026-01-11T08:03:56.534000",
          "tags": [
            "colorado state",
            "freeman mathis",
            "history",
            "cyber risk",
            "aspen insureds",
            "gaig insureds",
            "landy insureds",
            "nip group",
            "purm insureds",
            "overview core",
            "united",
            "ip address",
            "present nov",
            "present may",
            "moved",
            "encrypt",
            "unknown",
            "backdoor",
            "passive dns",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "twitter",
            "trojan",
            "data upload",
            "extraction",
            "failed",
            "united states",
            "server response",
            "google safe",
            "results may",
            "lowfi",
            "virtool",
            "mtb alf",
            "mh alf",
            "port",
            "windows nt",
            "destination",
            "msie",
            "khtml",
            "gecko",
            "unknown aaaa",
            "a domains",
            "meta",
            "for privacy",
            "cop supply",
            "urls",
            "as139646 hong",
            "hostname",
            "files",
            "hong kong",
            "domain add",
            "ip related",
            "hash avast",
            "avg clamav",
            "msdefender may",
            "ddos",
            "as13335",
            "ipv4",
            "certificate",
            "hostname add",
            "url analysis",
            "files ip",
            "name strings",
            "category",
            "united states",
            "pulse indicator",
            "address",
            "error",
            "null",
            "object",
            "string",
            "number",
            "google maps",
            "promise",
            "javascript api",
            "dataset",
            "bigint",
            "dark",
            "android",
            "infinity",
            "internal",
            "roboto",
            "trident",
            "void",
            "small",
            "lightrail",
            "false",
            "span",
            "close",
            "light",
            "hybrid",
            "embed",
            "iframe",
            "keygen",
            "this",
            "february",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "present dec",
            "pulses otx",
            "aaaa",
            "asnone country",
            "record value",
            "title",
            "pulse pulses",
            "pulses",
            "showing",
            "unknown cname",
            "unknown soa",
            "next associated",
            "ipv4 add",
            "cycbot",
            "extract indic",
            "sneaker bots",
            "proxies data",
            "script script",
            "adult content",
            "nextimage",
            "porn site",
            "div div",
            "platform make",
            "cloudfront x",
            "hio52 p3",
            "unknown ns",
            "pulse submit",
            "title error",
            "reverse dns",
            "status",
            "servers",
            "name servers",
            "vashti hostname",
            "scan endpoints",
            "url http",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "dnssec",
            "sec ch",
            "ch ua",
            "ua full",
            "ua platform",
            "ua bitness",
            "ua arch",
            "version sec",
            "mobile sec",
            "model sec",
            "version list",
            "domain",
            "emails",
            "cookie",
            "url https",
            "show",
            "filehash",
            "urls show",
            "date checked",
            "url hostname",
            "results nov",
            "win32",
            "type",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "defense evasion",
            "spawns",
            "flag",
            "llc name",
            "server",
            "markmonitor",
            "name server",
            "windir",
            "openurl c",
            "prefetch2",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "ascii text",
            "sha1",
            "href",
            "show process",
            "file",
            "general",
            "local",
            "path",
            "germany unknown",
            "date",
            "registrar",
            "ip whois",
            "dynamicloader",
            "high",
            "medium",
            "search",
            "displayname",
            "tofsee",
            "win64",
            "write",
            "stream",
            "malware",
            "push",
            "entries",
            "tls handshake",
            "failure",
            "forbidden",
            "tlsv1",
            "april",
            "next",
            "write c",
            "intel",
            "ms windows",
            "sha1 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "sha256 add",
            "present jun",
            "present mar",
            "medelln",
            "colombia asn",
            "dns resolutions",
            "address domain",
            "related tags",
            "none google",
            "safe browsing",
            "external",
            "present sep",
            "present aug",
            "as54113",
            "present jul",
            "as8068",
            "gmt content",
            "total",
            "read",
            "delete",
            "top source",
            "quasi",
            "murderers",
            "christopher ahmann",
            "buzz ahmann",
            "wow64",
            "slcc2",
            "media center",
            "labor",
            "employment",
            "cdle",
            "dowc",
            "colorado",
            "workers",
            "coloradoif",
            "independent",
            "state",
            "company",
            "entity type",
            "authorized line",
            "analysis",
            "tor analysis",
            "process details",
            "network traffic",
            "t1071",
            "potential ip",
            "click",
            "found",
            "t1480 execution",
            "bad traffic",
            "et info",
            "ck techniques",
            "evasion att",
            "t1057",
            "refresh",
            "body",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "cname",
            "form",
            "pulse",
            "script domains",
            "script urls",
            "administrator",
            "services llc",
            "dns admin",
            "domain admin",
            "global llc",
            "domain manager",
            "computer system",
            "ltd domain",
            "network",
            "alibaba",
            "facebook",
            "phishme",
            "sogou",
            "present jan",
            "present feb",
            "present oct"
          ],
          "references": [
            "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
            "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
            "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
            "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
            "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
            "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
            "https://maps.googleapis.com/maps/api/js?sensor=false",
            "cell-0.af-south-1.prod.telemetry.console.api.aws",
            "howtoworkacrickoutofyourneck2.pages.dev",
            "firebase-auth-eich0v.pages.dev",
            "http://ianswertomom.com/develop-wise-woman-within-yourself",
            "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
            "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
            "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
            "https://khmerpornvideo.signup0.y.id/",
            "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
            "https://clear.ml/infrastructure-control-plane",
            "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
            "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
            "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
            "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
            "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
            "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
            "Legal court documented  agreement to allow and pay target to hire cyber investigators",
            "Attacks are being carried out by The State of Colorado"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "France",
            "Ireland",
            "Spain",
            "Italy",
            "Aruba",
            "Australia",
            "Denmark",
            "United Kingdom of Great Britain and Northern Ireland",
            "Germany",
            "T\u00fcrkiye",
            "Indonesia"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.GravityRAT-6511862-0",
              "display_name": "Win.Trojan.GravityRAT-6511862-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Systex.A",
              "display_name": "TrojanDropper:Win32/Systex.A",
              "target": "/malware/TrojanDropper:Win32/Systex.A"
            },
            {
              "id": "Win.Trojan.Tepfer-61",
              "display_name": "Win.Trojan.Tepfer-61",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
              "target": null
            },
            {
              "id": "VirTool:Win32/VBInject.gen!MH",
              "display_name": "VirTool:Win32/VBInject.gen!MH",
              "target": "/malware/VirTool:Win32/VBInject.gen!MH"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "#LOWFI:HSTR:Criakl.B1",
              "display_name": "#LOWFI:HSTR:Criakl.B1",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Arwobot.B",
              "display_name": "Backdoor:Win32/Arwobot.B",
              "target": "/malware/Backdoor:Win32/Arwobot.B"
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Win.Downloader.Small-4507",
              "display_name": "Win.Downloader.Small-4507",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Win.Malware.Mikey-9949492-0",
              "display_name": "Win.Malware.Mikey-9949492-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981154-0",
              "display_name": "Unix.Trojan.Gafgyt-6981154-0",
              "target": null
            },
            {
              "id": "DDOS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-11882",
              "display_name": "CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            },
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Worm",
              "display_name": "Worm",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1574.008",
              "name": "Path Interception by Search Order Hijacking",
              "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1593.002",
              "name": "Search Engines",
              "display_name": "T1593.002 - Search Engines"
            }
          ],
          "industries": [
            "Insurance",
            "Construction"
          ],
          "TLP": "green",
          "cloned_from": "693cdc5b8ebc10664439c2fb",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 54118,
            "domain": 11153,
            "hostname": 18578,
            "email": 21,
            "FileHash-SHA256": 4905,
            "FileHash-MD5": 548,
            "FileHash-SHA1": 534,
            "CVE": 7,
            "SSLCertFingerprint": 20,
            "CIDR": 1
          },
          "indicator_count": 89885,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "68 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c954a80675ccc89b0e9b63",
          "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
          "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
          "modified": "2025-10-16T12:03:14.279000",
          "created": "2025-09-16T12:14:32.327000",
          "tags": [
            "ttl value",
            "extraction",
            "data upload",
            "failed",
            "extra data",
            "include review",
            "exclude sugges",
            "stop",
            "line",
            "path",
            "polyline",
            "getprocaddress",
            "circle",
            "span",
            "ck id",
            "mitre att",
            "ck matrix",
            "null",
            "error",
            "open",
            "spinner",
            "title",
            "code",
            "iframe",
            "window",
            "void",
            "infinity",
            "crypto",
            "footer",
            "generator",
            "general",
            "format",
            "click",
            "strings",
            "meta",
            "install",
            "encoder",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "evasion att",
            "t1480 execution",
            "file defense",
            "adversaries",
            "calls",
            "reads",
            "defense evasion",
            "model",
            "server",
            "registrar abuse",
            "ascio",
            "contact phone",
            "admin city",
            "admin country",
            "admin postal",
            "dnssec",
            "http",
            "ip address",
            "passive dns",
            "related nids",
            "urls",
            "files location",
            "united",
            "flag united",
            "a domains",
            "search",
            "unknown aaaa",
            "certificate",
            "yara detections",
            "av detections",
            "ids detections",
            "alerts",
            "entries elf",
            "filehash",
            "name servers",
            "servers",
            "moved",
            "script script",
            "aaaa",
            "unknown ns",
            "domain add",
            "formbook cnc",
            "checkin",
            "lowfi",
            "mtb jun",
            "github pages",
            "twitter",
            "accept",
            "cryptobit",
            "extra",
            "referen data",
            "trojanproxy",
            "dynamicloader",
            "high",
            "write c",
            "medium",
            "intel",
            "ms windows",
            "entries",
            "pe32",
            "explorer",
            "worm",
            "write",
            "next",
            "trojan",
            "hellspawn",
            "md5 add",
            "malware",
            "data",
            "included iocs",
            "script urls",
            "script domains",
            "gmt content",
            "cash amtincart",
            "expirestue",
            "domain related",
            "sea x",
            "accept encoding",
            "request id",
            "body doctype",
            "apache",
            "encrypt",
            "skynet",
            "third eye tv",
            "calling",
            "delete app",
            "potus",
            "mtb aug",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "utilads",
            "trojandropper",
            "mtb sep",
            "win32upatre aug",
            "yara rule",
            "as15169",
            "guard",
            "smartassembly",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "domain",
            "url analysis",
            "files",
            "date",
            "delete service",
            "45470",
            "text",
            "hybrid",
            "present sep",
            "body",
            "fastly error",
            "please",
            "xor xor",
            "sha256 add",
            "analysis date",
            "file score",
            "detections alf",
            "june",
            "delphi",
            "attempts",
            "yara",
            "high security",
            "file type",
            "pe packer",
            "ransom"
          ],
          "references": [
            "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
            "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
            "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
            "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
            "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
            "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
            "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
            "hasownproperty.call \u2022 fireeye.grhd.",
            "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "TrojanProxy:Win32/Malynfits",
              "display_name": "TrojanProxy:Win32/Malynfits",
              "target": "/malware/TrojanProxy:Win32/Malynfits"
            },
            {
              "id": "Virus:Win32/Lywer",
              "display_name": "Virus:Win32/Lywer",
              "target": "/malware/Virus:Win32/Lywer"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "Virus:DOS/Hellspawn",
              "display_name": "Virus:DOS/Hellspawn",
              "target": "/malware/Virus:DOS/Hellspawn"
            },
            {
              "id": "Win.Trojan.Dialer-266",
              "display_name": "Win.Trojan.Dialer-266",
              "target": null
            },
            {
              "id": "AgentTesla",
              "display_name": "AgentTesla",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Remcos",
              "display_name": "Backdoor:MSIL/Remcos",
              "target": "/malware/Backdoor:MSIL/Remcos"
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "#LowFI:VBExpensiveLoop",
              "display_name": "#LowFI:VBExpensiveLoop",
              "target": null
            },
            {
              "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "ALF:Ransom:Win32/Babax.SG!MTB",
              "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1489",
              "name": "Service Stop",
              "display_name": "T1489 - Service Stop"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 690,
            "URL": 1479,
            "domain": 476,
            "FileHash-MD5": 526,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 1509,
            "email": 6
          },
          "indicator_count": 5191,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "185 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892e73b32af18aa302df0dc",
          "name": "Part 1.5",
          "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
          "modified": "2025-09-05T04:03:06.929000",
          "created": "2025-08-06T05:25:15.369000",
          "tags": [
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "june",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "impact",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "script",
            "mitre att",
            "pattern match",
            "show technique",
            "iframe",
            "refresh",
            "august",
            "general",
            "local",
            "tools",
            "demo",
            "look",
            "verify",
            "restart",
            "url http",
            "small",
            "pulses url",
            "tellyoun",
            "showing",
            "entries",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "cc08",
            "f06a6b",
            "sfurl",
            "filehashsha256",
            "types",
            "indicators show",
            "search",
            "pulses",
            "filehashsha1",
            "adversaries",
            "found",
            "webp image",
            "ascii text",
            "riff",
            "size",
            "encrypt",
            "legacy",
            "filehashmd5",
            "united",
            "flag",
            "server",
            "markmonitor",
            "name server",
            "llc name",
            "overview dns",
            "requests domain",
            "country",
            "win32",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "yara",
            "detections",
            "malware",
            "copy",
            "show",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "extraction",
            "data upload",
            "enter sc",
            "type",
            "extra data",
            "please",
            "failed",
            "review",
            "exclude data",
            "included review",
            "ic data",
            "suggeste",
            "stop",
            "type onow",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses none",
            "related tags",
            "none google",
            "safe browsing",
            "sc data",
            "extr amanuav",
            "review included",
            "manualy",
            "sugges excluded",
            "filehash",
            "md5 add",
            "pulse pulses",
            "url add",
            "http",
            "hostname",
            "files domain",
            "pulses otx",
            "virustotal",
            "hsmi192547107",
            "pulses hostname",
            "r dec",
            "customer dec",
            "iski dec",
            "decision dec",
            "va dec",
            "bitcoin",
            "bitcoin dec",
            "petra",
            "torstatus dec",
            "paul dec",
            "sodesc",
            "planet dec",
            "emilia",
            "heroin dec",
            "difference dec",
            "palantir dec",
            "loraxlive dec",
            "chaturbate dec",
            "sandra",
            "free dec",
            "marvel dec",
            "benjis dec",
            "fresh dec",
            "sodesc dec",
            "srdirport",
            "srhostname",
            "link dec",
            "types of",
            "italy",
            "china",
            "australia",
            "france",
            "turkey",
            "discovery",
            "information",
            "ck ids",
            "t1005",
            "local system",
            "t1007",
            "system service",
            "part",
            "track",
            "locate",
            "political",
            "civil society",
            "news",
            "created",
            "hours ago",
            "report spam",
            "t1555",
            "password",
            "t1560",
            "collected data",
            "t1573",
            "channel",
            "t1574",
            "execution flow",
            "scan",
            "iocs",
            "t1497",
            "u0lhmq",
            "mtawmq",
            "t1480",
            "guardrails",
            "t1486",
            "data encrypted",
            "learn more",
            "unsubscribe aug",
            "protocol",
            "t1074",
            "staged",
            "t1083",
            "t1102",
            "web service",
            "t1105",
            "tool transfer",
            "t1140",
            "data engineer",
            "candidate",
            "tlsv1",
            "odigicert inc",
            "stcalifornia",
            "lsan jose",
            "oadobe systems",
            "incorporated",
            "cndigicert sha2",
            "push",
            "next",
            "high",
            "write c",
            "ireland as16509",
            "delete",
            "dirty",
            "tags",
            "t1012",
            "flow endpoint",
            "security scan",
            "t1106",
            "copyright",
            "levelblue"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 608,
            "FileHash-SHA1": 433,
            "FileHash-SHA256": 3663,
            "URL": 17104,
            "domain": 1316,
            "email": 39,
            "hostname": 4208,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 27388,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6892a73593f73dfc969779b0",
          "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
          "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
          "modified": "2025-09-05T00:03:23.223000",
          "created": "2025-08-06T00:52:05.051000",
          "tags": [
            "url http",
            "small",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "tellyoun",
            "n aug",
            "entries",
            "data upload",
            "extraction",
            "windows error",
            "june",
            "fwd urgent",
            "justice czech",
            "copy sha256",
            "rejectedfailed",
            "timestamp input",
            "message status",
            "actions august",
            "file",
            "actions june",
            "actions may",
            "cta4 https",
            "context related",
            "associated urls",
            "campaigncodedsc",
            "language",
            "uid http",
            "community",
            "sha256",
            "size42b type",
            "submitted",
            "august",
            "april",
            "internal error",
            "previous1",
            "iframe",
            "community score",
            "scan analysis",
            "malicious",
            "intelligence",
            "learn",
            "falcon sandbox",
            "submissions",
            "status",
            "adversaries",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "windows folder",
            "found",
            "dlls",
            "impact",
            "chromeua",
            "optout",
            "object",
            "path",
            "value",
            "access type",
            "setval",
            "windir",
            "localappdata",
            "null",
            "win64",
            "error",
            "generator",
            "close",
            "roboto",
            "date",
            "format",
            "light",
            "span",
            "template",
            "void",
            "android",
            "body",
            "trident",
            "mexico",
            "sonic",
            "black",
            "critical",
            "desktop",
            "dark",
            "meta",
            "this",
            "hybrid",
            "apache",
            "write",
            "crypto",
            "autodetect",
            "face",
            "courier",
            "gigi",
            "shadow",
            "click",
            "strings",
            "cray",
            "smwg",
            "eret",
            "footer",
            "infinity",
            "window",
            "canvas",
            "legend",
            "nuke",
            "lion",
            "4629",
            "ahav",
            "olsa",
            "false"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9062,
            "domain": 707,
            "hostname": 2318,
            "FileHash-MD5": 86,
            "FileHash-SHA1": 26,
            "FileHash-SHA256": 2096,
            "email": 5,
            "FilePath": 2,
            "URI": 1
          },
          "indicator_count": 14303,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "226 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68732864356c4353e0b1efe2",
          "name": "Denver Post - Custom Malware | Xord",
          "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
          "modified": "2025-08-12T03:05:26.037000",
          "created": "2025-07-13T03:30:44.589000",
          "tags": [
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "entries",
            "url http",
            "domain",
            "ipv4",
            "filehashsha256",
            "hostname",
            "types of",
            "united kingdom",
            "united",
            "germany",
            "france",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "extraction",
            "data upload",
            "failed",
            "se extraction",
            "enter sc",
            "type",
            "extra data",
            "please",
            "include review",
            "exclude sugges",
            "type ol",
            "please sub",
            "langes",
            "include",
            "review data",
            "extrad",
            "manually add",
            "indicator",
            "sc type",
            "included iocs",
            "se extr",
            "review exclude",
            "sugges",
            "extract data",
            "add indicator",
            "domain related",
            "showing",
            "tewdida data",
            "present jul",
            "script urls",
            "a domains",
            "present jun",
            "search",
            "accept encoding",
            "unknown aaaa",
            "present may",
            "date",
            "meta",
            "body",
            "ipv6",
            "role",
            "present jan",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "x20trnf",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "write",
            "this",
            "void",
            "accept",
            "copy",
            "extr please",
            "typ data",
            "indicalok no",
            "gmt max",
            "reverse dns",
            "location united",
            "america flag",
            "ashburn",
            "america asn",
            "dns resolutions",
            "domains top",
            "extri please",
            "review",
            "sugges data",
            "find suxesteu",
            "typ indical",
            "on hos",
            "dynamicloader",
            "medium",
            "show",
            "high",
            "windows",
            "cmd c",
            "delete",
            "next",
            "unknown",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "as15169",
            "execution",
            "dock",
            "persistence",
            "malware",
            "roboto",
            "fwlink",
            "powershell",
            "delete c",
            "guard",
            "win32",
            "passive dns",
            "ransom",
            "trojan",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "pulse",
            "trojandropper",
            "worm",
            "ur extraction",
            "find",
            "types",
            "seard data",
            "source se",
            "url toi",
            "ela fer",
            "iocs",
            "search otx",
            "extr",
            "indicators h",
            "weall",
            "indica",
            "sc data",
            "data u",
            "extre",
            "find s",
            "onv incmde",
            "exclude data",
            "suggested",
            "typ no"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3107,
            "domain": 526,
            "hostname": 940,
            "FileHash-SHA256": 2209,
            "email": 2,
            "FileHash-MD5": 80,
            "FileHash-SHA1": 31,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 6906,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68732869bad70de69c45c1b3",
          "name": "Denver Post - Custom Malware | Xord",
          "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
          "modified": "2025-08-12T03:05:26.037000",
          "created": "2025-07-13T03:30:49.347000",
          "tags": [
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "entries",
            "url http",
            "domain",
            "ipv4",
            "filehashsha256",
            "hostname",
            "types of",
            "united kingdom",
            "united",
            "germany",
            "france",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "extraction",
            "data upload",
            "failed",
            "se extraction",
            "enter sc",
            "type",
            "extra data",
            "please",
            "include review",
            "exclude sugges",
            "type ol",
            "please sub",
            "langes",
            "include",
            "review data",
            "extrad",
            "manually add",
            "indicator",
            "sc type",
            "included iocs",
            "se extr",
            "review exclude",
            "sugges",
            "extract data",
            "add indicator",
            "domain related",
            "showing",
            "tewdida data",
            "present jul",
            "script urls",
            "a domains",
            "present jun",
            "search",
            "accept encoding",
            "unknown aaaa",
            "present may",
            "date",
            "meta",
            "body",
            "ipv6",
            "role",
            "present jan",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "x20trnf",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "write",
            "this",
            "void",
            "accept",
            "copy",
            "extr please",
            "typ data",
            "indicalok no",
            "gmt max",
            "reverse dns",
            "location united",
            "america flag",
            "ashburn",
            "america asn",
            "dns resolutions",
            "domains top",
            "extri please",
            "review",
            "sugges data",
            "find suxesteu",
            "typ indical",
            "on hos",
            "dynamicloader",
            "medium",
            "show",
            "high",
            "windows",
            "cmd c",
            "delete",
            "next",
            "unknown",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "as15169",
            "execution",
            "dock",
            "persistence",
            "malware",
            "roboto",
            "fwlink",
            "powershell",
            "delete c",
            "guard",
            "win32",
            "passive dns",
            "ransom",
            "trojan",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "pulse",
            "trojandropper",
            "worm",
            "ur extraction",
            "find",
            "types",
            "seard data",
            "source se",
            "url toi",
            "ela fer",
            "iocs",
            "search otx",
            "extr",
            "indicators h",
            "weall",
            "indica",
            "sc data",
            "data u",
            "extre",
            "find s",
            "onv incmde",
            "exclude data",
            "suggested",
            "typ no"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3107,
            "domain": 526,
            "hostname": 940,
            "FileHash-SHA256": 2209,
            "email": 2,
            "FileHash-MD5": 80,
            "FileHash-SHA1": 31,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 6906,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "673dc97604d5c7076da96877",
          "name": "https://www.vgt.pl/js/jquery-3.2.1.min.js",
          "description": "JQuery v3.2.1 is released by the JS Foundation and is based on the code written by Jeremy Chilcot, the co-creator of the popular web browser, JQuery.",
          "modified": "2025-07-31T22:43:55.771000",
          "created": "2024-11-20T11:35:18.167000",
          "tags": [
            "regexp",
            "error",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "js foundation",
            "typeof module",
            "object",
            "date",
            "null"
          ],
          "references": [
            "https://www.vgt.pl/js/jquery-3.2.1.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 172,
            "hostname": 404,
            "URL": 969,
            "domain": 98,
            "FileHash-MD5": 178,
            "FileHash-SHA256": 355,
            "IPv4": 3
          },
          "indicator_count": 2179,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "261 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "684c65464466dd19b089f325",
          "name": "Zesp\u00f3\u0142 Profilaktyki i Rehabilitacji w Janowicach Wielkich - YouTube",
          "description": "If d=void 0===c,w(\"trustedResourceUrl\",d: \"Trusted resourceUrl,\" thend=c.src,d, c.js, then d:",
          "modified": "2025-06-13T17:56:28.689000",
          "created": "2025-06-13T17:52:06.399000",
          "tags": [
            "rehabilitacji w",
            "youtube tv",
            "dami jelenia",
            "tv dami",
            "jelenia gra",
            "zakupy wycz",
            "jeli",
            "nie korzystasz",
            "filmy",
            "aby tego",
            "copyright",
            "closure library",
            "argument",
            "ifunction",
            "error",
            "null",
            "type",
            "cast",
            "webchannel",
            "su2028u2029",
            "chrome",
            "xmlhttp",
            "kkvoid",
            "remotecontrol",
            "android",
            "unknown",
            "screen",
            "desktop",
            "function",
            "string",
            "array",
            "number",
            "vfunction",
            "f8192",
            "n432",
            "true",
            "j2048",
            "this",
            "window",
            "void",
            "date",
            "pokau017c",
            "pytfunction",
            "fe8function",
            "qgzfunction",
            "afunction",
            "hb28",
            "r150",
            "promise",
            "bigint",
            "post",
            "edge",
            "swhealthlog",
            "symbol",
            "trident",
            "infinity",
            "embed",
            "webkitkeyframes",
            "zoomin",
            "zoominx",
            "zoomoutx",
            "zoominy",
            "zoomouty",
            "2000px",
            "90deg",
            "20px",
            "30deg",
            "30px",
            "10px",
            "10deg",
            "3deg",
            "5deg",
            "djmegamenu",
            "use license",
            "tabindex",
            "menu",
            "close",
            "msie",
            "beforechange",
            "imagehassize",
            "buildcontrols",
            "magnific popup",
            "dmitry semenov",
            "http",
            "beforeclose",
            "afterclose",
            "open",
            "next",
            "open source",
            "bsd license",
            "george mcginley",
            "smith",
            "djimageslider",
            "subpackage",
            "webkit",
            "khtml",
            "icab",
            "countto",
            "callback",
            "handler",
            "object",
            "typeof",
            "method",
            "gnugplv2",
            "website",
            "set module",
            "height script",
            "regexp",
            "screenheight",
            "highcontrast2",
            "highcontrast3",
            "highcontrast",
            "wide",
            "night",
            "body",
            "normalbutton",
            "cookie plugin",
            "https",
            "klaus hartl",
            "mit license",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "sticky bar",
            "stickybar",
            "count",
            "offcanvas",
            "html",
            "noscroll",
            "offcanvas var",
            "toggle nav",
            "click jquery",
            "ajax",
            "autocomplete",
            "tomas kirda",
            "typeof define",
            "esc27",
            "tab9",
            "return13",
            "left37",
            "up38",
            "twitter",
            "custom version",
            "joomla",
            "rolemenu",
            "boolean",
            "get adobe",
            "flash player",
            "title",
            "text",
            "typeof data",
            "typeof s",
            "accept",
            "width",
            "foundation",
            "backspace8",
            "comma188",
            "delete46",
            "down40",
            "end35",
            "enter13",
            "escape27",
            "value",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "xtablet768",
            "document",
            "ui sortable",
            "leftright",
            "gnu general",
            "public license",
            "dddddd",
            "ffffcc",
            "eeeeee",
            "verdana",
            "geneva",
            "arial",
            "helvetica",
            "f0f0f0",
            "sans",
            "charset",
            "utf8",
            "fontawesome",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "general slider",
            "slide",
            "rgba",
            "navigation",
            "15deg",
            "300px",
            "20deg",
            "transition",
            "scale",
            "baskerville",
            "main image",
            "bdbdbd",
            "f3f3f3",
            "remove",
            "fontface",
            "woff2",
            "u0131",
            "u01520153",
            "u02bb02bc",
            "u02c6",
            "u02da",
            "u02dc",
            "u0304",
            "dirrtl",
            "msviewport",
            "href",
            "span",
            "legend",
            "halflings",
            "fieldset",
            "typeimage",
            "f2f2f2",
            "d9edf7",
            "dff0d8",
            "f2dede",
            "thead",
            "tbody",
            "tahoma",
            "00a0",
            "video",
            "script",
            "2500",
            "xnew ita",
            "dnew jta",
            "dataset",
            "orfunction",
            "prfunction",
            "nsafunction",
            "xsafunction",
            "vrfunction",
            "cakes",
            "ovbfunction",
            "pvbfunction",
            "rvbfunction",
            "qvbfunction",
            "tvbfunction",
            "uvbfunction",
            "vvbclass",
            "xvbclass",
            "yvbclass",
            "svbclass",
            "lvafunction",
            "ggfunction",
            "mvafunction",
            "ovafunction",
            "pvafunction",
            "uvafunction",
            "tvafunction",
            "qvafunction",
            "vvafunction",
            "nvaclass",
            "dark",
            "vector",
            "yy49",
            "raster",
            "roboto",
            "new tk",
            "qael",
            "przechyl",
            "mars",
            "mercury",
            "venus",
            "pluto",
            "titan",
            "weakset",
            "wfclass",
            "googlelayer",
            "uint8array",
            "weakmap",
            "5001",
            "mouseevent",
            "webassembly",
            "180180",
            "9090",
            "google maps",
            "javascript api",
            "internal",
            "small",
            "lightrail",
            "false",
            "february",
            "light",
            "hybrid",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "gc"
          ],
          "references": [
            "embed.html",
            "ad_status.js.pobrane",
            "f5Y41t9wqY4.html",
            "cast_sender.js.pobrane",
            "remote.js.pobrane",
            "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
            "embed.js.pobrane",
            "www-embed-player.js.pobrane",
            "animate.ext.css",
            "animate.min.css",
            "jquery.djmegamenu.js.pobrane",
            "jquery.djmobilemenu.js.pobrane",
            "magnific.js.pobrane",
            "jquery.easing.min.js.pobrane",
            "slider.js.pobrane",
            "jquery.countTo.js.pobrane",
            "scripts.js.pobrane",
            "magnific-init.js.pobrane",
            "pagesettings.js.pobrane",
            "jquery.cookie.js.pobrane",
            "stickybar.js.pobrane",
            "fontswitcher.js.pobrane",
            "offcanvas.js.pobrane",
            "jquery.autocomplete.min.js.pobrane",
            "bootstrap.min.js.pobrane",
            "jcemediabox.js.pobrane",
            "jquery.ui.core.min.js.pobrane",
            "jquery-migrate.min.js.pobrane",
            "layout.min.js.pobrane",
            "jquery.ui.sortable.min.js.pobrane",
            "caption.js.pobrane",
            "finder.css",
            "jquery-noconflict.js.pobrane",
            "djmegamenu.26.css",
            "animations.css",
            "djmobilemenu.css",
            "jquery.min.js.pobrane",
            "djimageslider.css",
            "offcanvas.css",
            "magnific.css",
            "font_switcher.26.css",
            "css",
            "template_responsive.26.css",
            "offcanvas.26.css",
            "bootstrap_responsive.26.css",
            "extended_layouts.26.css",
            "style.css",
            "content.css",
            "template.26.css",
            "bootstrap.26.css",
            "jcemediabox.css",
            "js",
            "onion.js.pobrane",
            "search_impl.js.pobrane",
            "overlay.js.pobrane",
            "map.js.pobrane",
            "util.js.pobrane",
            "search.js.pobrane",
            "common.js.pobrane",
            "geometry.js.pobrane",
            "main.js.pobrane"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2779,
            "hostname": 661,
            "domain": 684,
            "email": 4,
            "FileHash-MD5": 1,
            "FileHash-SHA256": 689
          },
          "indicator_count": 4818,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "309 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "664b74b2683dec84891aef96",
          "name": "PrivateLoader is a malware with a module structure that has the capability is to download and execute one or several payloads",
          "description": "http://185.172.128.69/batushka/inte.exe  \nhttp://185.172.128.69/allnewumm.exe\nhttp://185.172.128.69/brandumma.exe\nhttp://185.172.128.69/files\nhttp://185.172.128.69/files/US.file\nhttp://185.172.128.69/latestumma.exe\nhttp://185.172.128.69/newumma.exe\nhttp://185.172.128.69/sekundumma.exe\nhttp://185.172.128.69/ummanew.exe",
          "modified": "2024-10-14T20:36:05.361000",
          "created": "2024-05-20T16:05:06.313000",
          "tags": [
            "stdin via",
            "nextron",
            "powershell id",
            "powershell",
            "tim rauch",
            "elastic",
            "script block",
            "logging",
            "pe32",
            "ms windows",
            "intel",
            "nazwa typ",
            "md5 nazwa",
            "procesu"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7268,
            "domain": 1310,
            "URL": 8101,
            "FileHash-SHA1": 1615,
            "hostname": 2590,
            "FileHash-MD5": 1852,
            "email": 267,
            "SSLCertFingerprint": 3,
            "CIDR": 38,
            "CVE": 7,
            "IPv4": 15,
            "YARA": 4
          },
          "indicator_count": 23070,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 135,
          "modified_text": "551 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66577ac0e1788e544c312e3f",
          "name": "Backdoor:MSIL/Noancooe.A  | Network sniffing Lime bandit",
          "description": "Backdoor:MSIL/Noancooe.A: Backdoor arrives on a system as a file dropped by other malware or as a file downloaded giving  malicious hackers unauthorized access and control of your PC.",
          "modified": "2024-06-28T18:00:33.800000",
          "created": "2024-05-29T18:58:08.465000",
          "tags": [
            "algorithm",
            "full name",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "date",
            "code",
            "first",
            "server",
            "privacy notice",
            "aaaa",
            "google",
            "july",
            "xcitium verdict",
            "record type",
            "ttl value",
            "data",
            "name verdict",
            "falcon sandbox",
            "jpeg image",
            "jfif standard",
            "ascii text",
            "pattern match",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "united",
            "et tor",
            "path",
            "mask",
            "hybrid",
            "generator",
            "local",
            "click",
            "strings",
            "union",
            "#metoo",
            "russell mcveagh",
            "grope",
            "moved",
            "civicaig",
            "now hiring",
            "apple",
            "unknown",
            "a domains",
            "passive dns",
            "urls",
            "creation date",
            "status",
            "search",
            "expiration date",
            "hong kong",
            "as133775 xiamen",
            "germany unknown",
            "scan endpoints",
            "all scoreblue",
            "body",
            "next",
            "hacking",
            "critical",
            "jailbreak",
            "m",
            "tech",
            "hit",
            "men",
            "sreredrum",
            "lime",
            "as24940 hetzner",
            "cname",
            "germany",
            "as16276",
            "domain",
            "spain unknown",
            "as31898 oracle",
            "as396982 google",
            "as5617 orange",
            "poland unknown",
            "as8881",
            "as19905",
            "msil",
            "kiwis",
            "sabey data centers",
            "nemtih",
            "attack tsara brashears",
            "t phone",
            "t mail",
            "t",
            "lakewood",
            "arvada",
            "jeff reimer dpt",
            "jeffrey scott",
            "lakeside",
            "grey st",
            "capture",
            "aquire",
            "aig",
            "sammie",
            "smith",
            "johnson",
            "xfinity",
            "whisper",
            "sky",
            "cybercrime",
            "true",
            "cyprus",
            "attack path",
            "pattern match"
          ],
          "references": [
            "www.russellmcveagh.com - Law Firm (front?) Document Moved",
            "Russell McVeagh - New Zealand's leading commercial law firm, known as the go-to team for tackling complex legal problems.",
            "www.auth.civicalg.com.sni.cloudflaressl.com | civicalg.com",
            "It's all the same | AIG, Michael Roberts Rexxfield 'bounty hunter' Brian Sabey HallRender (?)",
            "This area is swarming with PI's (his , hers and theirs)",
            "Hired hackers to jailbreak and locate devices. Brute forces, business and personal devices, network attacked.",
            "Crime scene unit vans from different county.",
            "Front Range security guard w/unsolicited account of on premise hacker causeing outage. Why would he be 'in the know, or giving information?",
            "sonar.lg-nonprod.civicalg.com (dangerous) peneservice71.auth.civicalg.com, install.civicalg.com",
            "#MeToo - A former Russell McVeagh partner found guilty of \"disgraceful\" sexual misconduct at the heart of New Zealand's #MeToo movement.",
            "http://droid--apk-ru.webpkgcache.com/",
            "http://e.name/?C.push.apply | https://application.t.email/backscreen",
            "appleread.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/Noancooe.A",
              "display_name": "Backdoor:MSIL/Noancooe.A",
              "target": "/malware/Backdoor:MSIL/Noancooe.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 695,
            "URL": 1111,
            "FileHash-MD5": 7,
            "FileHash-SHA1": 17,
            "FileHash-SHA256": 230,
            "domain": 643,
            "email": 9,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 2718,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "659 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66141ecabe8f1ab189351dd3",
          "name": "Tofsee Botnet: Google.com.uy | Install | Injection | Pegasus Monitoring",
          "description": "Installed remotely by nefarious actor by Trojan dropper. Typically not install via PlayStore/AppStore; can be with severe compromise/ VPNs will be fake. Examples: 1.1.1.1, 1.1.1.4, Proton AG or Proton.ch. Not visible: [.uy.]. All data, monitored, manipulated, tracked, location,  vehicle tracking, webcams, IP track, data cryptocurrency mining, tracked 24/7, collection, DDoS attacks, ransom, full CnC.\nTweakers.net, .bv , etc., observed, pegasus related",
          "modified": "2024-05-08T16:00:34.588000",
          "created": "2024-04-08T16:43:54.908000",
          "tags": [
            "installer",
            "tofsee",
            "trojan",
            "dropper",
            "dns",
            "as20940",
            "united",
            "aaaa",
            "as15703",
            "search",
            "servers",
            "as8455 schuberg",
            "a domains",
            "encrypt",
            "code",
            "tweakers",
            "unknown",
            "ransom",
            "body",
            "webcams",
            "banker",
            "location tracking",
            "vehicle tracking",
            "device tracking",
            "exploitation",
            "redirects",
            "ip tracking",
            "vpn nullify",
            "vehicle keycodes",
            "search threat",
            "analyzer feeds",
            "panel platform",
            "search platform",
            "profile user",
            "iocs",
            "redacted for",
            "passive dns",
            "all scoreblue",
            "hostname",
            "next",
            "cnc",
            "scanning host",
            "milesone",
            "virtual currency mining",
            "crypto",
            "regsetvalueexa",
            "regdword",
            "default",
            "show",
            "regbinary",
            "read c",
            "settingswpad",
            "as15169",
            "malware",
            "copy",
            "write",
            "upatre",
            "ids detections",
            "scan endpoints",
            "filehash",
            "av detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "ransom",
            "related pulses",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pe resource",
            "august",
            "win32",
            "for privacy",
            "creation date",
            "name servers",
            "urls",
            "date",
            "status",
            "as15169 google",
            "as44273 host",
            "ipv4",
            "pulse submit",
            "url analysis",
            "msie",
            "chrome",
            "moved",
            "title",
            "gmt content",
            "apple",
            "invalidate_gift_cards",
            "tulach rebranded",
            "hallrender rebranded",
            "as8075",
            "verdana",
            "td tr",
            "domain",
            "germany unknown",
            "as34011 host",
            "etag",
            "medium",
            "module load",
            "invalidate_google_play",
            "algorithm",
            "v3 serial",
            "number",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "usage",
            "x509v3 extended",
            "info",
            "first",
            "win32 exe",
            "win32 dll",
            "javascript",
            "mozilla firefox",
            "edition",
            "detections type",
            "name",
            "keeweb",
            "setup",
            "firefox setup",
            "record type",
            "ttl value",
            "android",
            "files",
            "formbook",
            "critical cmd",
            "tracker",
            "tsara brashears",
            "remote",
            "historical ssl",
            "referrer",
            "march",
            "body html",
            "head meta",
            "moved title",
            "head body",
            "pegasus",
            "nemtih",
            "hit",
            "men",
            "gift_card_mining",
            "google_play_card_mining",
            "miner",
            "htmladodb may",
            "twitter",
            "win64",
            "as21342",
            "as2914 ntt",
            "as15334",
            "error",
            "certificate",
            "checkbox",
            "accept",
            "record value",
            "emails",
            "domain name"
          ],
          "references": [
            "Virustotal  - google.com.uy",
            "https://hybrid-analysis.com/sample/79c5841a534b53013389ba76326a067895bdf5e41ad279d82b2002f6c8f2cda6",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=lost+my+mercedes+key>Mercedes+benz+Key+programmer",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=lost+my+mercedes+key",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=webcam+models+livecambabes.webcam>korean+webcam+models",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=www.livecambabes.Webcam>sexy+girls+dildoing",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=avon+representative>50calpaintballshop.com>avon+representative+directory [Beware: redirects]",
            "http://www.50calpaintballshop.com/phpinfo.php?a[]=how+to+join+avon+uk>how+do+i+join+avon+online [redirects to fraud representatives]",
            "Reports of victims meeting fraud direct sales reps in home/coffee shops. Reps store PII, financial, SSN# on device. Orders in victims name. ID theft ring",
            "https://www.herbgordonsubaru.com/?ddcref=careconnect_NM102-01&utm_campaign=newsconnect&utm_medium=email&utm_source=careconnect",
            "https://www.herbgordonsubaru.com/new-inventory/index?search=&model=Outback&utm_source=careconnect&utm_medium=email&utm_campaign=marketdriver-sales&ddcref=careconnect_marketdriversales",
            "nr-data.net [Apple Private Data Collection]",
            "checkip.dyndns.org [command and control]",
            "checkip.dyndns.org Alerts: dead_host network_icmp nolookup_communication modifies_proxy_wpad packer_polymorphic recon_beacon",
            "144.76.108.82 [scanning host]",
            "Yara Detections PEtite24",
            "FormBook IP: 142.251.211.243",
            "https://pegasusm2.bullsbikesusa.com",
            "https://microcenterinsider.com/pub/cc?_ri_=X0Gzc2X=AQpglLjHJlTQG0amRRrN1tkKAFGSTzdEjURWMTwh5gzdnK5Wo4uRBMFITdmoHEE1NzdwpzaEqrzcUkeItzbfVXtpKX=BATA"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Trojan:MSIL/TrojanDropper",
              "display_name": "Trojan:MSIL/TrojanDropper",
              "target": "/malware/Trojan:MSIL/TrojanDropper"
            },
            {
              "id": "Installer",
              "display_name": "Installer",
              "target": null
            },
            {
              "id": "Sf:Agent-DQ\\ [Trj]",
              "display_name": "Sf:Agent-DQ\\ [Trj]",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre!rfn",
              "display_name": "TrojanDownloader:Win32/Upatre!rfn",
              "target": "/malware/TrojanDownloader:Win32/Upatre!rfn"
            },
            {
              "id": "Win32:DropperX-gen\\ [Drp]",
              "display_name": "Win32:DropperX-gen\\ [Drp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-9770082-1",
              "display_name": "Win.Trojan.Tofsee-9770082-1",
              "target": null
            },
            {
              "id": "Ransom:Win32/StopCrypt.AK!MTB",
              "display_name": "Ransom:Win32/StopCrypt.AK!MTB",
              "target": "/malware/Ransom:Win32/StopCrypt.AK!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1574.005",
              "name": "Executable Installer File Permissions Weakness",
              "display_name": "T1574.005 - Executable Installer File Permissions Weakness"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1013",
              "name": "Port Monitors",
              "display_name": "T1013 - Port Monitors"
            },
            {
              "id": "T1430",
              "name": "Location Tracking",
              "display_name": "T1430 - Location Tracking"
            },
            {
              "id": "T1468",
              "name": "Remotely Track Device Without Authorization",
              "display_name": "T1468 - Remotely Track Device Without Authorization"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1483",
              "name": "Domain Generation Algorithms",
              "display_name": "T1483 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 392,
            "FileHash-SHA1": 468,
            "FileHash-SHA256": 3233,
            "URL": 8667,
            "domain": 2219,
            "hostname": 3480,
            "email": 8
          },
          "indicator_count": 18467,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "711 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "FormBook IP: 142.251.211.243",
        "embed.js.pobrane",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "extended_layouts.26.css",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=avon+representative>50calpaintballshop.com>avon+representative+directory [Beware: redirects]",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "Front Range security guard w/unsolicited account of on premise hacker causeing outage. Why would he be 'in the know, or giving information?",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "content.css",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "font_switcher.26.css",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=www.livecambabes.Webcam>sexy+girls+dildoing",
        "Yara Detections PEtite24",
        "https://hybrid-analysis.com/sample/79c5841a534b53013389ba76326a067895bdf5e41ad279d82b2002f6c8f2cda6",
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "offcanvas.css",
        "https://khmerpornvideo.signup0.y.id/",
        "slider.js.pobrane",
        "https://www.herbgordonsubaru.com/new-inventory/index?search=&model=Outback&utm_source=careconnect&utm_medium=email&utm_campaign=marketdriver-sales&ddcref=careconnect_marketdriversales",
        "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
        "magnific.js.pobrane",
        "jcemediabox.css",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "style.css",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "This area is swarming with PI's (his , hers and theirs)",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=lost+my+mercedes+key",
        "http://droid--apk-ru.webpkgcache.com/",
        "https://microcenterinsider.com/pub/cc?_ri_=X0Gzc2X=AQpglLjHJlTQG0amRRrN1tkKAFGSTzdEjURWMTwh5gzdnK5Wo4uRBMFITdmoHEE1NzdwpzaEqrzcUkeItzbfVXtpKX=BATA",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "sonar.lg-nonprod.civicalg.com (dangerous) peneservice71.auth.civicalg.com, install.civicalg.com",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=lost+my+mercedes+key>Mercedes+benz+Key+programmer",
        "bootstrap_responsive.26.css",
        "common.js.pobrane",
        "layout.min.js.pobrane",
        "djimageslider.css",
        "template_responsive.26.css",
        "nr-data.net [Apple Private Data Collection]",
        "jquery.min.js.pobrane",
        "magnific.css",
        "Reports of victims meeting fraud direct sales reps in home/coffee shops. Reps store PII, financial, SSN# on device. Orders in victims name. ID theft ring",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=how+to+join+avon+uk>how+do+i+join+avon+online [redirects to fraud representatives]",
        "Virustotal  - google.com.uy",
        "It's all the same | AIG, Michael Roberts Rexxfield 'bounty hunter' Brian Sabey HallRender (?)",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "https://clear.ml/infrastructure-control-plane",
        "144.76.108.82 [scanning host]",
        "www.auth.civicalg.com.sni.cloudflaressl.com | civicalg.com",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "www-embed-player.js.pobrane",
        "checkip.dyndns.org [command and control]",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d",
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "https://pegasusm2.bullsbikesusa.com",
        "scripts.js.pobrane",
        "djmobilemenu.css",
        "appleread.net",
        "http://www.50calpaintballshop.com/phpinfo.php?a[]=webcam+models+livecambabes.webcam>korean+webcam+models",
        "overlay.js.pobrane",
        "animate.min.css",
        "js",
        "bootstrap.min.js.pobrane",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "offcanvas.js.pobrane",
        "onion.js.pobrane",
        "Hired hackers to jailbreak and locate devices. Brute forces, business and personal devices, network attacked.",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "main.js.pobrane",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "jquery.easing.min.js.pobrane",
        "search_impl.js.pobrane",
        "fontswitcher.js.pobrane",
        "jquery.ui.core.min.js.pobrane",
        "Russell McVeagh - New Zealand's leading commercial law firm, known as the go-to team for tackling complex legal problems.",
        "animations.css",
        "jcemediabox.js.pobrane",
        "f5Y41t9wqY4.html",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "animate.ext.css",
        "caption.js.pobrane",
        "jquery.autocomplete.min.js.pobrane",
        "https://www.vgt.pl/js/jquery-3.2.1.min.js",
        "search.js.pobrane",
        "jquery.ui.sortable.min.js.pobrane",
        "stickybar.js.pobrane",
        "offcanvas.26.css",
        "embed.html",
        "Attacks are being carried out by The State of Colorado",
        "cast_sender.js.pobrane",
        "jquery.cookie.js.pobrane",
        "jquery.djmobilemenu.js.pobrane",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "geometry.js.pobrane",
        "Crime scene unit vans from different county.",
        "magnific-init.js.pobrane",
        "jquery-noconflict.js.pobrane",
        "finder.css",
        "bootstrap.26.css",
        "map.js.pobrane",
        "jquery.djmegamenu.js.pobrane",
        "https://www.herbgordonsubaru.com/?ddcref=careconnect_NM102-01&utm_campaign=newsconnect&utm_medium=email&utm_source=careconnect",
        "#MeToo - A former Russell McVeagh partner found guilty of \"disgraceful\" sexual misconduct at the heart of New Zealand's #MeToo movement.",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "firebase-auth-eich0v.pages.dev",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "www.russellmcveagh.com - Law Firm (front?) Document Moved",
        "template.26.css",
        "http://e.name/?C.push.apply | https://application.t.email/backscreen",
        "jquery.countTo.js.pobrane",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "remote.js.pobrane",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "checkip.dyndns.org Alerts: dead_host network_icmp nolookup_communication modifies_proxy_wpad packer_polymorphic recon_beacon",
        "djmegamenu.26.css",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "jquery-migrate.min.js.pobrane",
        "pagesettings.js.pobrane",
        "ad_status.js.pobrane",
        "util.js.pobrane",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "css"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Gc",
            "Virtool:win32/vbinject.gen!mh",
            "Worm:win32/lightmoon.h",
            "Win32:botx-gen\\ [trj]",
            "Trojandownloader:win32/cutwail",
            "Unix.trojan.tsunami-6981155-0",
            "Ransom:win32/crowti.a",
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Win32:dropperx-gen\\ [drp]",
            "Trojandropper:win32/systex.a",
            "Worm",
            "#lowfi:hstr:criakl.b1",
            "Cycbot",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn",
            "Tel:trojan:msil/agenttesla.vpa!mtb",
            "Virus:dos/hellspawn",
            "Alf:ransom:win32/babax.sg!mtb",
            "Trojandownloader:win32/cutwailransom:win32/crowti.a",
            "Trojan:win32/qbot.r!mtb",
            "Trojanproxy:win32/malynfits",
            "Trojandropper:win32/muldrop.v!mtb",
            "Win.trojan.tofsee-9770082-1",
            "Win.malware.mikey-9949492-0",
            "Win.trojan.tepfer-61",
            "#lowfi:vbexpensiveloop",
            "Installer",
            "Alf:nid:susp_nsis_stub.a",
            "Virus:win32/lywer",
            "Agenttesla",
            "Win.trojan.dialer-266",
            "Ransom:win32/stopcrypt.ak!mtb",
            "Sf:agent-dq\\ [trj]",
            "Trojanspy:win32/nivdort",
            "Trojandownloader:win32/upatre!rfn",
            "Backdoor:linux/demonbot.aa!mtb",
            "Mirai (elf)",
            "Trojan:msil/trojandropper",
            "Backdoor:msil/remcos",
            "Tofsee",
            "Backdoor:win32/arwobot.b",
            "Win.downloader.small-4507",
            "Backdoor:msil/noancooe.a",
            "Win.packed.bandook-9882274-1",
            "Unix.trojan.gafgyt-6981154-0",
            "Cve-2017-11882",
            "Alf:exploit:o97m/cve-2017-8977",
            "Win.trojan.gravityrat-6511862-0",
            "Pws:win32/vb.cu",
            "Nids",
            "Ddos:linux/gafgyt.ya!mtb"
          ],
          "industries": [
            "Civil society",
            "Insurance",
            "Telecommunications",
            "Construction",
            "Technology"
          ],
          "unique_indicators": 173353
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/a.call",
    "whois": "http://whois.domaintools.com/a.call",
    "domain": "a.call",
    "hostname": "g.a.call"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 13,
  "pulses": [
    {
      "id": "693cdc5b8ebc10664439c2fb",
      "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - Freeman Mathis & Gary for The State of Colorado",
      "description": "State of Colorado attackers use  DGA domains set up multiple Law Firms.. Christopher P.  \u2019Buzz\u2019  Ahmann  Is a legal consultant / attorney./ hacker \nWorks for the State of Colorado/ quasi. Is malicious and doesn\u2019t work alone. Continues to target \nState had relative contacted by a fake entity \u2018Goodness Health\u2019\nLeft vague VM for relative message \u201cWe work on the Medicare side of things.\u201d and? \nSocial engineering call , malicious domain. The State of Colorado has been on a relentless pursuit against target. Fully compromised targets relatives brand new phone. Hacked target since 10/2013.\nMultiple cyber and physical attacks carried out  against target and family members.. There are attacks make  to look like accidents or malfunctions. This harmful, silencing behavior is somehow illegal for anyone else.",
      "modified": "2026-02-10T06:05:39.764000",
      "created": "2025-12-13T03:24:11.414000",
      "tags": [
        "colorado state",
        "freeman mathis",
        "history",
        "cyber risk",
        "aspen insureds",
        "gaig insureds",
        "landy insureds",
        "nip group",
        "purm insureds",
        "overview core",
        "united",
        "ip address",
        "present nov",
        "present may",
        "moved",
        "encrypt",
        "unknown",
        "backdoor",
        "passive dns",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "twitter",
        "trojan",
        "data upload",
        "extraction",
        "failed",
        "united states",
        "server response",
        "google safe",
        "results may",
        "lowfi",
        "virtool",
        "mtb alf",
        "mh alf",
        "port",
        "windows nt",
        "destination",
        "msie",
        "khtml",
        "gecko",
        "unknown aaaa",
        "a domains",
        "meta",
        "for privacy",
        "cop supply",
        "urls",
        "as139646 hong",
        "hostname",
        "files",
        "hong kong",
        "domain add",
        "ip related",
        "hash avast",
        "avg clamav",
        "msdefender may",
        "ddos",
        "as13335",
        "ipv4",
        "certificate",
        "hostname add",
        "url analysis",
        "files ip",
        "name strings",
        "category",
        "united states",
        "pulse indicator",
        "address",
        "error",
        "null",
        "object",
        "string",
        "number",
        "google maps",
        "promise",
        "javascript api",
        "dataset",
        "bigint",
        "dark",
        "android",
        "infinity",
        "internal",
        "roboto",
        "trident",
        "void",
        "small",
        "lightrail",
        "false",
        "span",
        "close",
        "light",
        "hybrid",
        "embed",
        "iframe",
        "keygen",
        "this",
        "february",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "present dec",
        "pulses otx",
        "aaaa",
        "asnone country",
        "record value",
        "title",
        "pulse pulses",
        "pulses",
        "showing",
        "unknown cname",
        "unknown soa",
        "next associated",
        "ipv4 add",
        "cycbot",
        "extract indic",
        "sneaker bots",
        "proxies data",
        "script script",
        "adult content",
        "nextimage",
        "porn site",
        "div div",
        "platform make",
        "cloudfront x",
        "hio52 p3",
        "unknown ns",
        "pulse submit",
        "title error",
        "reverse dns",
        "status",
        "servers",
        "name servers",
        "vashti hostname",
        "scan endpoints",
        "url http",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "dnssec",
        "sec ch",
        "ch ua",
        "ua full",
        "ua platform",
        "ua bitness",
        "ua arch",
        "version sec",
        "mobile sec",
        "model sec",
        "version list",
        "domain",
        "emails",
        "cookie",
        "url https",
        "show",
        "filehash",
        "urls show",
        "date checked",
        "url hostname",
        "results nov",
        "win32",
        "type",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "defense evasion",
        "spawns",
        "flag",
        "llc name",
        "server",
        "markmonitor",
        "name server",
        "windir",
        "openurl c",
        "prefetch2",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "sha1",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "germany unknown",
        "date",
        "registrar",
        "ip whois",
        "dynamicloader",
        "high",
        "medium",
        "search",
        "displayname",
        "tofsee",
        "win64",
        "write",
        "stream",
        "malware",
        "push",
        "entries",
        "tls handshake",
        "failure",
        "forbidden",
        "tlsv1",
        "april",
        "next",
        "write c",
        "intel",
        "ms windows",
        "sha1 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "sha256 add",
        "present jun",
        "present mar",
        "medelln",
        "colombia asn",
        "dns resolutions",
        "address domain",
        "related tags",
        "none google",
        "safe browsing",
        "external",
        "present sep",
        "present aug",
        "as54113",
        "present jul",
        "as8068",
        "gmt content",
        "total",
        "read",
        "delete",
        "top source",
        "quasi",
        "murderers",
        "christopher ahmann",
        "buzz ahmann",
        "wow64",
        "slcc2",
        "media center",
        "labor",
        "employment",
        "cdle",
        "dowc",
        "colorado",
        "workers",
        "coloradoif",
        "independent",
        "state",
        "company",
        "entity type",
        "authorized line",
        "analysis",
        "tor analysis",
        "process details",
        "network traffic",
        "t1071",
        "potential ip",
        "click",
        "found",
        "t1480 execution",
        "bad traffic",
        "et info",
        "ck techniques",
        "evasion att",
        "t1057",
        "refresh",
        "body",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "cname",
        "form",
        "pulse",
        "script domains",
        "script urls",
        "administrator",
        "services llc",
        "dns admin",
        "domain admin",
        "global llc",
        "domain manager",
        "computer system",
        "ltd domain",
        "network",
        "alibaba",
        "facebook",
        "phishme",
        "sogou",
        "present jan",
        "present feb",
        "present oct"
      ],
      "references": [
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "firebase-auth-eich0v.pages.dev",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "https://khmerpornvideo.signup0.y.id/",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "https://clear.ml/infrastructure-control-plane",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "Attacks are being carried out by The State of Colorado"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "France",
        "Ireland",
        "Spain",
        "Italy",
        "Aruba",
        "Australia",
        "Denmark",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "T\u00fcrkiye",
        "Indonesia"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.GravityRAT-6511862-0",
          "display_name": "Win.Trojan.GravityRAT-6511862-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Systex.A",
          "display_name": "TrojanDropper:Win32/Systex.A",
          "target": "/malware/TrojanDropper:Win32/Systex.A"
        },
        {
          "id": "Win.Trojan.Tepfer-61",
          "display_name": "Win.Trojan.Tepfer-61",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.gen!MH",
          "display_name": "VirTool:Win32/VBInject.gen!MH",
          "target": "/malware/VirTool:Win32/VBInject.gen!MH"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "#LOWFI:HSTR:Criakl.B1",
          "display_name": "#LOWFI:HSTR:Criakl.B1",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Arwobot.B",
          "display_name": "Backdoor:Win32/Arwobot.B",
          "target": "/malware/Backdoor:Win32/Arwobot.B"
        },
        {
          "id": "Win.Packed.Bandook-9882274-1",
          "display_name": "Win.Packed.Bandook-9882274-1",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "Win.Downloader.Small-4507",
          "display_name": "Win.Downloader.Small-4507",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Win.Malware.Mikey-9949492-0",
          "display_name": "Win.Malware.Mikey-9949492-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981154-0",
          "display_name": "Unix.Trojan.Gafgyt-6981154-0",
          "target": null
        },
        {
          "id": "DDOS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-11882",
          "display_name": "CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        },
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Worm",
          "display_name": "Worm",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1574.008",
          "name": "Path Interception by Search Order Hijacking",
          "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1593.002",
          "name": "Search Engines",
          "display_name": "T1593.002 - Search Engines"
        }
      ],
      "industries": [
        "Insurance",
        "Construction"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 54118,
        "domain": 11153,
        "hostname": 18578,
        "email": 21,
        "FileHash-SHA256": 4905,
        "FileHash-MD5": 548,
        "FileHash-SHA1": 534,
        "CVE": 7,
        "SSLCertFingerprint": 20,
        "CIDR": 1
      },
      "indicator_count": 89885,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "68 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6963596c4cd594b77b4675ec",
      "name": "Project Cicada-.Christopher \u201cBuzz\u201d Ahmann - PalantirFoundry | The State of Colorado | ",
      "description": "",
      "modified": "2026-02-10T06:05:39.764000",
      "created": "2026-01-11T08:03:56.534000",
      "tags": [
        "colorado state",
        "freeman mathis",
        "history",
        "cyber risk",
        "aspen insureds",
        "gaig insureds",
        "landy insureds",
        "nip group",
        "purm insureds",
        "overview core",
        "united",
        "ip address",
        "present nov",
        "present may",
        "moved",
        "encrypt",
        "unknown",
        "backdoor",
        "passive dns",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "twitter",
        "trojan",
        "data upload",
        "extraction",
        "failed",
        "united states",
        "server response",
        "google safe",
        "results may",
        "lowfi",
        "virtool",
        "mtb alf",
        "mh alf",
        "port",
        "windows nt",
        "destination",
        "msie",
        "khtml",
        "gecko",
        "unknown aaaa",
        "a domains",
        "meta",
        "for privacy",
        "cop supply",
        "urls",
        "as139646 hong",
        "hostname",
        "files",
        "hong kong",
        "domain add",
        "ip related",
        "hash avast",
        "avg clamav",
        "msdefender may",
        "ddos",
        "as13335",
        "ipv4",
        "certificate",
        "hostname add",
        "url analysis",
        "files ip",
        "name strings",
        "category",
        "united states",
        "pulse indicator",
        "address",
        "error",
        "null",
        "object",
        "string",
        "number",
        "google maps",
        "promise",
        "javascript api",
        "dataset",
        "bigint",
        "dark",
        "android",
        "infinity",
        "internal",
        "roboto",
        "trident",
        "void",
        "small",
        "lightrail",
        "false",
        "span",
        "close",
        "light",
        "hybrid",
        "embed",
        "iframe",
        "keygen",
        "this",
        "february",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "present dec",
        "pulses otx",
        "aaaa",
        "asnone country",
        "record value",
        "title",
        "pulse pulses",
        "pulses",
        "showing",
        "unknown cname",
        "unknown soa",
        "next associated",
        "ipv4 add",
        "cycbot",
        "extract indic",
        "sneaker bots",
        "proxies data",
        "script script",
        "adult content",
        "nextimage",
        "porn site",
        "div div",
        "platform make",
        "cloudfront x",
        "hio52 p3",
        "unknown ns",
        "pulse submit",
        "title error",
        "reverse dns",
        "status",
        "servers",
        "name servers",
        "vashti hostname",
        "scan endpoints",
        "url http",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "dnssec",
        "sec ch",
        "ch ua",
        "ua full",
        "ua platform",
        "ua bitness",
        "ua arch",
        "version sec",
        "mobile sec",
        "model sec",
        "version list",
        "domain",
        "emails",
        "cookie",
        "url https",
        "show",
        "filehash",
        "urls show",
        "date checked",
        "url hostname",
        "results nov",
        "win32",
        "type",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "defense evasion",
        "spawns",
        "flag",
        "llc name",
        "server",
        "markmonitor",
        "name server",
        "windir",
        "openurl c",
        "prefetch2",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "ascii text",
        "sha1",
        "href",
        "show process",
        "file",
        "general",
        "local",
        "path",
        "germany unknown",
        "date",
        "registrar",
        "ip whois",
        "dynamicloader",
        "high",
        "medium",
        "search",
        "displayname",
        "tofsee",
        "win64",
        "write",
        "stream",
        "malware",
        "push",
        "entries",
        "tls handshake",
        "failure",
        "forbidden",
        "tlsv1",
        "april",
        "next",
        "write c",
        "intel",
        "ms windows",
        "sha1 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "sha256 add",
        "present jun",
        "present mar",
        "medelln",
        "colombia asn",
        "dns resolutions",
        "address domain",
        "related tags",
        "none google",
        "safe browsing",
        "external",
        "present sep",
        "present aug",
        "as54113",
        "present jul",
        "as8068",
        "gmt content",
        "total",
        "read",
        "delete",
        "top source",
        "quasi",
        "murderers",
        "christopher ahmann",
        "buzz ahmann",
        "wow64",
        "slcc2",
        "media center",
        "labor",
        "employment",
        "cdle",
        "dowc",
        "colorado",
        "workers",
        "coloradoif",
        "independent",
        "state",
        "company",
        "entity type",
        "authorized line",
        "analysis",
        "tor analysis",
        "process details",
        "network traffic",
        "t1071",
        "potential ip",
        "click",
        "found",
        "t1480 execution",
        "bad traffic",
        "et info",
        "ck techniques",
        "evasion att",
        "t1057",
        "refresh",
        "body",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "cname",
        "form",
        "pulse",
        "script domains",
        "script urls",
        "administrator",
        "services llc",
        "dns admin",
        "domain admin",
        "global llc",
        "domain manager",
        "computer system",
        "ltd domain",
        "network",
        "alibaba",
        "facebook",
        "phishme",
        "sogou",
        "present jan",
        "present feb",
        "present oct"
      ],
      "references": [
        "https://www.fmglaw.com/lawyers/christopher-ahmann - found in adult content pulse.",
        "Sneaker Bots Proxies Servers Cook Groups Cop Supply",
        "archive.cop.supply \u2022 dev.cop.supply \u2022 https://cop.supply/ \u2022 https://cop.supply/bot-lists/",
        "https://cop.supply/supreme-bots/\u2022 https://cop.supply/useful-tools/",
        "https://cop.supply/proxies-lists/ \u2022 https://cop.supply/shopify-bots/",
        "dns.army \u2022 www.dcopr.dns.army  \u2022 www.glsyaiwjj.dns.army \u2022  www.wgmvk.dns.army",
        "https://maps.googleapis.com/maps/api/js?sensor=false",
        "cell-0.af-south-1.prod.telemetry.console.api.aws",
        "howtoworkacrickoutofyourneck2.pages.dev",
        "firebase-auth-eich0v.pages.dev",
        "http://ianswertomom.com/develop-wise-woman-within-yourself",
        "http://ianswertomom.com/bible-verses-struggling-contentment-mom/  I",
        "https://i-want-to-start-an-onlyfans.pages.dev/favicon.ico| I bet you do boo boo",
        "makeapornsite.com \u2022 https://pornhighschool.com/ \u2022 https://ethnicerotic.com \u2022 https://twitter.com/Make",
        "https://khmerpornvideo.signup0.y.id/",
        "https://lordseriala.life/6337-zvezdnye-vojny-opornaja-komanda.html",
        "https://clear.ml/infrastructure-control-plane",
        "dev-app.project-cicada.com \u2022 http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com (2014 report predates 2016 reports)",
        "https://amano.inboundtools.com/tpcontact  URL https://armg.inboundtools.com/  URL https://gaiax.inboundtools.com/internship  URL https://hmk.inboundtools.com/  URL https://hmk.inboundtools.com/form/assetview_siryo_sier",
        "https://download.clear.ml/cpython_builds/releases/ \u2022 https://download.clear.",
        "https://links.mail.samsara.com/s/c/P9R6gGlExR4nfCwqwJXUmr7NmKcMNde4ZBhCFprlVtsFNgh-4tuTWla0aXN9rIWCjrWtn0Vln7x-hexxVBlY3xxvnEevR8qJU5G5xV3__wo-X7kkpSOhJVfejac-Xk8qu6zs5Z-tILwWYRkNScZNGlAqfwQuJuRw5M-n_ZKI6tuY5XGCZAqWoQepi1NnJiW4wZJkzZlOwGtNkusbuKDcMsLVrrhji2eKh4kYgrJp_SeycJRhasLFCQ3c2bPu4sahEWpcHZrQBaxvdfQgTEno8kV-RJdTDO0zK5MyWDJLeds7mnaDrxlb0O2zmhebUdlHE0R0xHi25dympBUpMlLsQV8bx1WUTOfgK4k0ci9o_2Gbfe22-jLxsJN-msV6pxWYQMaxRNFd4iZRC9J9Z1SC5MBqbvNzqdt98kFdpibnv_QIHdhFyHOR_Ip_LX67Dncc8V8OvAi-H5phfeSyDzwdzf2FQIi82",
        "https://voidpet.io/invite/scaredscared/1rpzxWXa61 \u2022 https://sex-doggy.net/tag/censored",
        "Everyone has simply asked you alll to stop. Target never asked anyone for money.",
        "Legal court documented  agreement to allow and pay target to hire cyber investigators",
        "Attacks are being carried out by The State of Colorado"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Japan",
        "France",
        "Ireland",
        "Spain",
        "Italy",
        "Aruba",
        "Australia",
        "Denmark",
        "United Kingdom of Great Britain and Northern Ireland",
        "Germany",
        "T\u00fcrkiye",
        "Indonesia"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.GravityRAT-6511862-0",
          "display_name": "Win.Trojan.GravityRAT-6511862-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Systex.A",
          "display_name": "TrojanDropper:Win32/Systex.A",
          "target": "/malware/TrojanDropper:Win32/Systex.A"
        },
        {
          "id": "Win.Trojan.Tepfer-61",
          "display_name": "Win.Trojan.Tepfer-61",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "display_name": "TrojanDownloader:Win32/CutwailRansom:Win32/Crowti.A",
          "target": null
        },
        {
          "id": "VirTool:Win32/VBInject.gen!MH",
          "display_name": "VirTool:Win32/VBInject.gen!MH",
          "target": "/malware/VirTool:Win32/VBInject.gen!MH"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "#LOWFI:HSTR:Criakl.B1",
          "display_name": "#LOWFI:HSTR:Criakl.B1",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Arwobot.B",
          "display_name": "Backdoor:Win32/Arwobot.B",
          "target": "/malware/Backdoor:Win32/Arwobot.B"
        },
        {
          "id": "Win.Packed.Bandook-9882274-1",
          "display_name": "Win.Packed.Bandook-9882274-1",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "Win.Downloader.Small-4507",
          "display_name": "Win.Downloader.Small-4507",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Win.Malware.Mikey-9949492-0",
          "display_name": "Win.Malware.Mikey-9949492-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981154-0",
          "display_name": "Unix.Trojan.Gafgyt-6981154-0",
          "target": null
        },
        {
          "id": "DDOS:Linux/Gafgyt.YA!MTB",
          "display_name": "DDOS:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDOS:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "CVE-2017-11882",
          "display_name": "CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        },
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Worm",
          "display_name": "Worm",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1574.008",
          "name": "Path Interception by Search Order Hijacking",
          "display_name": "T1574.008 - Path Interception by Search Order Hijacking"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1593.002",
          "name": "Search Engines",
          "display_name": "T1593.002 - Search Engines"
        }
      ],
      "industries": [
        "Insurance",
        "Construction"
      ],
      "TLP": "green",
      "cloned_from": "693cdc5b8ebc10664439c2fb",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 54118,
        "domain": 11153,
        "hostname": 18578,
        "email": 21,
        "FileHash-SHA256": 4905,
        "FileHash-MD5": 548,
        "FileHash-SHA1": 534,
        "CVE": 7,
        "SSLCertFingerprint": 20,
        "CIDR": 1
      },
      "indicator_count": 89885,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "68 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c954a80675ccc89b0e9b63",
      "name": "Trump #45470 | Palantir container | virus:DOS/Hellspawn + ioS (compromised)",
      "description": "Overt. Trump support campaign text message from #45470. Malicious. Received on a victims hyper compromised iPhone. Attempts to or did take CnC of device. Stutters device, changed App Store , has delete service, device sweep,  shuts down service , halts all pages, denial of service, throttles service, steals\npasswords,  bots , I don\u2019t know if device can be refurbished or research purposes - Palantir DC DGA domains - Trump. Multiple IoC\u2019s , malware with code overlap, it appears to be from a legitimate text for updates #. Visibly affected all aspects of device and software. Commands device shut down. \n[OTX populated: Failed to retrieve suggested indicator for beta-ui, according to the latest results from the Welsh Government's Office for National Statistics (ONS) and the National Data Centre (NDS))",
      "modified": "2025-10-16T12:03:14.279000",
      "created": "2025-09-16T12:14:32.327000",
      "tags": [
        "ttl value",
        "extraction",
        "data upload",
        "failed",
        "extra data",
        "include review",
        "exclude sugges",
        "stop",
        "line",
        "path",
        "polyline",
        "getprocaddress",
        "circle",
        "span",
        "ck id",
        "mitre att",
        "ck matrix",
        "null",
        "error",
        "open",
        "spinner",
        "title",
        "code",
        "iframe",
        "window",
        "void",
        "infinity",
        "crypto",
        "footer",
        "generator",
        "general",
        "format",
        "click",
        "strings",
        "meta",
        "install",
        "encoder",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "evasion att",
        "t1480 execution",
        "file defense",
        "adversaries",
        "calls",
        "reads",
        "defense evasion",
        "model",
        "server",
        "registrar abuse",
        "ascio",
        "contact phone",
        "admin city",
        "admin country",
        "admin postal",
        "dnssec",
        "http",
        "ip address",
        "passive dns",
        "related nids",
        "urls",
        "files location",
        "united",
        "flag united",
        "a domains",
        "search",
        "unknown aaaa",
        "certificate",
        "yara detections",
        "av detections",
        "ids detections",
        "alerts",
        "entries elf",
        "filehash",
        "name servers",
        "servers",
        "moved",
        "script script",
        "aaaa",
        "unknown ns",
        "domain add",
        "formbook cnc",
        "checkin",
        "lowfi",
        "mtb jun",
        "github pages",
        "twitter",
        "accept",
        "cryptobit",
        "extra",
        "referen data",
        "trojanproxy",
        "dynamicloader",
        "high",
        "write c",
        "medium",
        "intel",
        "ms windows",
        "entries",
        "pe32",
        "explorer",
        "worm",
        "write",
        "next",
        "trojan",
        "hellspawn",
        "md5 add",
        "malware",
        "data",
        "included iocs",
        "script urls",
        "script domains",
        "gmt content",
        "cash amtincart",
        "expirestue",
        "domain related",
        "sea x",
        "accept encoding",
        "request id",
        "body doctype",
        "apache",
        "encrypt",
        "skynet",
        "third eye tv",
        "calling",
        "delete app",
        "potus",
        "mtb aug",
        "backdoor",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "utilads",
        "trojandropper",
        "mtb sep",
        "win32upatre aug",
        "yara rule",
        "as15169",
        "guard",
        "smartassembly",
        "associated urls",
        "date checked",
        "url hostname",
        "server response",
        "domain",
        "url analysis",
        "files",
        "date",
        "delete service",
        "45470",
        "text",
        "hybrid",
        "present sep",
        "body",
        "fastly error",
        "please",
        "xor xor",
        "sha256 add",
        "analysis date",
        "file score",
        "detections alf",
        "june",
        "delphi",
        "attempts",
        "yara",
        "high security",
        "file type",
        "pe packer",
        "ransom"
      ],
      "references": [
        "skynet-dev.tcxn.net tcxn.net Registrar Ascio Technologies, Inc - connection to cloud proxy",
        "TrojanProxy:Win32/Malynfits CodeOverlap TrojanSpy:Win32/Nivdort CodeOverlap virus:Win32/Lywer CodeOverlap",
        "https://cryptobit.live/build/assets/app-CkRYqsKL.js \u2022 cryptobit.live \u2022 t.page \u2022 cdn.wallets.cryptobit.live",
        "Trump Support campaign \u2022_\u2022 lantana-mgmt.washington.palantircloud.com \u2022 containers-reishi.palantirfedstart.com",
        "Virus:DOS/Hellspawn 192.168.122.49 10/16/25\t\u2022  IPv4 142.251.9.105",
        "IDS Detections: Win32/Enosch.A gtalk connectivity check | W32/MoonLight.worm User-Agent (HellSpawn)",
        "PWS:Win32/Ymacco.AA50 Win.Trojan.Generic-9959068-0\t SLF:MSIL/PSTAnomaly.A Win.Dropper.Shakblades-7614016-0\t#LowFI:VBExpensiveLoop Win.Packed.Barys-10031677-0\tTEL:Trojan:MSIL/AgentTesla.VPA!MTB Win.Trojan. Backdoor:MSIL/Remcos!MTB",
        "hasownproperty.call \u2022 fireeye.grhd.",
        "Apple Store verified drop down breach  \u2018Apple took a screenshot of pages\u201d"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "TrojanProxy:Win32/Malynfits",
          "display_name": "TrojanProxy:Win32/Malynfits",
          "target": "/malware/TrojanProxy:Win32/Malynfits"
        },
        {
          "id": "Virus:Win32/Lywer",
          "display_name": "Virus:Win32/Lywer",
          "target": "/malware/Virus:Win32/Lywer"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "Virus:DOS/Hellspawn",
          "display_name": "Virus:DOS/Hellspawn",
          "target": "/malware/Virus:DOS/Hellspawn"
        },
        {
          "id": "Win.Trojan.Dialer-266",
          "display_name": "Win.Trojan.Dialer-266",
          "target": null
        },
        {
          "id": "AgentTesla",
          "display_name": "AgentTesla",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Remcos",
          "display_name": "Backdoor:MSIL/Remcos",
          "target": "/malware/Backdoor:MSIL/Remcos"
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "#LowFI:VBExpensiveLoop",
          "display_name": "#LowFI:VBExpensiveLoop",
          "target": null
        },
        {
          "id": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "display_name": "TEL:Trojan:MSIL/AgentTesla.VPA!MTB",
          "target": null
        },
        {
          "id": "PWS:Win32/VB.CU",
          "display_name": "PWS:Win32/VB.CU",
          "target": "/malware/PWS:Win32/VB.CU"
        },
        {
          "id": "ALF:Ransom:Win32/Babax.SG!MTB",
          "display_name": "ALF:Ransom:Win32/Babax.SG!MTB",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1489",
          "name": "Service Stop",
          "display_name": "T1489 - Service Stop"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 690,
        "URL": 1479,
        "domain": 476,
        "FileHash-MD5": 526,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 1509,
        "email": 6
      },
      "indicator_count": 5191,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "185 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892e73b32af18aa302df0dc",
      "name": "Part 1.5",
      "description": "Dark web media \u2022 Political news \u2022 Malvertizing\nlocate \u2022\ntrack [stalk] \u2022 record calls \u2022 control media [youtube , etc] http://t.name?n[++i]=e:this.removeEventListener\t\t\nJeeng &\nPowebox [ accidentally left out in original post pulse]",
      "modified": "2025-09-05T04:03:06.929000",
      "created": "2025-08-06T05:25:15.369000",
      "tags": [
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "june",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "impact",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "script",
        "mitre att",
        "pattern match",
        "show technique",
        "iframe",
        "refresh",
        "august",
        "general",
        "local",
        "tools",
        "demo",
        "look",
        "verify",
        "restart",
        "url http",
        "small",
        "pulses url",
        "tellyoun",
        "showing",
        "entries",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "cc08",
        "f06a6b",
        "sfurl",
        "filehashsha256",
        "types",
        "indicators show",
        "search",
        "pulses",
        "filehashsha1",
        "adversaries",
        "found",
        "webp image",
        "ascii text",
        "riff",
        "size",
        "encrypt",
        "legacy",
        "filehashmd5",
        "united",
        "flag",
        "server",
        "markmonitor",
        "name server",
        "llc name",
        "overview dns",
        "requests domain",
        "country",
        "win32",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "medium risk",
        "yara",
        "detections",
        "malware",
        "copy",
        "show",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "extraction",
        "data upload",
        "enter sc",
        "type",
        "extra data",
        "please",
        "failed",
        "review",
        "exclude data",
        "included review",
        "ic data",
        "suggeste",
        "stop",
        "type onow",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses none",
        "related tags",
        "none google",
        "safe browsing",
        "sc data",
        "extr amanuav",
        "review included",
        "manualy",
        "sugges excluded",
        "filehash",
        "md5 add",
        "pulse pulses",
        "url add",
        "http",
        "hostname",
        "files domain",
        "pulses otx",
        "virustotal",
        "hsmi192547107",
        "pulses hostname",
        "r dec",
        "customer dec",
        "iski dec",
        "decision dec",
        "va dec",
        "bitcoin",
        "bitcoin dec",
        "petra",
        "torstatus dec",
        "paul dec",
        "sodesc",
        "planet dec",
        "emilia",
        "heroin dec",
        "difference dec",
        "palantir dec",
        "loraxlive dec",
        "chaturbate dec",
        "sandra",
        "free dec",
        "marvel dec",
        "benjis dec",
        "fresh dec",
        "sodesc dec",
        "srdirport",
        "srhostname",
        "link dec",
        "types of",
        "italy",
        "china",
        "australia",
        "france",
        "turkey",
        "discovery",
        "information",
        "ck ids",
        "t1005",
        "local system",
        "t1007",
        "system service",
        "part",
        "track",
        "locate",
        "political",
        "civil society",
        "news",
        "created",
        "hours ago",
        "report spam",
        "t1555",
        "password",
        "t1560",
        "collected data",
        "t1573",
        "channel",
        "t1574",
        "execution flow",
        "scan",
        "iocs",
        "t1497",
        "u0lhmq",
        "mtawmq",
        "t1480",
        "guardrails",
        "t1486",
        "data encrypted",
        "learn more",
        "unsubscribe aug",
        "protocol",
        "t1074",
        "staged",
        "t1083",
        "t1102",
        "web service",
        "t1105",
        "tool transfer",
        "t1140",
        "data engineer",
        "candidate",
        "tlsv1",
        "odigicert inc",
        "stcalifornia",
        "lsan jose",
        "oadobe systems",
        "incorporated",
        "cndigicert sha2",
        "push",
        "next",
        "high",
        "write c",
        "ireland as16509",
        "delete",
        "dirty",
        "tags",
        "t1012",
        "flow endpoint",
        "security scan",
        "t1106",
        "copyright",
        "levelblue"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 608,
        "FileHash-SHA1": 433,
        "FileHash-SHA256": 3663,
        "URL": 17104,
        "domain": 1316,
        "email": 39,
        "hostname": 4208,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 27388,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6892a73593f73dfc969779b0",
      "name": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns",
      "description": "Part I | Track | Locate | Political & Civil society \u2018news\u2019 campaigns\n*[ddddd.msg]\n[http://tracking.eu1.glintinc.com]\n[stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd]\n[stackstorm.ops.dev.az.glintinc.com]\n\u2022 http://stormer5v52vjsw66jmds7ndeecudq444woadhzr2plxlaayexnh6eqd.onion/peter-thiel-running-database-to-root-out-those-disloyal-to-the-leader/\\n \u2022\n[http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/360]\n[http://pixelrz.com/lists/keywords/tsara-brashears-dead/360]",
      "modified": "2025-09-05T00:03:23.223000",
      "created": "2025-08-06T00:52:05.051000",
      "tags": [
        "url http",
        "small",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "tellyoun",
        "n aug",
        "entries",
        "data upload",
        "extraction",
        "windows error",
        "june",
        "fwd urgent",
        "justice czech",
        "copy sha256",
        "rejectedfailed",
        "timestamp input",
        "message status",
        "actions august",
        "file",
        "actions june",
        "actions may",
        "cta4 https",
        "context related",
        "associated urls",
        "campaigncodedsc",
        "language",
        "uid http",
        "community",
        "sha256",
        "size42b type",
        "submitted",
        "august",
        "april",
        "internal error",
        "previous1",
        "iframe",
        "community score",
        "scan analysis",
        "malicious",
        "intelligence",
        "learn",
        "falcon sandbox",
        "submissions",
        "status",
        "adversaries",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "windows folder",
        "found",
        "dlls",
        "impact",
        "chromeua",
        "optout",
        "object",
        "path",
        "value",
        "access type",
        "setval",
        "windir",
        "localappdata",
        "null",
        "win64",
        "error",
        "generator",
        "close",
        "roboto",
        "date",
        "format",
        "light",
        "span",
        "template",
        "void",
        "android",
        "body",
        "trident",
        "mexico",
        "sonic",
        "black",
        "critical",
        "desktop",
        "dark",
        "meta",
        "this",
        "hybrid",
        "apache",
        "write",
        "crypto",
        "autodetect",
        "face",
        "courier",
        "gigi",
        "shadow",
        "click",
        "strings",
        "cray",
        "smwg",
        "eret",
        "footer",
        "infinity",
        "window",
        "canvas",
        "legend",
        "nuke",
        "lion",
        "4629",
        "ahav",
        "olsa",
        "false"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1120",
          "name": "Peripheral Device Discovery",
          "display_name": "T1120 - Peripheral Device Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 9062,
        "domain": 707,
        "hostname": 2318,
        "FileHash-MD5": 86,
        "FileHash-SHA1": 26,
        "FileHash-SHA256": 2096,
        "email": 5,
        "FilePath": 2,
        "URI": 1
      },
      "indicator_count": 14303,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "226 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68732864356c4353e0b1efe2",
      "name": "Denver Post - Custom Malware | Xord",
      "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
      "modified": "2025-08-12T03:05:26.037000",
      "created": "2025-07-13T03:30:44.589000",
      "tags": [
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "entries",
        "url http",
        "domain",
        "ipv4",
        "filehashsha256",
        "hostname",
        "types of",
        "united kingdom",
        "united",
        "germany",
        "france",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "extraction",
        "data upload",
        "failed",
        "se extraction",
        "enter sc",
        "type",
        "extra data",
        "please",
        "include review",
        "exclude sugges",
        "type ol",
        "please sub",
        "langes",
        "include",
        "review data",
        "extrad",
        "manually add",
        "indicator",
        "sc type",
        "included iocs",
        "se extr",
        "review exclude",
        "sugges",
        "extract data",
        "add indicator",
        "domain related",
        "showing",
        "tewdida data",
        "present jul",
        "script urls",
        "a domains",
        "present jun",
        "search",
        "accept encoding",
        "unknown aaaa",
        "present may",
        "date",
        "meta",
        "body",
        "ipv6",
        "role",
        "present jan",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "regexp",
        "typeof e",
        "typeof t",
        "function",
        "width",
        "error",
        "object",
        "x20trnf",
        "pseudo",
        "child",
        "form",
        "class",
        "null",
        "write",
        "this",
        "void",
        "accept",
        "copy",
        "extr please",
        "typ data",
        "indicalok no",
        "gmt max",
        "reverse dns",
        "location united",
        "america flag",
        "ashburn",
        "america asn",
        "dns resolutions",
        "domains top",
        "extri please",
        "review",
        "sugges data",
        "find suxesteu",
        "typ indical",
        "on hos",
        "dynamicloader",
        "medium",
        "show",
        "high",
        "windows",
        "cmd c",
        "delete",
        "next",
        "unknown",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "as15169",
        "execution",
        "dock",
        "persistence",
        "malware",
        "roboto",
        "fwlink",
        "powershell",
        "delete c",
        "guard",
        "win32",
        "passive dns",
        "ransom",
        "trojan",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "pulse",
        "trojandropper",
        "worm",
        "ur extraction",
        "find",
        "types",
        "seard data",
        "source se",
        "url toi",
        "ela fer",
        "iocs",
        "search otx",
        "extr",
        "indicators h",
        "weall",
        "indica",
        "sc data",
        "data u",
        "extre",
        "find s",
        "onv incmde",
        "exclude data",
        "suggested",
        "typ no"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3107,
        "domain": 526,
        "hostname": 940,
        "FileHash-SHA256": 2209,
        "email": 2,
        "FileHash-MD5": 80,
        "FileHash-SHA1": 31,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 6906,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "250 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68732869bad70de69c45c1b3",
      "name": "Denver Post - Custom Malware | Xord",
      "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
      "modified": "2025-08-12T03:05:26.037000",
      "created": "2025-07-13T03:30:49.347000",
      "tags": [
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "entries",
        "url http",
        "domain",
        "ipv4",
        "filehashsha256",
        "hostname",
        "types of",
        "united kingdom",
        "united",
        "germany",
        "france",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "extraction",
        "data upload",
        "failed",
        "se extraction",
        "enter sc",
        "type",
        "extra data",
        "please",
        "include review",
        "exclude sugges",
        "type ol",
        "please sub",
        "langes",
        "include",
        "review data",
        "extrad",
        "manually add",
        "indicator",
        "sc type",
        "included iocs",
        "se extr",
        "review exclude",
        "sugges",
        "extract data",
        "add indicator",
        "domain related",
        "showing",
        "tewdida data",
        "present jul",
        "script urls",
        "a domains",
        "present jun",
        "search",
        "accept encoding",
        "unknown aaaa",
        "present may",
        "date",
        "meta",
        "body",
        "ipv6",
        "role",
        "present jan",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "regexp",
        "typeof e",
        "typeof t",
        "function",
        "width",
        "error",
        "object",
        "x20trnf",
        "pseudo",
        "child",
        "form",
        "class",
        "null",
        "write",
        "this",
        "void",
        "accept",
        "copy",
        "extr please",
        "typ data",
        "indicalok no",
        "gmt max",
        "reverse dns",
        "location united",
        "america flag",
        "ashburn",
        "america asn",
        "dns resolutions",
        "domains top",
        "extri please",
        "review",
        "sugges data",
        "find suxesteu",
        "typ indical",
        "on hos",
        "dynamicloader",
        "medium",
        "show",
        "high",
        "windows",
        "cmd c",
        "delete",
        "next",
        "unknown",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "as15169",
        "execution",
        "dock",
        "persistence",
        "malware",
        "roboto",
        "fwlink",
        "powershell",
        "delete c",
        "guard",
        "win32",
        "passive dns",
        "ransom",
        "trojan",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "pulse",
        "trojandropper",
        "worm",
        "ur extraction",
        "find",
        "types",
        "seard data",
        "source se",
        "url toi",
        "ela fer",
        "iocs",
        "search otx",
        "extr",
        "indicators h",
        "weall",
        "indica",
        "sc data",
        "data u",
        "extre",
        "find s",
        "onv incmde",
        "exclude data",
        "suggested",
        "typ no"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3107,
        "domain": 526,
        "hostname": 940,
        "FileHash-SHA256": 2209,
        "email": 2,
        "FileHash-MD5": 80,
        "FileHash-SHA1": 31,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 6906,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "250 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "673dc97604d5c7076da96877",
      "name": "https://www.vgt.pl/js/jquery-3.2.1.min.js",
      "description": "JQuery v3.2.1 is released by the JS Foundation and is based on the code written by Jeremy Chilcot, the co-creator of the popular web browser, JQuery.",
      "modified": "2025-07-31T22:43:55.771000",
      "created": "2024-11-20T11:35:18.167000",
      "tags": [
        "regexp",
        "error",
        "pseudo",
        "child",
        "sufeffxa0",
        "class",
        "attr",
        "js foundation",
        "typeof module",
        "object",
        "date",
        "null"
      ],
      "references": [
        "https://www.vgt.pl/js/jquery-3.2.1.min.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 172,
        "hostname": 404,
        "URL": 969,
        "domain": 98,
        "FileHash-MD5": 178,
        "FileHash-SHA256": 355,
        "IPv4": 3
      },
      "indicator_count": 2179,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 123,
      "modified_text": "261 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "684c65464466dd19b089f325",
      "name": "Zesp\u00f3\u0142 Profilaktyki i Rehabilitacji w Janowicach Wielkich - YouTube",
      "description": "If d=void 0===c,w(\"trustedResourceUrl\",d: \"Trusted resourceUrl,\" thend=c.src,d, c.js, then d:",
      "modified": "2025-06-13T17:56:28.689000",
      "created": "2025-06-13T17:52:06.399000",
      "tags": [
        "rehabilitacji w",
        "youtube tv",
        "dami jelenia",
        "tv dami",
        "jelenia gra",
        "zakupy wycz",
        "jeli",
        "nie korzystasz",
        "filmy",
        "aby tego",
        "copyright",
        "closure library",
        "argument",
        "ifunction",
        "error",
        "null",
        "type",
        "cast",
        "webchannel",
        "su2028u2029",
        "chrome",
        "xmlhttp",
        "kkvoid",
        "remotecontrol",
        "android",
        "unknown",
        "screen",
        "desktop",
        "function",
        "string",
        "array",
        "number",
        "vfunction",
        "f8192",
        "n432",
        "true",
        "j2048",
        "this",
        "window",
        "void",
        "date",
        "pokau017c",
        "pytfunction",
        "fe8function",
        "qgzfunction",
        "afunction",
        "hb28",
        "r150",
        "promise",
        "bigint",
        "post",
        "edge",
        "swhealthlog",
        "symbol",
        "trident",
        "infinity",
        "embed",
        "webkitkeyframes",
        "zoomin",
        "zoominx",
        "zoomoutx",
        "zoominy",
        "zoomouty",
        "2000px",
        "90deg",
        "20px",
        "30deg",
        "30px",
        "10px",
        "10deg",
        "3deg",
        "5deg",
        "djmegamenu",
        "use license",
        "tabindex",
        "menu",
        "close",
        "msie",
        "beforechange",
        "imagehassize",
        "buildcontrols",
        "magnific popup",
        "dmitry semenov",
        "http",
        "beforeclose",
        "afterclose",
        "open",
        "next",
        "open source",
        "bsd license",
        "george mcginley",
        "smith",
        "djimageslider",
        "subpackage",
        "webkit",
        "khtml",
        "icab",
        "countto",
        "callback",
        "handler",
        "object",
        "typeof",
        "method",
        "gnugplv2",
        "website",
        "set module",
        "height script",
        "regexp",
        "screenheight",
        "highcontrast2",
        "highcontrast3",
        "highcontrast",
        "wide",
        "night",
        "body",
        "normalbutton",
        "cookie plugin",
        "https",
        "klaus hartl",
        "mit license",
        "register",
        "nodecommonjs",
        "factory",
        "jquery",
        "write",
        "sticky bar",
        "stickybar",
        "count",
        "offcanvas",
        "html",
        "noscroll",
        "offcanvas var",
        "toggle nav",
        "click jquery",
        "ajax",
        "autocomplete",
        "tomas kirda",
        "typeof define",
        "esc27",
        "tab9",
        "return13",
        "left37",
        "up38",
        "twitter",
        "custom version",
        "joomla",
        "rolemenu",
        "boolean",
        "get adobe",
        "flash player",
        "title",
        "text",
        "typeof data",
        "typeof s",
        "accept",
        "width",
        "foundation",
        "backspace8",
        "comma188",
        "delete46",
        "down40",
        "end35",
        "enter13",
        "escape27",
        "value",
        "migrate",
        "backcompat",
        "quirks mode",
        "typeof f",
        "xtablet768",
        "document",
        "ui sortable",
        "leftright",
        "gnu general",
        "public license",
        "dddddd",
        "ffffcc",
        "eeeeee",
        "verdana",
        "geneva",
        "arial",
        "helvetica",
        "f0f0f0",
        "sans",
        "charset",
        "utf8",
        "fontawesome",
        "typeof b",
        "pseudo",
        "child",
        "sufeffxa0",
        "class",
        "attr",
        "general slider",
        "slide",
        "rgba",
        "navigation",
        "15deg",
        "300px",
        "20deg",
        "transition",
        "scale",
        "baskerville",
        "main image",
        "bdbdbd",
        "f3f3f3",
        "remove",
        "fontface",
        "woff2",
        "u0131",
        "u01520153",
        "u02bb02bc",
        "u02c6",
        "u02da",
        "u02dc",
        "u0304",
        "dirrtl",
        "msviewport",
        "href",
        "span",
        "legend",
        "halflings",
        "fieldset",
        "typeimage",
        "f2f2f2",
        "d9edf7",
        "dff0d8",
        "f2dede",
        "thead",
        "tbody",
        "tahoma",
        "00a0",
        "video",
        "script",
        "2500",
        "xnew ita",
        "dnew jta",
        "dataset",
        "orfunction",
        "prfunction",
        "nsafunction",
        "xsafunction",
        "vrfunction",
        "cakes",
        "ovbfunction",
        "pvbfunction",
        "rvbfunction",
        "qvbfunction",
        "tvbfunction",
        "uvbfunction",
        "vvbclass",
        "xvbclass",
        "yvbclass",
        "svbclass",
        "lvafunction",
        "ggfunction",
        "mvafunction",
        "ovafunction",
        "pvafunction",
        "uvafunction",
        "tvafunction",
        "qvafunction",
        "vvafunction",
        "nvaclass",
        "dark",
        "vector",
        "yy49",
        "raster",
        "roboto",
        "new tk",
        "qael",
        "przechyl",
        "mars",
        "mercury",
        "venus",
        "pluto",
        "titan",
        "weakset",
        "wfclass",
        "googlelayer",
        "uint8array",
        "weakmap",
        "5001",
        "mouseevent",
        "webassembly",
        "180180",
        "9090",
        "google maps",
        "javascript api",
        "internal",
        "small",
        "lightrail",
        "false",
        "february",
        "light",
        "hybrid",
        "bounce",
        "drop",
        "inside",
        "outside",
        "marker",
        "gc"
      ],
      "references": [
        "embed.html",
        "ad_status.js.pobrane",
        "f5Y41t9wqY4.html",
        "cast_sender.js.pobrane",
        "remote.js.pobrane",
        "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
        "embed.js.pobrane",
        "www-embed-player.js.pobrane",
        "animate.ext.css",
        "animate.min.css",
        "jquery.djmegamenu.js.pobrane",
        "jquery.djmobilemenu.js.pobrane",
        "magnific.js.pobrane",
        "jquery.easing.min.js.pobrane",
        "slider.js.pobrane",
        "jquery.countTo.js.pobrane",
        "scripts.js.pobrane",
        "magnific-init.js.pobrane",
        "pagesettings.js.pobrane",
        "jquery.cookie.js.pobrane",
        "stickybar.js.pobrane",
        "fontswitcher.js.pobrane",
        "offcanvas.js.pobrane",
        "jquery.autocomplete.min.js.pobrane",
        "bootstrap.min.js.pobrane",
        "jcemediabox.js.pobrane",
        "jquery.ui.core.min.js.pobrane",
        "jquery-migrate.min.js.pobrane",
        "layout.min.js.pobrane",
        "jquery.ui.sortable.min.js.pobrane",
        "caption.js.pobrane",
        "finder.css",
        "jquery-noconflict.js.pobrane",
        "djmegamenu.26.css",
        "animations.css",
        "djmobilemenu.css",
        "jquery.min.js.pobrane",
        "djimageslider.css",
        "offcanvas.css",
        "magnific.css",
        "font_switcher.26.css",
        "css",
        "template_responsive.26.css",
        "offcanvas.26.css",
        "bootstrap_responsive.26.css",
        "extended_layouts.26.css",
        "style.css",
        "content.css",
        "template.26.css",
        "bootstrap.26.css",
        "jcemediabox.css",
        "js",
        "onion.js.pobrane",
        "search_impl.js.pobrane",
        "overlay.js.pobrane",
        "map.js.pobrane",
        "util.js.pobrane",
        "search.js.pobrane",
        "common.js.pobrane",
        "geometry.js.pobrane",
        "main.js.pobrane"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Gc",
          "display_name": "Gc",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2779,
        "hostname": 661,
        "domain": 684,
        "email": 4,
        "FileHash-MD5": 1,
        "FileHash-SHA256": 689
      },
      "indicator_count": 4818,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "309 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "664b74b2683dec84891aef96",
      "name": "PrivateLoader is a malware with a module structure that has the capability is to download and execute one or several payloads",
      "description": "http://185.172.128.69/batushka/inte.exe  \nhttp://185.172.128.69/allnewumm.exe\nhttp://185.172.128.69/brandumma.exe\nhttp://185.172.128.69/files\nhttp://185.172.128.69/files/US.file\nhttp://185.172.128.69/latestumma.exe\nhttp://185.172.128.69/newumma.exe\nhttp://185.172.128.69/sekundumma.exe\nhttp://185.172.128.69/ummanew.exe",
      "modified": "2024-10-14T20:36:05.361000",
      "created": "2024-05-20T16:05:06.313000",
      "tags": [
        "stdin via",
        "nextron",
        "powershell id",
        "powershell",
        "tim rauch",
        "elastic",
        "script block",
        "logging",
        "pe32",
        "ms windows",
        "intel",
        "nazwa typ",
        "md5 nazwa",
        "procesu"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 7268,
        "domain": 1310,
        "URL": 8101,
        "FileHash-SHA1": 1615,
        "hostname": 2590,
        "FileHash-MD5": 1852,
        "email": 267,
        "SSLCertFingerprint": 3,
        "CIDR": 38,
        "CVE": 7,
        "IPv4": 15,
        "YARA": 4
      },
      "indicator_count": 23070,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 135,
      "modified_text": "551 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://g.a.call/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://g.a.call/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776615524.1851451
}