{
  "type": "URL",
  "indicator": "https://gateway.hleen.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://gateway.hleen.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3403091007,
      "indicator": "https://gateway.hleen.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69e434769e2a43c088066ca2",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
          "description": "",
          "modified": "2026-04-19T07:36:41.138000",
          "created": "2026-04-19T01:48:38.335000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654a7a53317c717d1f4fee7f",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2,
            "IPv4": 1
          },
          "indicator_count": 18567,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b2730aa46a25d7949daa8d",
          "name": "apple retail dnspionage clone octoseek",
          "description": "",
          "modified": "2026-04-11T00:03:57.096000",
          "created": "2026-03-12T08:02:18.609000",
          "tags": [
            "Ghost RAT",
            "WebToolbar",
            "Nanocore RAT",
            "GameHack",
            "Cobalt Strike",
            "RedlineStealer",
            "HallGrand",
            "InstallCore",
            "InstallBrain",
            "Emotet",
            "Tofsee",
            "InMortal",
            "Bradesco",
            "Agent Tesla",
            "Mitre",
            "Pyscpa",
            "TrojanSpy",
            "SuppoBox",
            "Occamy",
            "DNSPIONAGE",
            "Stealer",
            "Password",
            "Apple",
            "Retail",
            "Cherry Creek Colorado",
            "Bot Networks",
            "Ghost RAT",
            "Networm"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658a2b6cfdcfeec5db5f31a1",
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7996,
            "FileHash-SHA1": 3921,
            "FileHash-SHA256": 5341,
            "hostname": 2108,
            "domain": 1005,
            "URL": 5635,
            "CIDR": 2,
            "CVE": 21,
            "email": 28
          },
          "indicator_count": 26057,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "9 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d32648280eb859dfca1c19",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:48.037000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "567 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d3264283628d23b8f28b9d",
          "name": "x.com - That's what friends are for!",
          "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
          "modified": "2024-09-30T10:01:49.889000",
          "created": "2024-08-31T14:18:42.621000",
          "tags": [
            "referrer",
            "historical ssl",
            "united",
            "as13414 twitter",
            "nxdomain",
            "whitelisted",
            "cname",
            "a nxdomain",
            "status",
            "aaaa",
            "as15133 verizon",
            "search",
            "date",
            "twitter",
            "spoofed",
            "qbot qakbot",
            "qbot",
            "information",
            "t1027",
            "files",
            "t1036",
            "t1041",
            "c2 channel",
            "t1056",
            "capture",
            "t1057",
            "discovery",
            "memcommit",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "intel",
            "ms windows",
            "trojan",
            "copy",
            "write",
            "win64",
            "next",
            "url https",
            "qbot type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "showing",
            "entries",
            "msie",
            "windows nt",
            "formsecnen",
            "read",
            "read c",
            "russia as48848",
            "qmount",
            "unknown",
            "pecompact",
            "malware",
            "role title",
            "added active",
            "related pulses",
            "type indicator",
            "as44273 host",
            "name servers",
            "as47846",
            "germany unknown",
            "443 ma2592000",
            "scan endpoints",
            "passive dns",
            "urls",
            "creation date",
            "all scoreblue",
            "hostname",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "months ago",
            "ipv4",
            "report spam",
            "tinynote",
            "cobalt strike",
            "ransomexx",
            "quackbot",
            "comspec",
            "prefetch8",
            "pattern match",
            "prefetch1",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "path",
            "hybrid",
            "general",
            "click",
            "strings",
            "langchinese",
            "icmp traffic",
            "pe resource",
            "pe section",
            "companyname gm",
            "win32",
            "push",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "hostnames",
            "urls https",
            "overview ip",
            "address",
            "related nids",
            "files hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "virustotal",
            "china unknown",
            "as4837 china",
            "redacted for",
            "as4835 china",
            "douglas county",
            "co sheriff",
            "office",
            "pegasus attacks",
            "sa victim",
            "cve type",
            "cve cve20170147",
            "no expiration",
            "expiration",
            "domain",
            "create new",
            "subsys00000000",
            "as16625 akamai",
            "as20940",
            "as39960",
            "as6762 telecom",
            "united kingdom",
            "emails",
            "span",
            "created",
            "white",
            "formatpng feb",
            "refererparam",
            "classid1",
            "login0",
            "typeid1",
            "style1",
            "dynamicloader",
            "high",
            "yara rule",
            "neshta",
            "neshta virus",
            "myapp",
            "ids detections",
            "yara detections",
            "alerts",
            "worm",
            "delphi",
            "ip address",
            "files location",
            "china flag",
            "china domain",
            "pulses otx",
            "pulses",
            "as45102 alibaba",
            "japan unknown",
            "as32934",
            "as19679 dropbox",
            "pulse pulses",
            "google safe",
            "browsing",
            "hosting",
            "body",
            "as7018 att",
            "verdict vpn",
            "as9009 m247",
            "canada unknown",
            "as174 cogent",
            "israel unknown",
            "as12310",
            "romania unknown",
            "as48945",
            "as64286",
            "b3viles0 feb",
            "modified",
            "siteid290",
            "org7",
            "novno jan",
            "siteid289",
            "org4",
            "org9",
            "locuo",
            "siteid969",
            "https",
            "http",
            "rims https",
            "evader",
            "message",
            "jeffrey scott",
            "reimer dpt",
            "pegasus",
            "pinterest",
            "amadey",
            "quasar rat",
            "eternalblue",
            "service",
            "sahil",
            "andcustomer"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Netherlands",
            "Italy",
            "United Kingdom of Great Britain and Northern Ireland",
            "Japan",
            "Korea, Republic of",
            "France",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2161,
            "FileHash-SHA1": 2073,
            "FileHash-SHA256": 7032,
            "domain": 3959,
            "hostname": 7581,
            "email": 22,
            "URL": 17579,
            "SSLCertFingerprint": 3,
            "CVE": 2
          },
          "indicator_count": 40412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "567 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85e73efe2e053366ed972",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-09-05T06:21:34.047000",
          "created": "2024-01-30T02:26:59.218000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6145,
            "URL": 14252,
            "hostname": 4778,
            "domain": 6809,
            "CVE": 3
          },
          "indicator_count": 32339,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "592 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653a092e3e9270a3ccff2aa0",
          "name": "Apple iOS compromise. CVE Jar",
          "description": "ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable.exe\nTargets Tsara Brashears iPhone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \n\nTarget at eminent risk",
          "modified": "2024-08-28T12:01:51.699000",
          "created": "2023-10-26T06:37:34.613000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye",
            "noname057",
            "adult content",
            "pornographer",
            "attack",
            "unsafe",
            "tulach malware",
            "remote attacks",
            "Rat"
          ],
          "references": [
            "1.116.132.182/weblogic_CVE_2020_2551.jar",
            "http://1.116.132.182/.git/HEAD"
          ],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            },
            {
              "id": "NoName057",
              "display_name": "NoName057",
              "target": null
            },
            {
              "id": "Network RAT",
              "display_name": "Network RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 984,
            "URL": 2184,
            "domain": 274,
            "hostname": 782,
            "CVE": 10
          },
          "indicator_count": 4425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "599 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85faa9b8e3e1206d7f25c",
          "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection ",
          "description": "",
          "modified": "2024-06-15T04:39:29.943000",
          "created": "2024-01-30T02:32:10.210000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659719b77c383c73c05208a9",
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3503,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "674 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e3d1a94659d50264a78fd4",
          "name": "Phishing | TabExplorer attacks compromised networks and devices",
          "description": "",
          "modified": "2024-04-02T01:01:20.068000",
          "created": "2024-03-03T01:26:01.043000",
          "tags": [
            "command decode",
            "suricata ipv4",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "suricata udpv4",
            "date",
            "united",
            "windows nt",
            "win64",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "url http",
            "url https",
            "scan endpoints",
            "all octoseek",
            "report spam",
            "hour ago",
            "whois record",
            "glasgow",
            "scan",
            "iocs",
            "next",
            "filehashsha256",
            "filehashmd5",
            "filehashsha1",
            "ipv4",
            "contacted",
            "execution",
            "pe resource",
            "communicating",
            "urls http",
            "referrer",
            "resolutions",
            "whois whois",
            "collections ip",
            "phishing",
            "attack",
            "loaded module",
            "remote procedure call",
            "search",
            "as15133 verizon",
            "passive dns",
            "urls",
            "creation date",
            "record value",
            "showing",
            "unknown",
            "as8075",
            "as15169 google",
            "as8068",
            "aaaa",
            "cname",
            "a domains",
            "meta",
            "entries",
            "gmt server",
            "ecacc saa83dd",
            "cobalt strike",
            "mozilla",
            "body",
            "brian sabey",
            "hallrender",
            "dynamicloader",
            "show",
            "alerts",
            "trojan",
            "copy",
            "dynamic",
            "medium",
            "reads",
            "write",
            "stealth network",
            "stealth_network",
            "script urls",
            "certificate",
            "rsa sha256",
            "exports data",
            "high",
            "yara rule",
            "yara detections",
            "njrat",
            "cape",
            "njrat malware",
            "sniffs",
            "guard",
            "write c",
            "delete c",
            "ms windows",
            "default",
            "intel",
            "openpgp public",
            "stream",
            "antivm_generic_disk",
            "antivm_generic_bios",
            "network_bind",
            "stealth_file spawns_dev_utility",
            "procmem_yara",
            "enumerates_physical_drives",
            "persistence_ads",
            "dynamic_function_loading",
            "reads_self",
            "suspicious_command_tools",
            "network",
            "rat"
          ],
          "references": [
            "http://www.tabxexplorer.com [phishing]",
            "http://www.tabxexplorer.com/lenovo",
            "GET /lenovo HTTP/1.1 Host: www.tabxexplorer.com Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0",
            "identity_helper.exe",
            "cdn.easykeys.com",
            "hive21.ctcsoftware.com",
            "www.moxa.com",
            "msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com",
            "IDS Detections: Cobalt Strike Malleable C2 JQuery",
            "IDS Detections: Nullsoft Mozilla UA (NSISDL)",
            "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla))",
            "IDS Detections: SSL excessive fatal alerts (possible POODLE attack against server)",
            "IDS Detections: GENERIC Likely Malicious Fake IE Downloading .exe",
            "Tulach Malware: 114.114.114.114",
            "ns3.hallgrandsale.ru",
            "AgentTesla.KM: FileHash-MD5 e0801d62e8379b98177fd94a027e8b30",
            "AgentTesla.KM: FileHash-SHA1 0fa00a939ca8af08c90310b808d1d8fc70a518c3",
            "Yara Detection: Nullsoft_NSIS"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "ALF:Trojan:MSIL/AgentTesla.KM",
              "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
              "target": null
            },
            {
              "id": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
              "display_name": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
              "target": "/malware/ALF:Win32/GbdInf_305B1C9A.J!ibt"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HackTool:Win32/CobaltStrike.A",
              "display_name": "HackTool:Win32/CobaltStrike.A",
              "target": "/malware/HackTool:Win32/CobaltStrike.A"
            },
            {
              "id": "HackTool:Win32/Atosev.A",
              "display_name": "HackTool:Win32/Atosev.A",
              "target": "/malware/HackTool:Win32/Atosev.A"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Win.Malware.Generickdz-9938530-0",
              "display_name": "Win.Malware.Generickdz-9938530-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Civil Society",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5551,
            "hostname": 1690,
            "domain": 929,
            "FileHash-SHA256": 2696,
            "FileHash-MD5": 405,
            "FileHash-SHA1": 315,
            "email": 4,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 11591,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "748 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b93e70b75e7dce7168f4dd",
          "name": "Google - Lumma Stealer| QakBot | Emotet",
          "description": "Lumma is classified as a stealer - a type of malware that extracts sensitive information from infected devices.\n\nYou can't see it. You will see https://www.google.com and your search. It's hidden spyware. extremely malicious. Targeted individual.",
          "modified": "2024-02-29T17:01:09.717000",
          "created": "2024-01-30T18:22:40.905000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "historical ssl",
            "referrer",
            "urls url",
            "whois whois",
            "october",
            "resolutions",
            "august",
            "execution",
            "installer",
            "iframe",
            "malware",
            "core",
            "emotet",
            "lumma stealer",
            "ransomexx",
            "azorult",
            "ursnif",
            "hacktool",
            "june",
            "qakbot",
            "qbot",
            "april",
            "targeting",
            "tsara brashears",
            "active threat"
          ],
          "references": [
            "google.com.uy [Google search browser, masked, links to malicious porn malware spreader, malvertizing, collection host]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ iOS unlocker & password cracker]",
            "toolbarqueries.google.com.uy"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "Qbot",
              "display_name": "Qbot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 50,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 3377,
            "hostname": 2502,
            "URL": 8531,
            "domain": 1250,
            "CVE": 2
          },
          "indicator_count": 15758,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "780 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2418a73d5d36efff0b0f7",
          "name": "Lotus -Game-Version-Update.exe | trojan.onlinegames/aoks",
          "description": "Potentially downloads with other malware. Remote.  Downloads installer. Alerts victim of a compromise, (through an update)attempts to have user purchases fix.",
          "modified": "2024-02-12T06:00:23.986000",
          "created": "2024-01-13T07:53:46.481000",
          "tags": [
            "langchinese",
            "rtcursor",
            "rtgroupcursor",
            "lotus",
            "regsetvalueexa",
            "write",
            "search",
            "regdword",
            "create c",
            "read c",
            "trojan",
            "copy",
            "win32",
            "malware",
            "agent",
            "unknown",
            "next",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "gameid0 http",
            "please",
            "xport",
            "malware infection",
            "default",
            "crlf line",
            "unicode",
            "showing",
            "show",
            "medium",
            "compiler",
            "submission",
            "vhash",
            "imphash",
            "rich pe",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "ms windows",
            "intel",
            "simplified",
            "sections",
            "sha256 file",
            "type type",
            "chi2",
            "vs2003",
            "highlights",
            "file",
            "file version",
            "description",
            "original",
            "internal name",
            "version",
            "portable",
            "info compiler",
            "products",
            "whois record",
            "contacted",
            "pe resource",
            "whois whois",
            "historical ssl",
            "ssl certificate",
            "resolutions",
            "subdomains",
            "referrer",
            "pippidxsd",
            "execution",
            "stealer",
            "benjamin",
            "worm",
            "rar",
            "pe",
            "pexee",
            "crack",
            "remote",
            "download",
            "registrar abuse",
            "date",
            "redacted for",
            "server",
            "letshost",
            "domain status",
            "registry tech",
            "registrar whois",
            "contact email",
            "registry domain",
            "code",
            "service",
            "algorithm",
            "first",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "win32 dll",
            "ace utilities",
            "unhackme",
            "type name",
            "wextract",
            "total commander",
            "powerpack",
            "windows doctor",
            "tagwrapcore",
            "communicating",
            "51260032",
            "61760164",
            "bundled",
            "scam",
            "password",
            "fraud services",
            "cybercrime"
          ],
          "references": [
            "Game-Version-Update.exe",
            "File: 2373aaec6f38bb129aab12741f2d8be237e0629db1f50206bae0ebefd959815a",
            "history.ie",
            "Yara ruleset match: Windows_API_Function by InQuest Labs",
            "registry-commander.exe",
            "password-recovery-tools-2012-professional-trial.exe",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [how could this be in everything!?]",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "https://mail.greycroft.com/owa/redir.aspx?SURL=zRgJdPcEmzMcui5aPZuMhrMWFaQp7UWJt7B48ki50f3tl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwBpAHQAdQBuAGUAcwAuAGEAcABwAGwAZQAuAGMAbwBtAC8AdQBzAC8AYQBwAHAALwBhAG4AaQBtAGEAdABpAGMALQBiAHkALQBpAG4AawBiAG8AYQByAGQALwBpAGQAMQAwADUAMgAzADcAOQAxADUANAA_AGwAcwA9ADEAJgBtAHQAPQA4AA..&URL=https://itunes.apple.com/us/app/animatic-by-inkboard/id1052379154?ls=1&mt=8",
            "https://mediacherry.space/vn/vb/wheel/?key=eyJ0aW1lc3RhbXAiOiIxNzA0ODcwMzc2IiwiaGFzaCI6ImI5OWQ3ODQ3NTIyMDA5NTBmNmRiODY1NmUxNWY5YWMyZTc3MGExMTcifQ==&ccc=VN&ppp=PropellerAds:Popunder&tdom=www.a1000.online&zoneid=6534225&bemobdata=c=2f8cb72d-d2e6-4570-b258-aeb3acc53b24..l=6d25aa09-cccc-4797-aef4-7aa11d1e0dcb..a=0..b=0..z=0.000035..e=768844675632074752..c1=6534225..c2=7541054..c3=VN..c4=wireless..c5=viettel_mobile-vn..c6=other..c7=chrome..c8=27..c9=viettelcorporation..c10=Mozilla/5~BEMOB_DOT~0(Linux;Android10;K",
            "device-local-bf56eb52-6fc6-435b-aadb-9fa1dd89702c.remotewd.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:Agent-AOKS\\ [Trj]",
              "display_name": "Win32:Agent-AOKS\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Bho-136",
              "display_name": "Win.Trojan.Bho-136",
              "target": null
            },
            {
              "id": "Trojan:Win32/BHO.CV",
              "display_name": "Trojan:Win32/BHO.CV",
              "target": "/malware/Trojan:Win32/BHO.CV"
            },
            {
              "id": "trojan.onlinegames/aoks",
              "display_name": "trojan.onlinegames/aoks",
              "target": null
            },
            {
              "id": "Worm:Win32/Benjamin",
              "display_name": "Worm:Win32/Benjamin",
              "target": "/malware/Worm:Win32/Benjamin"
            },
            {
              "id": "CRACK_UnHackMe_sigma.rar",
              "display_name": "CRACK_UnHackMe_sigma.rar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 679,
            "FileHash-SHA1": 630,
            "FileHash-SHA256": 4958,
            "URL": 4966,
            "domain": 437,
            "hostname": 1429,
            "email": 1
          },
          "indicator_count": 13100,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "798 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659cb577ce7e1a4009a6be2f",
          "name": "Worm:Win32/Benjamin | Miles IT| Emotet | M. Brian Sabey | Striven.com",
          "description": "Continuously attacking, remote attacks, social engineering via adware, phone contact, email, malware filled , unsolicited videos. Remotely control devices. Relentlessly hacking everything.  They go by many names. These are Americans, they tend to direct some of their activities to Chinese servers to avoid detection. Obnoxious. Revenge child to adult content. Malvertizing. If hacking is illegal it doesn't seem worthwhile to stop. No one stops these people even if known to authorities. The also self whitelist.",
          "modified": "2024-02-08T02:00:24.265000",
          "created": "2024-01-09T02:54:47.653000",
          "tags": [
            "ssl certificate",
            "contacted",
            "historical ssl",
            "whois record",
            "whois whois",
            "lemon duck",
            "highly targeted",
            "subdomains",
            "resolutions",
            "driver support",
            "metro",
            "core",
            "ransomexx",
            "quasar",
            "colibri loader",
            "remcos",
            "evilnum",
            "asyncrat",
            "matanbuchus",
            "cobalt strike",
            "korplug",
            "agent tesla",
            "attack",
            "project",
            "tsara brashears",
            "hackers",
            "critical risk",
            "installer",
            "formbook",
            "mitre attack",
            "dynamicloader",
            "high",
            "yara rule",
            "ids detections",
            "yara detections",
            "cape",
            "adware malware",
            "suricata",
            "etpro malware",
            "et malware",
            "guard",
            "june",
            "copy",
            "delphi",
            "win32",
            "et",
            "united",
            "asnone united",
            "status",
            "name servers",
            "cname",
            "creation date",
            "search",
            "showing",
            "entries",
            "passive dns",
            "date",
            "urls",
            "expiration date",
            "copy c",
            "pe32",
            "intel",
            "ms windows",
            "write c",
            "nids",
            "checkin",
            "packing t1045",
            "t1045",
            "worm",
            "malware",
            "code",
            "write",
            "date hash",
            "avast avg",
            "mtb dec",
            "pe32 executable",
            "show",
            "recon",
            "benjamin"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 741,
            "FileHash-SHA1": 655,
            "FileHash-SHA256": 2432,
            "URL": 2392,
            "CVE": 3,
            "domain": 645,
            "hostname": 803,
            "email": 3
          },
          "indicator_count": 7674,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "802 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659ca1cc8d432e6dff4ad5ed",
          "name": "STRIVEN.COM | Remote videos to my device | Disabled WiFi & Bluetooth | Malicious",
          "description": "",
          "modified": "2024-02-08T01:03:54.993000",
          "created": "2024-01-09T01:30:52.562000",
          "tags": [
            "as21690",
            "united",
            "unknown",
            "search",
            "entries",
            "creation date",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d65255c80d866add600bac",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1467,
            "hostname": 2306,
            "email": 1,
            "URL": 7023,
            "FileHash-MD5": 120,
            "FileHash-SHA1": 120,
            "FileHash-SHA256": 3205,
            "CVE": 13
          },
          "indicator_count": 14255,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "802 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d65255c80d866add600bac",
          "name": "STRIVEN.COM",
          "description": "Miles IT escalated target to a bad actors using striven.com, a malicious proxy. It's reminiscent of /related to  an alleged Australian hacker;, Handle: Michael Roberts who owned 2 companies (Rexxfield and Mile2) Makes claims of catching killers, etc. Known online on infected devices for malicious code injection and a corny , nonsensical feud with a 'Darren Meade' .\nTarget has been linked to Michael Roberts and Tracey Richter for years. 'Roberts' is Used by defense attorneys to silence victims. Believed to be a fake identity for. Red Team CSDF. (Included upon submission. I didn't write this : A search for GoDaddy.com has been conducted by a team of experts at the University of California, Los Angeles, and the US National Security Agency (NSA) in a series of tests.)",
          "modified": "2024-02-08T00:01:41.906000",
          "created": "2023-08-11T15:23:01.014000",
          "tags": [
            "as21690",
            "united",
            "unknown",
            "search",
            "entries",
            "creation date",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1465,
            "hostname": 2268,
            "email": 1,
            "URL": 6929,
            "FileHash-MD5": 120,
            "FileHash-SHA1": 120,
            "FileHash-SHA256": 3185,
            "CVE": 13
          },
          "indicator_count": 14101,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "802 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8f1e5db08cf140cdea23",
          "name": "TinyNote | Douglas County, Co Sheriff's Office | Pegasus Attacks SA victim ",
          "description": "",
          "modified": "2024-02-03T19:08:14.934000",
          "created": "2024-02-03T19:08:14.934000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85d301a253bd67048cbba",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "806 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be8e4a55f5851279c265c8",
          "name": "https://www.hallrender.com/attorney/brian-sabey/ Gopher Ransomware ",
          "description": "",
          "modified": "2024-02-03T19:04:42.251000",
          "created": "2024-02-03T19:04:42.251000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85e73efe2e053366ed972",
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a7e6e042a968005f7a5552",
          "name": "Content Reputation | ET | Botnet | Targeting",
          "description": "",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-01-17T14:40:32.084000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659719b77c383c73c05208a9",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bc13594cf21dbe00b94807",
          "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection",
          "description": "",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-02-01T21:55:37.581000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b85faa9b8e3e1206d7f25c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659719b77c383c73c05208a9",
          "name": "Content Reputation | ET | Botnet | Targeting",
          "description": "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
          "modified": "2024-02-03T19:04:07.916000",
          "created": "2024-01-04T20:48:55.431000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls http",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "whois whois",
            "apple ios",
            "contacted",
            "tsara brashears",
            "whois",
            "resolutions",
            "password",
            "hacktool",
            "crypto",
            "execution",
            "emotet",
            "installer",
            "banker",
            "keylogger",
            "critical",
            "copy",
            "content reputation",
            "et",
            "submission",
            "comodo valkyrie",
            "verdict",
            "bitdefender",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "search",
            "entries",
            "passive dns",
            "urls",
            "record value",
            "unknown",
            "united",
            "gmt content",
            "dynamic report",
            "0 report",
            "date",
            "accept",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "http response",
            "final url",
            "serving ip",
            "address",
            "ipv4",
            "files",
            "location china",
            "asn as45090",
            "dns resolutions",
            "twitter",
            "log id",
            "gmtn",
            "tls web",
            "encrypt",
            "ca issuers",
            "f20b201c",
            "b467295d",
            "b2931e3f",
            "false",
            "as15169 google",
            "domain",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "create c",
            "write c",
            "read c",
            "medium",
            "next",
            "dock",
            "write",
            "persistence",
            "delete c",
            "path",
            "xport",
            "default",
            "years ago",
            "modified",
            "created",
            "email",
            "active created",
            "white",
            "filehash",
            "memcommit",
            "tlsv1",
            "show",
            "win32",
            "malware",
            "get na",
            "systemroot",
            "starizona",
            "lscottsdale",
            "creation date",
            "emails",
            "domain name",
            "showing",
            "pulse submit",
            "amazon",
            "server ca",
            "b535",
            "tulach",
            "hallrender",
            "hallgrand",
            "briansabey",
            "brian sabey",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "cybercrime",
            "cyber stalking",
            "botnet",
            "evader",
            "hacker",
            "targeting"
          ],
          "references": [
            "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
            "dvd-game-new-releases.info",
            "1.116.217.151 [Cobalt Strike]",
            "https://www.myminiweb.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "http://alohatube.xyz/search/tsara-brashears",
            "vtbehaviour.commondatastorage.googleapis.com",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://tulach.cc/",
            "ns3.hallgrandsale.ru"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13324,
            "FileHash-MD5": 718,
            "FileHash-SHA1": 617,
            "FileHash-SHA256": 5761,
            "domain": 3501,
            "hostname": 4475,
            "CVE": 1,
            "email": 3,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 28411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "806 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85d301a253bd67048cbba",
          "name": "TinyNote | Douglas County, Co Sheriff's Office | Pegasus Attacks SA victim ",
          "description": "",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-30T02:21:36.334000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a2e3ebbb1bdfd541af3e91",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "809 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2e3ebbb1bdfd541af3e91",
          "name": "TinyNote | Douglas County, Colorado Sheriff's Office?",
          "description": "",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-13T19:26:35.621000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6593c7224a0e8926c28f73d5",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "809 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6593c7224a0e8926c28f73d5",
          "name": "TinyNote | Douglas County, Colorado Sheriff's Office?",
          "description": "Sent to me by D*n*i*  M. P*r**h. I can't comprehend. Looks like framing and cyber tracking pf a SA victim by a sheriff best friend of reporting doctor whose wife is Douglas Co coroner. Reporting MD threatened and warned  Brashears of what would happen then warned SA PT by relating issues. Targets and associated as severe risk.",
          "modified": "2024-02-01T07:00:20.140000",
          "created": "2024-01-02T08:19:45.693000",
          "tags": [
            "june",
            "whois record",
            "ssl certificate",
            "threat roundup",
            "september",
            "roundup",
            "problems",
            "threat network",
            "drive",
            "march",
            "february",
            "startpage",
            "installer",
            "cobalt strike",
            "cobaltstrike",
            "whois whois",
            "referrer",
            "malicious",
            "quackbot",
            "tinynote",
            "contacted",
            "hacktool",
            "ransomexx",
            "name verdict",
            "falcon sandbox",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "getprocaddress",
            "prefetch8",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "indicator",
            "file",
            "observed email",
            "united",
            "null",
            "path",
            "date",
            "twitter",
            "factory",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "tsara brashears",
            "corruption",
            "sherrif",
            "douglas county",
            "framing",
            "hacking",
            "tracking",
            "infostealer",
            "porn",
            "critical",
            "danger",
            "spurlock"
          ],
          "references": [
            "https://twitter.com/sheriffspurlock?lang=en",
            "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "nr-data.net",
            "https://ww11.0123movie.net/icons/apple-touch-icon.png",
            "https://ww9.0123movie.net/icons/apple-touch-icon.png",
            "apple-identifiant.info",
            "cs001.informativeremail-apple.zoom.com.cn",
            "0-i-0.xyz",
            "0-courier.push.apple.com",
            "https://www.anyxxxtube.net/media/favicon/apple",
            "message.htm.com",
            "joebiden.com",
            "familyhandyman.com",
            "deadlineday.twitter.com",
            "https://autodiscover.socket.net/Autodiscover/DEADJOE",
            "http://watchhers.net/index.php",
            "69.197.153.180",
            "This is all too strange! Corruption or Spoofed?",
            "quackbot? Qbot qakbot positive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TinyNote",
              "display_name": "TinyNote",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "QuackBot",
              "display_name": "QuackBot",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7190,
            "FileHash-MD5": 157,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 2281,
            "domain": 2139,
            "hostname": 2485,
            "CVE": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 14372,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "809 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b85e7056e146f1416eae32",
          "name": "https://www.hallrender.com/attorney/brian-sabey/",
          "description": "",
          "modified": "2024-01-30T02:26:56.698000",
          "created": "2024-01-30T02:26:56.698000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "811 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74ee93a0b0dc9c960cee",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:50:54.481000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "815 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658b74f4a6c53cc8e0f70611",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/",
          "description": "A report generated by the MITRE ATT&CK\u2122 security team on 26 December 2023 is published on the website of Brian Sabey, the lawyer who brought the UK government to court.",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T00:51:00.982000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "815 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ca37e41ea135fa35b8832",
          "name": "Masquerading: https://www.hallrender.com/attorney/brian-sabey/ ",
          "description": "",
          "modified": "2024-01-26T00:00:39.927000",
          "created": "2023-12-27T22:21:50.409000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "sample",
            "ssl certificate",
            "feeds ioc",
            "analyze",
            "whois record",
            "contacted",
            "historical ssl",
            "resolutions",
            "threat roundup",
            "referrer",
            "contacted urls",
            "august",
            "execution",
            "njrat",
            "ransomware",
            "gopher",
            "formbook",
            "whois ssl",
            "communicating",
            "obz4usfn0 url",
            "cfqirgdhj5 url",
            "obz4usfn0",
            "sfqh4dt74w0 url",
            "cfqirgdhj5",
            "localappdata",
            "temp",
            "getprocaddress",
            "windir",
            "ascii text",
            "mitre att",
            "file",
            "ck id",
            "show technique",
            "path",
            "factory",
            "hybrid",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers date",
            "gmt connection",
            "obz4usfn0 http",
            "cfqirgdhj5 http",
            "bundled",
            "dropped",
            "putty",
            "february",
            "july",
            "whois whois",
            "malware",
            "urls",
            "post",
            "vj87",
            "passive dns",
            "http",
            "unique",
            "ukhdaauqaaaaaac",
            "screenshot",
            "scan endpoints",
            "all octoseek",
            "code"
          ],
          "references": [
            "https://www.hallrender.com/attorney/brian-sabey/",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "business-support.intel.com",
            "00000000000.cloudfront.net",
            "mobileaccess.intel.com",
            "artificial-legal-intelligence.com",
            "http://intel.net/.about.html",
            "http://medlineplus.gov.https.sci-hub.st",
            "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
            "http://pl.gov-zaloguj.info",
            "http://apple.helptechnicalsupport.com/favicon.ico",
            "https://www.journaldev.com/41403/regex"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Gopher",
              "display_name": "Gopher",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Ascii Exploit",
              "display_name": "Ascii Exploit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658b74ee93a0b0dc9c960cee",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 6027,
            "URL": 13374,
            "hostname": 4575,
            "domain": 6755,
            "CVE": 3
          },
          "indicator_count": 31086,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "815 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658a2b6cfdcfeec5db5f31a1",
          "name": "Apple Retail: DNSpionage | CNC Server| Injection | Remote Process Writes",
          "description": "It's best to update, transfer data, and activate device over safe, trusted, private internet. Bot Networks and DNS Espionage positive. Very malicious with ability to compromise every network as compromised device logs into spreading an incredibly large, very malicious ongoing  cyber \nwarfare attack. Command and control server.",
          "modified": "2024-01-25T01:03:33.919000",
          "created": "2023-12-26T01:25:00.119000",
          "tags": [
            "Ghost RAT",
            "WebToolbar",
            "Nanocore RAT",
            "GameHack",
            "Cobalt Strike",
            "RedlineStealer",
            "HallGrand",
            "InstallCore",
            "InstallBrain",
            "Emotet",
            "Tofsee",
            "InMortal",
            "Bradesco",
            "Agent Tesla",
            "Mitre",
            "Pyscpa",
            "TrojanSpy",
            "SuppoBox",
            "Occamy",
            "DNSPIONAGE",
            "Stealer",
            "Password",
            "Apple",
            "Retail",
            "Cherry Creek Colorado",
            "Bot Networks",
            "Ghost RAT",
            "Networm"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7996,
            "FileHash-SHA1": 3921,
            "FileHash-SHA256": 5341,
            "hostname": 2108,
            "domain": 1005,
            "URL": 5635,
            "CIDR": 2,
            "CVE": 21,
            "email": 28
          },
          "indicator_count": 26057,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "816 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658a2b70d4e5f1b1267a5a45",
          "name": "Apple Retail: DNSpionage | CNC Server| Injection | Remote Process Writes",
          "description": "It's best to update, transfer data, and activate device over safe, trusted, private internet. Bot Networks and DNS Espionage positive. Very malicious with ability to compromise every network as compromised device logs into spreading an incredibly large, very malicious ongoing  cyber \nwarfare attack. Command and control server.",
          "modified": "2024-01-25T01:03:33.919000",
          "created": "2023-12-26T01:25:04.914000",
          "tags": [
            "Ghost RAT",
            "WebToolbar",
            "Nanocore RAT",
            "GameHack",
            "Cobalt Strike",
            "RedlineStealer",
            "HallGrand",
            "InstallCore",
            "InstallBrain",
            "Emotet",
            "Tofsee",
            "InMortal",
            "Bradesco",
            "Agent Tesla",
            "Mitre",
            "Pyscpa",
            "TrojanSpy",
            "SuppoBox",
            "Occamy",
            "DNSPIONAGE",
            "Stealer",
            "Password",
            "Apple",
            "Retail",
            "Cherry Creek Colorado",
            "Bot Networks",
            "Ghost RAT",
            "Networm"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7996,
            "FileHash-SHA1": 3921,
            "FileHash-SHA256": 5341,
            "hostname": 2108,
            "domain": 1005,
            "URL": 5635,
            "CIDR": 2,
            "CVE": 21,
            "email": 28
          },
          "indicator_count": 26057,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "816 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ca31a0720e83e8630677d",
          "name": "Apple Retail: DNSpionage | CNC Server| Injection | Remote Process [OctoSeek]",
          "description": "",
          "modified": "2024-01-25T01:03:33.919000",
          "created": "2023-12-27T22:20:10.878000",
          "tags": [
            "Ghost RAT",
            "WebToolbar",
            "Nanocore RAT",
            "GameHack",
            "Cobalt Strike",
            "RedlineStealer",
            "HallGrand",
            "InstallCore",
            "InstallBrain",
            "Emotet",
            "Tofsee",
            "InMortal",
            "Bradesco",
            "Agent Tesla",
            "Mitre",
            "Pyscpa",
            "TrojanSpy",
            "SuppoBox",
            "Occamy",
            "DNSPIONAGE",
            "Stealer",
            "Password",
            "Apple",
            "Retail",
            "Cherry Creek Colorado",
            "Bot Networks",
            "Ghost RAT",
            "Networm"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658a2b6cfdcfeec5db5f31a1",
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7996,
            "FileHash-SHA1": 3921,
            "FileHash-SHA256": 5341,
            "hostname": 2108,
            "domain": 1005,
            "URL": 5635,
            "CIDR": 2,
            "CVE": 21,
            "email": 28
          },
          "indicator_count": 26057,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "816 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6588588d4b9eb5c3530caabf",
          "name": "Ghost RAT | Apple Domain Robot | Cherry Creek, Colorado Retail",
          "description": "",
          "modified": "2024-01-23T17:03:33.038000",
          "created": "2023-12-24T16:13:01.574000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d1e650a97b0611cf796551",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 28182,
            "FileHash-MD5": 4761,
            "FileHash-SHA1": 3109,
            "FileHash-SHA256": 10324,
            "domain": 3628,
            "hostname": 9624,
            "email": 90,
            "CIDR": 8,
            "CVE": 42
          },
          "indicator_count": 59768,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "817 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29a8dbbe8d0bcc16ed1a",
          "name": "iOS Tracking \u2192 imitation imap: imap.kehlenbach.net | C2 | Cybercrime",
          "description": "",
          "modified": "2023-12-09T08:01:01.882000",
          "created": "2023-11-09T18:49:12.887000",
          "tags": [
            "ssl certificate",
            "tsara brashears",
            "apple ios",
            "whois record",
            "virus network",
            "critical risk",
            "tracker",
            "cyberstalking",
            "drive",
            "apple phone",
            "hacktool",
            "installer",
            "brashears",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654cabd6bb3319558bf2cd38",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 97,
            "FileHash-SHA256": 1170,
            "domain": 593,
            "hostname": 1179,
            "URL": 3246
          },
          "indicator_count": 6384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "863 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654cabd6bb3319558bf2cd38",
          "name": "iOS Tracking \u2192 imitation imap: imap.kehlenbach.net | C2 | Cybercrime",
          "description": "BotNet campaign, malvertizing, radar tracking, iOS, OS, IP, dns, location tracking, password cracker, faux Pinterest, phishing, malicious domain.\nTargets:\nhttps://pin.it/ (Dangerous IP)\nhttps://www.anyxxxtube.net/search-porn/tsara-brashears/ (phishing)\t\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian\n(password cracker)\t\nhttps://www.pornhub.com/video/search?search=tsara+brashears ( Buff Achievement Tracker)\nhttps://www.sweetheartvideo.com/tsara-brashears/   (botnetwork, tracking):\npin.it (TB IP)\nww.google.com.uy. (Brashears IP addresses) \notc.greatcall.com (Botnetwork, tracking call)\n0-129-103-71imap-intranet-pv-175-166.matomo.cloud (location collection, call, message, email)\nhttps://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= (Transactional email collection)\n\napple iOS, imap",
          "modified": "2023-12-09T08:01:01.882000",
          "created": "2023-11-09T09:52:22.834000",
          "tags": [
            "ssl certificate",
            "tsara brashears",
            "apple ios",
            "whois record",
            "virus network",
            "critical risk",
            "tracker",
            "cyberstalking",
            "drive",
            "apple phone",
            "hacktool",
            "installer",
            "brashears",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 97,
            "FileHash-SHA256": 1170,
            "domain": 593,
            "hostname": 1179,
            "URL": 3246
          },
          "indicator_count": 6384,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "863 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a772076be04f1649f9a42",
          "name": "Remote & other attacks. Dapato I Detplock I Emotet I",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief.",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:42:56.873000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Hall Render",
              "display_name": "Hall Render",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 151,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654ab0f0b732066a2bdd1425",
          "name": "Remote & other attacks. Dapato I Detplock I Emotet I",
          "description": "",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T21:49:36.686000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Hall Render",
              "display_name": "Hall Render",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "654a772076be04f1649f9a42",
          "export_count": 143,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a7a53317c717d1f4fee7f",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief?\n\nCVE\tCVE-2017-0147\t\t\t\t\t\nCVE\tCVE-2015-1650\t\t\t\t\t\nCVE\tCVE-2014-6352\t\t\t\t\t\nCVE\tCVE-2014-3153\t\t\t\t\t\nCVE\tCVE-2017-8570\t\t\t\t\t\t\nCVE\tCVE-2015-6585\t\t\t\nCVE\tCVE-2012-0158\t\t\t\t\t\t\nCVE\tCVE-2010-3333\t\t\t\t\t\t\nCVE\tCVE-2017-17215\t\t\t\t\nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:56:35.967000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 151,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a7a4d960200d938e180c3",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief?\n\nCVE\tCVE-2017-0147\t\t\t\t\t\nCVE\tCVE-2015-1650\t\t\t\t\t\nCVE\tCVE-2014-6352\t\t\t\t\t\nCVE\tCVE-2014-3153\t\t\t\t\t\nCVE\tCVE-2017-8570\t\t\t\t\t\t\nCVE\tCVE-2015-6585\t\t\t\nCVE\tCVE-2012-0158\t\t\t\t\t\t\nCVE\tCVE-2010-3333\t\t\t\t\t\t\nCVE\tCVE-2017-17215\t\t\t\t\nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:56:29.786000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 152,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a1ce294727bb14f97791",
          "name": "Command and Control Laplas Clipper OG IP \u219245.159.189.105/bot/regex",
          "description": "",
          "modified": "2023-12-06T16:31:09.915000",
          "created": "2023-12-06T16:31:09.915000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 199,
            "domain": 108,
            "URL": 657,
            "hostname": 121,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3
          },
          "indicator_count": 1091,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a1cbb16a7434474d2c87",
          "name": "Command and Control Laplas Clipper OG IP \u219245.159.189.105/bot/regex",
          "description": "",
          "modified": "2023-12-06T16:31:07.032000",
          "created": "2023-12-06T16:31:07.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 156,
            "FileHash-SHA256": 242,
            "domain": 132,
            "URL": 731,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "CIDR": 1
          },
          "indicator_count": 1268,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657089b5f0f0dc770c21cfbd",
          "name": "stagningtrump.com",
          "description": "",
          "modified": "2023-12-06T14:48:21.848000",
          "created": "2023-12-06T14:48:21.848000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "hostname": 848,
            "domain": 1095,
            "URL": 2977,
            "FileHash-SHA256": 1141,
            "SSLCertFingerprint": 2,
            "FileHash-MD5": 3
          },
          "indicator_count": 6067,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c8e530066ae793dc64",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:18:00.623000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136b5eb9bdd21070ff9d7",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:41.263000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 70,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c1ac991f85328604d2",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:52.382000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "872 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f08130783a080ec06bcc6",
          "name": "Apple iOS compromise. CVE Jar",
          "description": "",
          "modified": "2023-11-25T06:03:08.846000",
          "created": "2023-10-30T01:34:11.970000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye",
            "noname057",
            "adult content",
            "pornographer",
            "attack",
            "unsafe",
            "tulach malware",
            "remote attacks",
            "Rat"
          ],
          "references": [
            "1.116.132.182/weblogic_CVE_2020_2551.jar",
            "http://1.116.132.182/.git/HEAD"
          ],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            },
            {
              "id": "NoName057",
              "display_name": "NoName057",
              "target": null
            },
            {
              "id": "Network RAT",
              "display_name": "Network RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653a092e3e9270a3ccff2aa0",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2050,
            "domain": 244,
            "hostname": 771,
            "CVE": 10
          },
          "indicator_count": 4190,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1db16fe8c699422bfbbc",
          "name": "Apple iOS compromise. CVE Jar",
          "description": "",
          "modified": "2023-11-25T06:03:08.846000",
          "created": "2023-10-30T03:06:25.113000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye",
            "noname057",
            "adult content",
            "pornographer",
            "attack",
            "unsafe",
            "tulach malware",
            "remote attacks",
            "Rat"
          ],
          "references": [
            "1.116.132.182/weblogic_CVE_2020_2551.jar",
            "http://1.116.132.182/.git/HEAD"
          ],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            },
            {
              "id": "NoName057",
              "display_name": "NoName057",
              "target": null
            },
            {
              "id": "Network RAT",
              "display_name": "Network RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653f08130783a080ec06bcc6",
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2050,
            "domain": 244,
            "hostname": 771,
            "CVE": 10
          },
          "indicator_count": 4190,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f08fb12f0ef5a96e7d95c",
          "name": "Apple iOS compromise. ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual ",
          "description": "",
          "modified": "2023-11-25T05:02:44.879000",
          "created": "2023-10-30T01:38:03.623000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653a07854465c840088a4c7b",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2007,
            "domain": 243,
            "hostname": 767
          },
          "indicator_count": 4132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653a07854465c840088a4c7b",
          "name": "Apple iOS compromise. ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable exe",
          "description": "Targets phone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \nTarget: Tsara Brashears",
          "modified": "2023-11-25T05:02:44.879000",
          "created": "2023-10-26T06:30:29.847000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2007,
            "domain": 243,
            "hostname": 767
          },
          "indicator_count": 4132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653a0784db4f775c260e0eb9",
          "name": "Apple iOS compromise. ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable exe",
          "description": "Targets phone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \nTarget: Tsara Brashears",
          "modified": "2023-11-25T05:02:44.879000",
          "created": "2023-10-26T06:30:28.584000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2007,
            "domain": 243,
            "hostname": 767
          },
          "indicator_count": 4132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653a078459913ce7eaae6fd1",
          "name": "Apple iOS compromise. ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable exe",
          "description": "Targets phone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \nTarget: Tsara Brashears",
          "modified": "2023-11-25T05:02:44.879000",
          "created": "2023-10-26T06:30:28.765000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2007,
            "domain": 243,
            "hostname": 767
          },
          "indicator_count": 4132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653a0778872fbe01f36f9e4d",
          "name": "Apple iOS compromise. ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable exe",
          "description": "Targets phone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \nTarget: Tsara Brashears",
          "modified": "2023-11-25T05:02:44.879000",
          "created": "2023-10-26T06:30:16.812000",
          "tags": [
            "apple ios",
            "tsara brashears",
            "unlocker",
            "critical risk",
            "cyberstalking",
            "elf collection",
            "apple phone",
            "shell code",
            "script",
            "spyware",
            "hacktool",
            "installer",
            "banker",
            "keylogger",
            "name verdict",
            "falcon sandbox",
            "beginstring",
            "sha256",
            "sha1",
            "runtime process",
            "segoe ui",
            "internet",
            "null",
            "size",
            "misc attack",
            "unknown",
            "error",
            "span",
            "date",
            "body",
            "refresh",
            "class",
            "generator",
            "critical",
            "tools",
            "look",
            "verify",
            "restart",
            "hybrid",
            "general",
            "click",
            "strings",
            "meta",
            "hiddentears",
            "PyInstaller",
            "ransomware",
            "verified",
            "et",
            "legal entities",
            "phishing",
            "e-devlet",
            "buff achievement tracker",
            "cyber warfare",
            "malware",
            "ransom",
            "malware spreader",
            "et malware",
            "neurevt.a.betabot check in",
            "atlassian",
            "Tulach malware",
            "shell code script",
            "TrojanSpy",
            "remote access",
            "cve",
            "collection",
            "monitoring",
            "cyber threat",
            "cyber stalking",
            "cybercrime",
            "lockbin.1",
            "python connection",
            "elf",
            "redirect",
            "watchhers",
            "tracking",
            "fed",
            "us",
            "blob",
            "vortex",
            "Amazon aes",
            "spyware",
            "banker",
            "synaptics",
            "fraud service",
            "python initiated connection",
            "Trojan_Win_Generic_101",
            "malware trojan",
            "evader",
            "contacted",
            "execution",
            "cobaltstrike",
            "hacking_tool",
            "trojan",
            "cve exploit",
            "red team tools",
            "fireeye"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Verified",
              "display_name": "Verified",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Colbalt Strike",
              "display_name": "Colbalt Strike",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "HiddenTear",
              "display_name": "HiddenTear",
              "target": null
            },
            {
              "id": "trojan.barys/cobalt",
              "display_name": "trojan.barys/cobalt",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1493",
              "name": "Transmitted Data Manipulation",
              "display_name": "T1493 - Transmitted Data Manipulation"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 92,
            "FileHash-SHA256": 924,
            "URL": 2007,
            "domain": 243,
            "hostname": 767
          },
          "indicator_count": 4132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "877 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f96f7622bd190ec390de2f",
          "name": "Command and Control Laplas Clipper OG IP \u219245.159.189.105/bot/regex",
          "description": "Atypical abuse and IoC by Laplas Clipper Botnet,  an infostealer malware that may target crypto currency wallets. The Victim's crypto wallet address in clipboard with one that's controlled by the attacker. There is evidence of a remoted attack followed by a full takeover if a device. I don't have enough information to explain the attack. Appears to have occurred on an iOS device. The actors employed AI. The device was likely rendered a zombie based on the sheer amount of attacks and various BotNetwork ls attacking one individual.\nI could be 1000% wrong about attack. It's very clear there was a crippling attack",
          "modified": "2023-10-07T11:01:45.836000",
          "created": "2023-09-07T06:36:38.271000",
          "tags": [
            "relacionada",
            "laplasclipper"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 262,
            "domain": 133,
            "URL": 750,
            "hostname": 156,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "CIDR": 1
          },
          "indicator_count": 1308,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "925 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f96f78c760b512b738c773",
          "name": "Command and Control Laplas Clipper OG IP \u219245.159.189.105/bot/regex",
          "description": "Atypical abuse and IoC by Laplas Clipper Botnet,  an infostealer malware that may target crypto currency wallets. The Victim's crypto wallet address in clipboard with one that's controlled by the attacker. There is evidence of a remoted attack followed by a full takeover if a device. I don't have enough information to explain the attack. Appears to have occurred on an iOS device. The actors employed AI. The device was likely rendered a zombie based on the sheer amount of attacks and various BotNetwork ls attacking one individual.\nI could be 1000% wrong about attack. It's very clear there was a crippling attack",
          "modified": "2023-10-07T06:01:02.468000",
          "created": "2023-09-07T06:36:40.719000",
          "tags": [
            "relacionada",
            "laplasclipper"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 199,
            "domain": 108,
            "URL": 657,
            "hostname": 121,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3
          },
          "indicator_count": 1091,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "926 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.journaldev.com/41403/regex",
        "http://titasgas.portal.gov.bd/dead.php",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/",
        "OTX AlienVault",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "IDS Detections: Cobalt Strike Malleable C2 JQuery",
        "00000000000.cloudfront.net",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "This is all too strange! Corruption or Spoofed?",
        "history.ie",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ iOS unlocker & password cracker]",
        "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
        "message.htm.com",
        "0-courier.push.apple.com",
        "hive21.ctcsoftware.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [how could this be in everything!?]",
        "http://emrd.gov.bd/dead.php",
        "artificial-legal-intelligence.com",
        "www.moxa.com",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://hybrid-analysis.com/sample/a728fc352e13fa39c7490ddcfff86b0919b3de6ea5786cf48b22095e0607bde9/6593b386f70b45c7c70419c8",
        "familyhandyman.com",
        "cs001.informativeremail-apple.zoom.com.cn",
        "http://cabinet.gov.bd/dead.php",
        "IDS Detections: SSL excessive fatal alerts (possible POODLE attack against server)",
        "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla))",
        "https://tulach.cc/",
        "http://1.116.132.182/.git/HEAD",
        "0-i-0.xyz",
        "http://www.tabxexplorer.com [phishing]",
        "cdn.easykeys.com",
        "GET /lenovo HTTP/1.1 Host: www.tabxexplorer.com Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0",
        "device-local-bf56eb52-6fc6-435b-aadb-9fa1dd89702c.remotewd.com",
        "IDS Detections: Nullsoft Mozilla UA (NSISDL)",
        "https://autodiscover.socket.net/Autodiscover/DEADJOE",
        "https://alohatube.xyz/search/tsara-brashears",
        "business-support.intel.com",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://mail.greycroft.com/owa/redir.aspx?SURL=zRgJdPcEmzMcui5aPZuMhrMWFaQp7UWJt7B48ki50f3tl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwBpAHQAdQBuAGUAcwAuAGEAcABwAGwAZQAuAGMAbwBtAC8AdQBzAC8AYQBwAHAALwBhAG4AaQBtAGEAdABpAGMALQBiAHkALQBpAG4AawBiAG8AYQByAGQALwBpAGQAMQAwADUAMgAzADcAOQAxADUANAA_AGwAcwA9ADEAJgBtAHQAPQA4AA..&URL=https://itunes.apple.com/us/app/animatic-by-inkboard/id1052379154?ls=1&mt=8",
        "vtbehaviour.commondatastorage.googleapis.com",
        "http://www.tabxexplorer.com/lenovo",
        "https://ww9.0123movie.net/icons/apple-touch-icon.png",
        "https://www.myminiweb.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.hallrender.com/attorney/brian-sabey/",
        "Yara Detection: Nullsoft_NSIS",
        "http://mincom.gov.bd/dead.php",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "Yara ruleset match: Windows_API_Function by InQuest Labs",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "alohatube.xyz",
        "https://www.colorfulbox.jp/",
        "google.com.uy [Google search browser, masked, links to malicious porn malware spreader, malvertizing, collection host]",
        "Game-Version-Update.exe",
        "UrlVoid",
        "http://pl.gov-zaloguj.info",
        "Any.run",
        "Hybrid Analysis",
        "apple-identifiant.info",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://ww11.0123movie.net/icons/apple-touch-icon.png",
        "https://twitter.com/sheriffspurlock?lang=en",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "69.197.153.180",
        "quackbot? Qbot qakbot positive",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "deadlineday.twitter.com",
        "https://mediacherry.space/vn/vb/wheel/?key=eyJ0aW1lc3RhbXAiOiIxNzA0ODcwMzc2IiwiaGFzaCI6ImI5OWQ3ODQ3NTIyMDA5NTBmNmRiODY1NmUxNWY5YWMyZTc3MGExMTcifQ==&ccc=VN&ppp=PropellerAds:Popunder&tdom=www.a1000.online&zoneid=6534225&bemobdata=c=2f8cb72d-d2e6-4570-b258-aeb3acc53b24..l=6d25aa09-cccc-4797-aef4-7aa11d1e0dcb..a=0..b=0..z=0.000035..e=768844675632074752..c1=6534225..c2=7541054..c3=VN..c4=wireless..c5=viettel_mobile-vn..c6=other..c7=chrome..c8=27..c9=viettelcorporation..c10=Mozilla/5~BEMOB_DOT~0(Linux;Android10;K",
        "password-recovery-tools-2012-professional-trial.exe",
        "AgentTesla.KM: FileHash-MD5 e0801d62e8379b98177fd94a027e8b30",
        "polling.portal.gov.bd",
        "mobileaccess.intel.com",
        "Urlscan",
        "IDS Detections: GENERIC Likely Malicious Fake IE Downloading .exe",
        "AgentTesla.KM: FileHash-SHA1 0fa00a939ca8af08c90310b808d1d8fc70a518c3",
        "http://medlineplus.gov.https.sci-hub.st",
        "registry-commander.exe",
        "identity_helper.exe",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "ww.google.com.uy",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "dvd-game-new-releases.info",
        "toolbarqueries.google.com.uy",
        "nr-data.net",
        "1.116.217.151 [Cobalt Strike]",
        "File: 2373aaec6f38bb129aab12741f2d8be237e0629db1f50206bae0ebefd959815a",
        "http://intel.net/.about.html",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "http://alohatube.xyz/search/tsara-brashears",
        "http://watchhers.net/index.php",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://brandyallen.com/2022/11/23/sexy",
        "ns3.hallgrandsale.ru",
        "Tulach Malware: 114.114.114.114",
        "1.116.132.182/weblogic_CVE_2020_2551.jar",
        "msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com",
        "joebiden.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "[Unnamed group]"
          ],
          "malware_families": [
            "Hacktool:win32/atosev.a",
            "Et",
            "Ascii exploit",
            "Lumma stealer",
            "Win.malware.generickdz-9938530-0",
            "Trojanspy",
            "Alf:trojan:msil/agenttesla.km",
            "Ransomexx",
            "Content reputation",
            "Kraddare",
            "Tulach",
            "Gopher",
            "Bazaar loader",
            "Cobalt strike",
            "Alf:heraklezeval:pua:win32/spyrixkeylogger",
            "Hiddentear",
            "Win32:agent-aoks\\ [trj]",
            "Alf:win32/gbdinf_305b1c9a.j!ibt",
            "Hallrender",
            "Sabey",
            "Racoon stealer",
            "Azorult",
            "Brashears",
            "Worm:vbs/dapato",
            "Maltiverse",
            "Emotet",
            "Silk road",
            "Cobalt strike - s0154",
            "Hacktool:win32/cobaltstrike.a",
            "Nanocore rat",
            "Hacktool",
            "Systweak",
            "Trojan.onlinegames/aoks",
            "Network rat",
            "Ghandi",
            "Njrat",
            "Tinynote",
            "Quasar rat",
            "Verified",
            "Detplock",
            "Njrat - s0385",
            "Mitre attack",
            "Trojan.barys/cobalt",
            "Colbalt strike",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Qbot",
            "Noname057",
            "Win.trojan.bho-136",
            "Worm:win32/benjamin",
            "Ransomware",
            "Swort",
            "Trojan:win32/zombie.a",
            "Crack_unhackme_sigma.rar",
            "Formbook",
            "Qakbot",
            "Wannacry kill switch",
            "Quackbot",
            "Comspec",
            "Redline",
            "Trojan:win32/wacatac",
            "Hall render",
            "Hallgrand",
            "Trojan:win32/bho.cv"
          ],
          "industries": [
            "Telecommunications",
            "Government",
            "Technology",
            "Defense",
            "Civil society"
          ],
          "unique_indicators": 204835
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/hleen.com",
    "whois": "http://whois.domaintools.com/hleen.com",
    "domain": "hleen.com",
    "hostname": "gateway.hleen.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69e434769e2a43c088066ca2",
      "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
      "description": "",
      "modified": "2026-04-19T07:36:41.138000",
      "created": "2026-04-19T01:48:38.335000",
      "tags": [
        "heur",
        "cisco umbrella",
        "site",
        "alexa top",
        "malware",
        "million",
        "xcnfe",
        "maltiverse",
        "malware site",
        "safe site",
        "malicious",
        "trojan",
        "artemis",
        "vidar",
        "redline stealer",
        "raccoon",
        "keylogger",
        "riskware",
        "agent tesla",
        "remcos",
        "stealer",
        "miner",
        "hacktool",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "detplock",
        "networm",
        "win64",
        "service",
        "smokeloader",
        "dropper",
        "crack",
        "alexa",
        "trojanspy",
        "detection list",
        "blacklist https",
        "kyriazhs1975",
        "noname057",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "blacklist",
        "cyber threat",
        "united",
        "engineering",
        "phishing",
        "covid19",
        "facebook",
        "phishing site",
        "paypal",
        "njrat",
        "emotet",
        "nanocore rat",
        "meterpreter",
        "azorult",
        "download",
        "msil",
        "bladabindi",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "cve201711882",
        "redline",
        "ssl certificate",
        "tsara brashears",
        "cyberstalking",
        "spyware",
        "apple ios",
        "quasar",
        "ransomware",
        "malware norad",
        "cry kill",
        "attack",
        "installer",
        "formbook",
        "lockbit",
        "open",
        "banker",
        "bazarloader",
        "core",
        "ransomexx",
        "name verdict",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "script",
        "beginstring",
        "ascii text",
        "null",
        "date",
        "error",
        "span",
        "refresh",
        "class",
        "generator",
        "critical",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "tools",
        "as141773",
        "as63932",
        "moved",
        "passive dns",
        "search",
        "entries",
        "gmt content",
        "type",
        "keep alive",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "as17806 mango",
        "blacklist http",
        "phishtank",
        "malicious site",
        "apple",
        "blockchain",
        "runescape",
        "twitter",
        "qakbot",
        "asyncrat",
        "team",
        "internet storm",
        "generic",
        "union",
        "bazaloader",
        "media",
        "generic malware",
        "hostname",
        "suppobox",
        "netwire rc",
        "installcore",
        "conduit",
        "iobit",
        "mediaget",
        "outbreak",
        "acint",
        "installpack",
        "phish",
        "rostpay",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "filetour",
        "wacatac",
        "fusioncore",
        "dapato",
        "cleaner",
        "softonic",
        "encpk",
        "qbot",
        "predator",
        "swrort",
        "kraddare",
        "systweak",
        "dllinject",
        "driverpack",
        "iframe",
        "downldr",
        "presenoker",
        "as61317",
        "asnone united",
        "urls",
        "files",
        "next",
        "as15169 google",
        "japan unknown",
        "as17506 arteria",
        "as32244 liquid",
        "as49505",
        "russia unknown",
        "expired",
        "domain",
        "falcon",
        "as19969",
        "ipv4",
        "ransom",
        "encrypt",
        "file",
        "windows nt",
        "indicator",
        "response",
        "appdata",
        "gmt contenttype",
        "png image",
        "local",
        "contacted",
        "fali malicious",
        "dropped",
        "communicating",
        "referrer",
        "fali contacted",
        "silk road",
        "immediate",
        "cymulate2",
        "tsara brashears",
        "malvertizing"
      ],
      "references": [
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "alohatube.xyz",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "ww.google.com.uy",
        "https://alohatube.xyz/search/tsara-brashears",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "polling.portal.gov.bd",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "http://watchhers.net/index.php",
        "https://brandyallen.com/2022/11/23/sexy",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "https://www.colorfulbox.jp/",
        "Hybrid Analysis",
        "Any.run",
        "OTX AlienVault",
        "Urlscan",
        "UrlVoid",
        "http://emrd.gov.bd/dead.php",
        "http://titasgas.portal.gov.bd/dead.php",
        "http://mincom.gov.bd/dead.php",
        "http://cabinet.gov.bd/dead.php"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Malaysia",
        "Bangladesh"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Racoon Stealer",
          "display_name": "Racoon Stealer",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "njRAT - S0385",
          "display_name": "njRAT - S0385",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Bazaar Loader",
          "display_name": "Bazaar Loader",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Detplock",
          "display_name": "Detplock",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        },
        {
          "id": "Ghandi",
          "display_name": "Ghandi",
          "target": null
        },
        {
          "id": "Systweak",
          "display_name": "Systweak",
          "target": null
        },
        {
          "id": "Swort",
          "display_name": "Swort",
          "target": null
        },
        {
          "id": "Silk Road",
          "display_name": "Silk Road",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "noname057",
          "display_name": "noname057",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:VBS/Dapato",
          "display_name": "Worm:VBS/Dapato",
          "target": "/malware/Worm:VBS/Dapato"
        },
        {
          "id": "Kraddare",
          "display_name": "Kraddare",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654a7a53317c717d1f4fee7f",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2522,
        "FileHash-SHA1": 862,
        "FileHash-SHA256": 2855,
        "URL": 7963,
        "domain": 1168,
        "hostname": 3181,
        "CVE": 13,
        "email": 2,
        "IPv4": 1
      },
      "indicator_count": 18567,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b2730aa46a25d7949daa8d",
      "name": "apple retail dnspionage clone octoseek",
      "description": "",
      "modified": "2026-04-11T00:03:57.096000",
      "created": "2026-03-12T08:02:18.609000",
      "tags": [
        "Ghost RAT",
        "WebToolbar",
        "Nanocore RAT",
        "GameHack",
        "Cobalt Strike",
        "RedlineStealer",
        "HallGrand",
        "InstallCore",
        "InstallBrain",
        "Emotet",
        "Tofsee",
        "InMortal",
        "Bradesco",
        "Agent Tesla",
        "Mitre",
        "Pyscpa",
        "TrojanSpy",
        "SuppoBox",
        "Occamy",
        "DNSPIONAGE",
        "Stealer",
        "Password",
        "Apple",
        "Retail",
        "Cherry Creek Colorado",
        "Bot Networks",
        "Ghost RAT",
        "Networm"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658a2b6cfdcfeec5db5f31a1",
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 7996,
        "FileHash-SHA1": 3921,
        "FileHash-SHA256": 5341,
        "hostname": 2108,
        "domain": 1005,
        "URL": 5635,
        "CIDR": 2,
        "CVE": 21,
        "email": 28
      },
      "indicator_count": 26057,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "9 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d32648280eb859dfca1c19",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:48.037000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 39,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 234,
      "modified_text": "567 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66d3264283628d23b8f28b9d",
      "name": "x.com - That's what friends are for!",
      "description": "Original pulses modified, unknown stealer, junk data stuffing sifted through. Careful notes have been taken regarding ultra significant pulses. I've done the best I can to analyze compare, compile from all record of original pulse. |  Further analysis shows an effort to destroy quite a bit of pertinent evidence. | I consider the target, family and associates to be especially endangered. Target has become isolated from most people target associated with, mostly by force as not to spread the malicious vulnerabilities that ha e affected many.\nTarget & associated have been interacting with and work with \n, hiring (not everyone they know) those involved. | There has been significant modification and degradation of the origin of information collected. | Who can you report to if the perpetrator is the Law. | This has always been the reason. | Don't hire another hit. What's the point? To uphold a fake integrity as a legacy?",
      "modified": "2024-09-30T10:01:49.889000",
      "created": "2024-08-31T14:18:42.621000",
      "tags": [
        "referrer",
        "historical ssl",
        "united",
        "as13414 twitter",
        "nxdomain",
        "whitelisted",
        "cname",
        "a nxdomain",
        "status",
        "aaaa",
        "as15133 verizon",
        "search",
        "date",
        "twitter",
        "spoofed",
        "qbot qakbot",
        "qbot",
        "information",
        "t1027",
        "files",
        "t1036",
        "t1041",
        "c2 channel",
        "t1056",
        "capture",
        "t1057",
        "discovery",
        "memcommit",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "intel",
        "ms windows",
        "trojan",
        "copy",
        "write",
        "win64",
        "next",
        "url https",
        "qbot type",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "showing",
        "entries",
        "msie",
        "windows nt",
        "formsecnen",
        "read",
        "read c",
        "russia as48848",
        "qmount",
        "unknown",
        "pecompact",
        "malware",
        "role title",
        "added active",
        "related pulses",
        "type indicator",
        "as44273 host",
        "name servers",
        "as47846",
        "germany unknown",
        "443 ma2592000",
        "scan endpoints",
        "passive dns",
        "urls",
        "creation date",
        "all scoreblue",
        "hostname",
        "filehashsha256",
        "filehashsha1",
        "filehashmd5",
        "months ago",
        "ipv4",
        "report spam",
        "tinynote",
        "cobalt strike",
        "ransomexx",
        "quackbot",
        "comspec",
        "prefetch8",
        "pattern match",
        "prefetch1",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "path",
        "hybrid",
        "general",
        "click",
        "strings",
        "langchinese",
        "icmp traffic",
        "pe resource",
        "pe section",
        "companyname gm",
        "win32",
        "push",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "hostnames",
        "urls https",
        "overview ip",
        "address",
        "related nids",
        "files hostname",
        "files domain",
        "files related",
        "pulses none",
        "related tags",
        "virustotal",
        "china unknown",
        "as4837 china",
        "redacted for",
        "as4835 china",
        "douglas county",
        "co sheriff",
        "office",
        "pegasus attacks",
        "sa victim",
        "cve type",
        "cve cve20170147",
        "no expiration",
        "expiration",
        "domain",
        "create new",
        "subsys00000000",
        "as16625 akamai",
        "as20940",
        "as39960",
        "as6762 telecom",
        "united kingdom",
        "emails",
        "span",
        "created",
        "white",
        "formatpng feb",
        "refererparam",
        "classid1",
        "login0",
        "typeid1",
        "style1",
        "dynamicloader",
        "high",
        "yara rule",
        "neshta",
        "neshta virus",
        "myapp",
        "ids detections",
        "yara detections",
        "alerts",
        "worm",
        "delphi",
        "ip address",
        "files location",
        "china flag",
        "china domain",
        "pulses otx",
        "pulses",
        "as45102 alibaba",
        "japan unknown",
        "as32934",
        "as19679 dropbox",
        "pulse pulses",
        "google safe",
        "browsing",
        "hosting",
        "body",
        "as7018 att",
        "verdict vpn",
        "as9009 m247",
        "canada unknown",
        "as174 cogent",
        "israel unknown",
        "as12310",
        "romania unknown",
        "as48945",
        "as64286",
        "b3viles0 feb",
        "modified",
        "siteid290",
        "org7",
        "novno jan",
        "siteid289",
        "org4",
        "org9",
        "locuo",
        "siteid969",
        "https",
        "http",
        "rims https",
        "evader",
        "message",
        "jeffrey scott",
        "reimer dpt",
        "pegasus",
        "pinterest",
        "amadey",
        "quasar rat",
        "eternalblue",
        "service",
        "sahil",
        "andcustomer"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Netherlands",
        "Italy",
        "United Kingdom of Great Britain and Northern Ireland",
        "Japan",
        "Korea, Republic of",
        "France",
        "Malaysia"
      ],
      "malware_families": [
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2161,
        "FileHash-SHA1": 2073,
        "FileHash-SHA256": 7032,
        "domain": 3959,
        "hostname": 7581,
        "email": 22,
        "URL": 17579,
        "SSLCertFingerprint": 3,
        "CVE": 2
      },
      "indicator_count": 40412,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "567 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b85e73efe2e053366ed972",
      "name": "https://www.hallrender.com/attorney/brian-sabey/",
      "description": "",
      "modified": "2024-09-05T06:21:34.047000",
      "created": "2024-01-30T02:26:59.218000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "sample",
        "ssl certificate",
        "feeds ioc",
        "analyze",
        "whois record",
        "contacted",
        "historical ssl",
        "resolutions",
        "threat roundup",
        "referrer",
        "contacted urls",
        "august",
        "execution",
        "njrat",
        "ransomware",
        "gopher",
        "formbook",
        "whois ssl",
        "communicating",
        "obz4usfn0 url",
        "cfqirgdhj5 url",
        "obz4usfn0",
        "sfqh4dt74w0 url",
        "cfqirgdhj5",
        "localappdata",
        "temp",
        "getprocaddress",
        "windir",
        "ascii text",
        "mitre att",
        "file",
        "ck id",
        "show technique",
        "path",
        "factory",
        "hybrid",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers date",
        "gmt connection",
        "obz4usfn0 http",
        "cfqirgdhj5 http",
        "bundled",
        "dropped",
        "putty",
        "february",
        "july",
        "whois whois",
        "malware",
        "urls",
        "post",
        "vj87",
        "passive dns",
        "http",
        "unique",
        "ukhdaauqaaaaaac",
        "screenshot",
        "scan endpoints",
        "all octoseek",
        "code"
      ],
      "references": [
        "https://www.hallrender.com/attorney/brian-sabey/",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "business-support.intel.com",
        "00000000000.cloudfront.net",
        "mobileaccess.intel.com",
        "artificial-legal-intelligence.com",
        "http://intel.net/.about.html",
        "http://medlineplus.gov.https.sci-hub.st",
        "https://hybrid-analysis.com/sample/ba72877899dffe3cfb08ab3b61d24e45325f0c27f3cec81e88e9dcf3f84f7098",
        "http://pl.gov-zaloguj.info",
        "http://apple.helptechnicalsupport.com/favicon.ico",
        "https://www.journaldev.com/41403/regex"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Gopher",
          "display_name": "Gopher",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Ascii Exploit",
          "display_name": "Ascii Exploit",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658b74ee93a0b0dc9c960cee",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 168,
        "FileHash-SHA256": 6145,
        "URL": 14252,
        "hostname": 4778,
        "domain": 6809,
        "CVE": 3
      },
      "indicator_count": 32339,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "592 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653a092e3e9270a3ccff2aa0",
      "name": "Apple iOS compromise. CVE Jar",
      "description": "ASpeakSoft iOS iPhone Unlocker v1.0.36 Multilingual Portable.exe\nTargets Tsara Brashears iPhone unlocked, Total command and control. Dumping, remote access, hidden users, privilege escalation,  malware spreading, tracking, defacement, libel, harassment. \n\nTarget at eminent risk",
      "modified": "2024-08-28T12:01:51.699000",
      "created": "2023-10-26T06:37:34.613000",
      "tags": [
        "apple ios",
        "tsara brashears",
        "unlocker",
        "critical risk",
        "cyberstalking",
        "elf collection",
        "apple phone",
        "shell code",
        "script",
        "spyware",
        "hacktool",
        "installer",
        "banker",
        "keylogger",
        "name verdict",
        "falcon sandbox",
        "beginstring",
        "sha256",
        "sha1",
        "runtime process",
        "segoe ui",
        "internet",
        "null",
        "size",
        "misc attack",
        "unknown",
        "error",
        "span",
        "date",
        "body",
        "refresh",
        "class",
        "generator",
        "critical",
        "tools",
        "look",
        "verify",
        "restart",
        "hybrid",
        "general",
        "click",
        "strings",
        "meta",
        "hiddentears",
        "PyInstaller",
        "ransomware",
        "verified",
        "et",
        "legal entities",
        "phishing",
        "e-devlet",
        "buff achievement tracker",
        "cyber warfare",
        "malware",
        "ransom",
        "malware spreader",
        "et malware",
        "neurevt.a.betabot check in",
        "atlassian",
        "Tulach malware",
        "shell code script",
        "TrojanSpy",
        "remote access",
        "cve",
        "collection",
        "monitoring",
        "cyber threat",
        "cyber stalking",
        "cybercrime",
        "lockbin.1",
        "python connection",
        "elf",
        "redirect",
        "watchhers",
        "tracking",
        "fed",
        "us",
        "blob",
        "vortex",
        "Amazon aes",
        "spyware",
        "banker",
        "synaptics",
        "fraud service",
        "python initiated connection",
        "Trojan_Win_Generic_101",
        "malware trojan",
        "evader",
        "contacted",
        "execution",
        "cobaltstrike",
        "hacking_tool",
        "trojan",
        "cve exploit",
        "red team tools",
        "fireeye",
        "noname057",
        "adult content",
        "pornographer",
        "attack",
        "unsafe",
        "tulach malware",
        "remote attacks",
        "Rat"
      ],
      "references": [
        "1.116.132.182/weblogic_CVE_2020_2551.jar",
        "http://1.116.132.182/.git/HEAD"
      ],
      "public": 1,
      "adversary": "[Unnamed group]",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Verified",
          "display_name": "Verified",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Colbalt Strike",
          "display_name": "Colbalt Strike",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "HiddenTear",
          "display_name": "HiddenTear",
          "target": null
        },
        {
          "id": "trojan.barys/cobalt",
          "display_name": "trojan.barys/cobalt",
          "target": null
        },
        {
          "id": "NoName057",
          "display_name": "NoName057",
          "target": null
        },
        {
          "id": "Network RAT",
          "display_name": "Network RAT",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1493",
          "name": "Transmitted Data Manipulation",
          "display_name": "T1493 - Transmitted Data Manipulation"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1583.002",
          "name": "DNS Server",
          "display_name": "T1583.002 - DNS Server"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 99,
        "FileHash-SHA1": 92,
        "FileHash-SHA256": 984,
        "URL": 2184,
        "domain": 274,
        "hostname": 782,
        "CVE": 10
      },
      "indicator_count": 4425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "599 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b85faa9b8e3e1206d7f25c",
      "name": "Tsara Brashears Dead campaign | ET | Emotet Botnet | Injection ",
      "description": "",
      "modified": "2024-06-15T04:39:29.943000",
      "created": "2024-01-30T02:32:10.210000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "whois whois",
        "apple ios",
        "contacted",
        "tsara brashears",
        "whois",
        "resolutions",
        "password",
        "hacktool",
        "crypto",
        "execution",
        "emotet",
        "installer",
        "banker",
        "keylogger",
        "critical",
        "copy",
        "content reputation",
        "et",
        "submission",
        "comodo valkyrie",
        "verdict",
        "bitdefender",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "search",
        "entries",
        "passive dns",
        "urls",
        "record value",
        "unknown",
        "united",
        "gmt content",
        "dynamic report",
        "0 report",
        "date",
        "accept",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "http response",
        "final url",
        "serving ip",
        "address",
        "ipv4",
        "files",
        "location china",
        "asn as45090",
        "dns resolutions",
        "twitter",
        "log id",
        "gmtn",
        "tls web",
        "encrypt",
        "ca issuers",
        "f20b201c",
        "b467295d",
        "b2931e3f",
        "false",
        "as15169 google",
        "domain",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "create c",
        "write c",
        "read c",
        "medium",
        "next",
        "dock",
        "write",
        "persistence",
        "delete c",
        "path",
        "xport",
        "default",
        "years ago",
        "modified",
        "created",
        "email",
        "active created",
        "white",
        "filehash",
        "memcommit",
        "tlsv1",
        "show",
        "win32",
        "malware",
        "get na",
        "systemroot",
        "starizona",
        "lscottsdale",
        "creation date",
        "emails",
        "domain name",
        "showing",
        "pulse submit",
        "amazon",
        "server ca",
        "b535",
        "tulach",
        "hallrender",
        "hallgrand",
        "briansabey",
        "brian sabey",
        "mark",
        "mark brian sabey",
        "mark sabey",
        "cybercrime",
        "cyber stalking",
        "botnet",
        "evader",
        "hacker",
        "targeting"
      ],
      "references": [
        "http://www.dvd-game-new-releases.info/skin/tsara-brashears-dead.akp",
        "dvd-game-new-releases.info",
        "1.116.217.151 [Cobalt Strike]",
        "https://www.myminiweb.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://alohatube.xyz/search/tsara-brashears",
        "vtbehaviour.commondatastorage.googleapis.com",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://tulach.cc/",
        "ns3.hallgrandsale.ru"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "659719b77c383c73c05208a9",
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 13324,
        "FileHash-MD5": 718,
        "FileHash-SHA1": 617,
        "FileHash-SHA256": 5761,
        "domain": 3503,
        "hostname": 4475,
        "CVE": 1,
        "email": 3,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 28413,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "674 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e3d1a94659d50264a78fd4",
      "name": "Phishing | TabExplorer attacks compromised networks and devices",
      "description": "",
      "modified": "2024-04-02T01:01:20.068000",
      "created": "2024-03-03T01:26:01.043000",
      "tags": [
        "command decode",
        "suricata ipv4",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "suricata udpv4",
        "date",
        "united",
        "windows nt",
        "win64",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "url http",
        "url https",
        "scan endpoints",
        "all octoseek",
        "report spam",
        "hour ago",
        "whois record",
        "glasgow",
        "scan",
        "iocs",
        "next",
        "filehashsha256",
        "filehashmd5",
        "filehashsha1",
        "ipv4",
        "contacted",
        "execution",
        "pe resource",
        "communicating",
        "urls http",
        "referrer",
        "resolutions",
        "whois whois",
        "collections ip",
        "phishing",
        "attack",
        "loaded module",
        "remote procedure call",
        "search",
        "as15133 verizon",
        "passive dns",
        "urls",
        "creation date",
        "record value",
        "showing",
        "unknown",
        "as8075",
        "as15169 google",
        "as8068",
        "aaaa",
        "cname",
        "a domains",
        "meta",
        "entries",
        "gmt server",
        "ecacc saa83dd",
        "cobalt strike",
        "mozilla",
        "body",
        "brian sabey",
        "hallrender",
        "dynamicloader",
        "show",
        "alerts",
        "trojan",
        "copy",
        "dynamic",
        "medium",
        "reads",
        "write",
        "stealth network",
        "stealth_network",
        "script urls",
        "certificate",
        "rsa sha256",
        "exports data",
        "high",
        "yara rule",
        "yara detections",
        "njrat",
        "cape",
        "njrat malware",
        "sniffs",
        "guard",
        "write c",
        "delete c",
        "ms windows",
        "default",
        "intel",
        "openpgp public",
        "stream",
        "antivm_generic_disk",
        "antivm_generic_bios",
        "network_bind",
        "stealth_file spawns_dev_utility",
        "procmem_yara",
        "enumerates_physical_drives",
        "persistence_ads",
        "dynamic_function_loading",
        "reads_self",
        "suspicious_command_tools",
        "network",
        "rat"
      ],
      "references": [
        "http://www.tabxexplorer.com [phishing]",
        "http://www.tabxexplorer.com/lenovo",
        "GET /lenovo HTTP/1.1 Host: www.tabxexplorer.com Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0",
        "identity_helper.exe",
        "cdn.easykeys.com",
        "hive21.ctcsoftware.com",
        "www.moxa.com",
        "msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com",
        "IDS Detections: Cobalt Strike Malleable C2 JQuery",
        "IDS Detections: Nullsoft Mozilla UA (NSISDL)",
        "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla))",
        "IDS Detections: SSL excessive fatal alerts (possible POODLE attack against server)",
        "IDS Detections: GENERIC Likely Malicious Fake IE Downloading .exe",
        "Tulach Malware: 114.114.114.114",
        "ns3.hallgrandsale.ru",
        "AgentTesla.KM: FileHash-MD5 e0801d62e8379b98177fd94a027e8b30",
        "AgentTesla.KM: FileHash-SHA1 0fa00a939ca8af08c90310b808d1d8fc70a518c3",
        "Yara Detection: Nullsoft_NSIS"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "ALF:Trojan:MSIL/AgentTesla.KM",
          "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
          "target": null
        },
        {
          "id": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
          "display_name": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
          "target": "/malware/ALF:Win32/GbdInf_305B1C9A.J!ibt"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "HackTool:Win32/CobaltStrike.A",
          "display_name": "HackTool:Win32/CobaltStrike.A",
          "target": "/malware/HackTool:Win32/CobaltStrike.A"
        },
        {
          "id": "HackTool:Win32/Atosev.A",
          "display_name": "HackTool:Win32/Atosev.A",
          "target": "/malware/HackTool:Win32/Atosev.A"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Win.Malware.Generickdz-9938530-0",
          "display_name": "Win.Malware.Generickdz-9938530-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1029",
          "name": "Scheduled Transfer",
          "display_name": "T1029 - Scheduled Transfer"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Civil Society",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 55,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5551,
        "hostname": 1690,
        "domain": 929,
        "FileHash-SHA256": 2696,
        "FileHash-MD5": 405,
        "FileHash-SHA1": 315,
        "email": 4,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 11591,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "748 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b93e70b75e7dce7168f4dd",
      "name": "Google - Lumma Stealer| QakBot | Emotet",
      "description": "Lumma is classified as a stealer - a type of malware that extracts sensitive information from infected devices.\n\nYou can't see it. You will see https://www.google.com and your search. It's hidden spyware. extremely malicious. Targeted individual.",
      "modified": "2024-02-29T17:01:09.717000",
      "created": "2024-01-30T18:22:40.905000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "contacted",
        "historical ssl",
        "referrer",
        "urls url",
        "whois whois",
        "october",
        "resolutions",
        "august",
        "execution",
        "installer",
        "iframe",
        "malware",
        "core",
        "emotet",
        "lumma stealer",
        "ransomexx",
        "azorult",
        "ursnif",
        "hacktool",
        "june",
        "qakbot",
        "qbot",
        "april",
        "targeting",
        "tsara brashears",
        "active threat"
      ],
      "references": [
        "google.com.uy [Google search browser, masked, links to malicious porn malware spreader, malvertizing, collection host]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ iOS unlocker & password cracker]",
        "toolbarqueries.google.com.uy"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "Qbot",
          "display_name": "Qbot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "T1030",
          "name": "Data Transfer Size Limits",
          "display_name": "T1030 - Data Transfer Size Limits"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 50,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 3377,
        "hostname": 2502,
        "URL": 8531,
        "domain": 1250,
        "CVE": 2
      },
      "indicator_count": 15758,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "780 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a2418a73d5d36efff0b0f7",
      "name": "Lotus -Game-Version-Update.exe | trojan.onlinegames/aoks",
      "description": "Potentially downloads with other malware. Remote.  Downloads installer. Alerts victim of a compromise, (through an update)attempts to have user purchases fix.",
      "modified": "2024-02-12T06:00:23.986000",
      "created": "2024-01-13T07:53:46.481000",
      "tags": [
        "langchinese",
        "rtcursor",
        "rtgroupcursor",
        "lotus",
        "regsetvalueexa",
        "write",
        "search",
        "regdword",
        "create c",
        "read c",
        "trojan",
        "copy",
        "win32",
        "malware",
        "agent",
        "unknown",
        "next",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "urls http",
        "gameid0 http",
        "please",
        "xport",
        "malware infection",
        "default",
        "crlf line",
        "unicode",
        "showing",
        "show",
        "medium",
        "compiler",
        "submission",
        "vhash",
        "imphash",
        "rich pe",
        "ssdeep",
        "win32 exe",
        "magic pe32",
        "ms windows",
        "intel",
        "simplified",
        "sections",
        "sha256 file",
        "type type",
        "chi2",
        "vs2003",
        "highlights",
        "file",
        "file version",
        "description",
        "original",
        "internal name",
        "version",
        "portable",
        "info compiler",
        "products",
        "whois record",
        "contacted",
        "pe resource",
        "whois whois",
        "historical ssl",
        "ssl certificate",
        "resolutions",
        "subdomains",
        "referrer",
        "pippidxsd",
        "execution",
        "stealer",
        "benjamin",
        "worm",
        "rar",
        "pe",
        "pexee",
        "crack",
        "remote",
        "download",
        "registrar abuse",
        "date",
        "redacted for",
        "server",
        "letshost",
        "domain status",
        "registry tech",
        "registrar whois",
        "contact email",
        "registry domain",
        "code",
        "service",
        "algorithm",
        "first",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "win32 dll",
        "ace utilities",
        "unhackme",
        "type name",
        "wextract",
        "total commander",
        "powerpack",
        "windows doctor",
        "tagwrapcore",
        "communicating",
        "51260032",
        "61760164",
        "bundled",
        "scam",
        "password",
        "fraud services",
        "cybercrime"
      ],
      "references": [
        "Game-Version-Update.exe",
        "File: 2373aaec6f38bb129aab12741f2d8be237e0629db1f50206bae0ebefd959815a",
        "history.ie",
        "Yara ruleset match: Windows_API_Function by InQuest Labs",
        "registry-commander.exe",
        "password-recovery-tools-2012-professional-trial.exe",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [how could this be in everything!?]",
        "https://www.anyxxxtube.net/media/favicon/apple",
        "https://mail.greycroft.com/owa/redir.aspx?SURL=zRgJdPcEmzMcui5aPZuMhrMWFaQp7UWJt7B48ki50f3tl7bBVhrTCGgAdAB0AHAAcwA6AC8ALwBpAHQAdQBuAGUAcwAuAGEAcABwAGwAZQAuAGMAbwBtAC8AdQBzAC8AYQBwAHAALwBhAG4AaQBtAGEAdABpAGMALQBiAHkALQBpAG4AawBiAG8AYQByAGQALwBpAGQAMQAwADUAMgAzADcAOQAxADUANAA_AGwAcwA9ADEAJgBtAHQAPQA4AA..&URL=https://itunes.apple.com/us/app/animatic-by-inkboard/id1052379154?ls=1&mt=8",
        "https://mediacherry.space/vn/vb/wheel/?key=eyJ0aW1lc3RhbXAiOiIxNzA0ODcwMzc2IiwiaGFzaCI6ImI5OWQ3ODQ3NTIyMDA5NTBmNmRiODY1NmUxNWY5YWMyZTc3MGExMTcifQ==&ccc=VN&ppp=PropellerAds:Popunder&tdom=www.a1000.online&zoneid=6534225&bemobdata=c=2f8cb72d-d2e6-4570-b258-aeb3acc53b24..l=6d25aa09-cccc-4797-aef4-7aa11d1e0dcb..a=0..b=0..z=0.000035..e=768844675632074752..c1=6534225..c2=7541054..c3=VN..c4=wireless..c5=viettel_mobile-vn..c6=other..c7=chrome..c8=27..c9=viettelcorporation..c10=Mozilla/5~BEMOB_DOT~0(Linux;Android10;K",
        "device-local-bf56eb52-6fc6-435b-aadb-9fa1dd89702c.remotewd.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:Agent-AOKS\\ [Trj]",
          "display_name": "Win32:Agent-AOKS\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Bho-136",
          "display_name": "Win.Trojan.Bho-136",
          "target": null
        },
        {
          "id": "Trojan:Win32/BHO.CV",
          "display_name": "Trojan:Win32/BHO.CV",
          "target": "/malware/Trojan:Win32/BHO.CV"
        },
        {
          "id": "trojan.onlinegames/aoks",
          "display_name": "trojan.onlinegames/aoks",
          "target": null
        },
        {
          "id": "Worm:Win32/Benjamin",
          "display_name": "Worm:Win32/Benjamin",
          "target": "/malware/Worm:Win32/Benjamin"
        },
        {
          "id": "CRACK_UnHackMe_sigma.rar",
          "display_name": "CRACK_UnHackMe_sigma.rar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 679,
        "FileHash-SHA1": 630,
        "FileHash-SHA256": 4958,
        "URL": 4966,
        "domain": 437,
        "hostname": 1429,
        "email": 1
      },
      "indicator_count": 13100,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "798 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://gateway.hleen.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://gateway.hleen.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776682117.931905
}