{
  "type": "URL",
  "indicator": "https://hao.360.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://hao.360.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #180",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #2739",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain 360.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain 360.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "private",
        "message": "Private IP Address",
        "name": "Private / Internal IP"
      }
    ],
    "base_indicator": {
      "id": 4132425333,
      "indicator": "https://hao.360.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "69544c73467a9c3858556698",
          "name": "Mira Malware Drive By Compromise Google.com search engine  | Microsoft | Apple",
          "description": "Microsoft Mira Malware Drive By Compromise Google.com.\n Device infected with MyDoom zombie maker. \nEstablished user location, screen captures, corrupted Apple device via Google search engine browser redirect. Attack began 12.30.2025 past midnight. Threat actor powered on cameras, microphones, and preformed their hacker intentions. #stateofcolorado",
          "modified": "2026-01-29T21:02:54.448000",
          "created": "2025-12-30T22:04:35.565000",
          "tags": [
            "content",
            "kb body",
            "p3p cp",
            "date tue",
            "gmt server",
            "html info",
            "12.30.2025",
            "urls",
            "url add",
            "http",
            "ip address",
            "related nids",
            "files location",
            "united",
            "flag united",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "assigned pa",
            "status",
            "whois server",
            "ripe ncc",
            "ripe network",
            "abuse contact",
            "orgid",
            "address",
            "orgabuseref",
            "postalcode",
            "ripe",
            "email",
            "flag",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "found",
            "ssl certificate",
            "execution",
            "google llc",
            "ascii text",
            "mitre att",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "data upload",
            "extraction",
            "ta0004",
            "evasion ta0005",
            "injection t1055",
            "t1055",
            "col ta0011",
            "l t1071",
            "encrypted ch",
            "t1573",
            "present nov",
            "present oct",
            "certificate",
            "present dec",
            "aaaa",
            "search",
            "servers",
            "record value",
            "emails",
            "title",
            "leveidiuelabs",
            "include",
            "review",
            "exclude data",
            "suggested ogs",
            "find s",
            "command decode",
            "development att",
            "initial access",
            "t1189 driveby",
            "html",
            "execution att",
            "href",
            "size",
            "pattern match",
            "filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "malware",
            "trojan",
            "mira malware",
            "push",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "yara rule",
            "program",
            "runtime error",
            "medium",
            "python",
            "win64",
            "unknown",
            "guard",
            "accept",
            "write",
            "launcher",
            "updater",
            "smartassembly",
            "delphi",
            "ee fc",
            "ff d5",
            "f0 ff",
            "eb e1",
            "ff ff",
            "c1 e8",
            "c1 c0",
            "eb e8",
            "copy",
            "next",
            "mydoom checkin",
            "win32mydoom dec",
            "name servers",
            "creation date",
            "passive dns",
            "domain",
            "expiration date",
            "hostname",
            "date",
            "google chrome",
            "screen capture",
            "locate human",
            "target",
            "black hat",
            "apple",
            "microsoft",
            "google",
            "stateofcolorado",
            "christopher ahmann",
            "brian sabey"
          ],
          "references": [
            "Google.com sorry not sorry index | https://www.google.com/search",
            "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
            "redirector.gvt1.com",
            "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
            "microsoft-falcon.net",
            "hattchett.ddns.net",
            "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
            "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
            "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
            "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
            "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
            "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
            "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
            "Yara Detections SUSP_Imphash_Mar23_2",
            "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
            "userlocation-prod.ingress.kors.microsoft-falcon.net ->",
            "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
            "To get future Google Chrome updates, you'll need"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Mira",
              "display_name": "Trojan:Win32/Mira",
              "target": "/malware/Trojan:Win32/Mira"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Mydoom Checkin",
              "display_name": "Mydoom Checkin",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1048.001",
              "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
              "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1939,
            "hostname": 1205,
            "URL": 3310,
            "domain": 432,
            "FileHash-MD5": 396,
            "CIDR": 3,
            "email": 16,
            "FileHash-SHA1": 373,
            "SSLCertFingerprint": 13,
            "CVE": 1
          },
          "indicator_count": 7688,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "80 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68cd76f1888c22a2e105e524",
          "name": "Sign in - Google Accounts | Ransomware G3nasom",
          "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
          "modified": "2025-10-19T14:00:01.535000",
          "created": "2025-09-19T15:29:53.126000",
          "tags": [
            "sign",
            "google account",
            "email",
            "forgot email",
            "private window",
            "learn",
            "guest mode",
            "next create",
            "dynamicloader",
            "windows nt",
            "msie",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "owotrus ca",
            "limited",
            "server ca",
            "python",
            "write",
            "trojan",
            "guard",
            "win64",
            "accept",
            "updater",
            "launcher",
            "malware",
            "contacted",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "passive dns",
            "google trust",
            "ip address",
            "related nids",
            "united",
            "url http",
            "present aug",
            "present sep",
            "present jul",
            "unknown aaaa",
            "domain",
            "title",
            "body",
            "trojandropper",
            "mtb sep",
            "meta",
            "next associated",
            "win32upatre sep",
            "backdoor",
            "ipv4",
            "moved",
            "ddos",
            "data upload",
            "extraction",
            "iocs",
            "failed",
            "source url",
            "indicato",
            "mat my",
            "data",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "found",
            "command",
            "initial access",
            "spawns",
            "chrome",
            "gmt content",
            "avast avg",
            "next http",
            "ascii text",
            "size",
            "pattern match",
            "mitre att",
            "error",
            "null",
            "android",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "trident",
            "write c",
            "medium",
            "search",
            "show",
            "high",
            "push",
            "service",
            "ms defender",
            "files matching",
            "number",
            "hide samples",
            "date hash",
            "next yara",
            "emotet",
            "g3nasom",
            "entries",
            "alerts show",
            "ck technique",
            "technique id",
            "io control",
            "anomalous",
            "geofencing",
            "sha256 add",
            "pulse pulses",
            "copy"
          ],
          "references": [
            "http://accounts.google.com/v3/signin/identifier",
            "Yara Detection: Cabinet _Archive",
            "Banking Malware"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/G3nasom",
              "display_name": "ALF:Trojan:Win32/G3nasom",
              "target": null
            },
            {
              "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Backdoor:Win32/Berbew",
              "display_name": "Backdoor:Win32/Berbew",
              "target": "/malware/Backdoor:Win32/Berbew"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.KDS!MTB",
              "display_name": "Trojan:Win32/Emotet.KDS!MTB",
              "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 531,
            "FileHash-SHA256": 1069,
            "URL": 1607,
            "FileHash-MD5": 275,
            "FileHash-SHA1": 187,
            "SSLCertFingerprint": 25,
            "domain": 188,
            "email": 2
          },
          "indicator_count": 3884,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "182 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
        "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
        "Yara Detections SUSP_Imphash_Mar23_2",
        "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
        "redirector.gvt1.com",
        "microsoft-falcon.net",
        "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
        "To get future Google Chrome updates, you'll need",
        "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
        "hattchett.ddns.net",
        "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
        "http://accounts.google.com/v3/signin/identifier",
        "Yara Detection: Cabinet _Archive",
        "Banking Malware",
        "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
        "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
        "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
        "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
        "Google.com sorry not sorry index | https://www.google.com/search",
        "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
        "userlocation-prod.ingress.kors.microsoft-falcon.net ->"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Emotet",
            "Alf:trojan:win32/g3nasom",
            "Upatre",
            "Trojandropper:win32/muldrop.v!mtb",
            "Mydoom checkin",
            "Win.trojan.barys-10005825-0",
            "Backdoor:win32/berbew",
            "Trojan:win32/mira",
            "Trojan:win32/emotet.kds!mtb",
            "Win.ransomware.gandcrab-10044141-0\t(renamed g3nasom)"
          ],
          "industries": [],
          "unique_indicators": 11597
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/360.com",
    "whois": "http://whois.domaintools.com/360.com",
    "domain": "360.com",
    "hostname": "hao.360.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "69544c73467a9c3858556698",
      "name": "Mira Malware Drive By Compromise Google.com search engine  | Microsoft | Apple",
      "description": "Microsoft Mira Malware Drive By Compromise Google.com.\n Device infected with MyDoom zombie maker. \nEstablished user location, screen captures, corrupted Apple device via Google search engine browser redirect. Attack began 12.30.2025 past midnight. Threat actor powered on cameras, microphones, and preformed their hacker intentions. #stateofcolorado",
      "modified": "2026-01-29T21:02:54.448000",
      "created": "2025-12-30T22:04:35.565000",
      "tags": [
        "content",
        "kb body",
        "p3p cp",
        "date tue",
        "gmt server",
        "html info",
        "12.30.2025",
        "urls",
        "url add",
        "http",
        "ip address",
        "related nids",
        "files location",
        "united",
        "flag united",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "assigned pa",
        "status",
        "whois server",
        "ripe ncc",
        "ripe network",
        "abuse contact",
        "orgid",
        "address",
        "orgabuseref",
        "postalcode",
        "ripe",
        "email",
        "flag",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "found",
        "ssl certificate",
        "execution",
        "google llc",
        "ascii text",
        "mitre att",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "data upload",
        "extraction",
        "ta0004",
        "evasion ta0005",
        "injection t1055",
        "t1055",
        "col ta0011",
        "l t1071",
        "encrypted ch",
        "t1573",
        "present nov",
        "present oct",
        "certificate",
        "present dec",
        "aaaa",
        "search",
        "servers",
        "record value",
        "emails",
        "title",
        "leveidiuelabs",
        "include",
        "review",
        "exclude data",
        "suggested ogs",
        "find s",
        "command decode",
        "development att",
        "initial access",
        "t1189 driveby",
        "html",
        "execution att",
        "href",
        "size",
        "pattern match",
        "filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "medium risk",
        "malware",
        "trojan",
        "mira malware",
        "push",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "yara rule",
        "program",
        "runtime error",
        "medium",
        "python",
        "win64",
        "unknown",
        "guard",
        "accept",
        "write",
        "launcher",
        "updater",
        "smartassembly",
        "delphi",
        "ee fc",
        "ff d5",
        "f0 ff",
        "eb e1",
        "ff ff",
        "c1 e8",
        "c1 c0",
        "eb e8",
        "copy",
        "next",
        "mydoom checkin",
        "win32mydoom dec",
        "name servers",
        "creation date",
        "passive dns",
        "domain",
        "expiration date",
        "hostname",
        "date",
        "google chrome",
        "screen capture",
        "locate human",
        "target",
        "black hat",
        "apple",
        "microsoft",
        "google",
        "stateofcolorado",
        "christopher ahmann",
        "brian sabey"
      ],
      "references": [
        "Google.com sorry not sorry index | https://www.google.com/search",
        "cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc 2025",
        "redirector.gvt1.com",
        "Names: cb=loaded_h_0&sei=7xhUabPOD4LmwN4P57CMuQc",
        "microsoft-falcon.net",
        "hattchett.ddns.net",
        "Office Open XML Spreadsheet: jnlwore.exe \u2022 Office Open: XML Spreadsheet \u2022 logs.xlsx",
        "XML: sharedStrings.xml \u2022Text: blacklist-6649dcf91af1d.csv",
        "https://www.virustotal.com/gui/file/de41f4d690511126ce2b8b5df3c0ffdde792df495ea6bb9fe2fec5f8b175e408/summary",
        "x-hallmonitor-challenge CgwI-LPQygYQwp6yigISBGuywgs",
        "https://www.google.com/sorry/index \u2022 http://g.co/p3p...-> g.co",
        "https://7849f20f.open.convertkit-mail2.com/68une4gx9xi8h50394ziohpe59okkh9hdg44x",
        "Microsoft Corporation: FileVersion: 1.0.0.155 Microsoft Corporation Legal Trademark: Mira Malware",
        "Yara Detections SUSP_Imphash_Mar23_2",
        "https://otx.alienvault.com/indicator/hostname/mx-in-ma.apple.com",
        "userlocation-prod.ingress.kors.microsoft-falcon.net ->",
        "\u4e3b\u9875\uff0c\u6574\u4e2a\u4e16\u754c X + < \u2192 C \u2022 hao.360.com/?src=lm&ls=n6abbbb598c ->",
        "To get future Google Chrome updates, you'll need"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Mira",
          "display_name": "Trojan:Win32/Mira",
          "target": "/malware/Trojan:Win32/Mira"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Mydoom Checkin",
          "display_name": "Mydoom Checkin",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1048.001",
          "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
          "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1939,
        "hostname": 1205,
        "URL": 3310,
        "domain": 432,
        "FileHash-MD5": 396,
        "CIDR": 3,
        "email": 16,
        "FileHash-SHA1": 373,
        "SSLCertFingerprint": 13,
        "CVE": 1
      },
      "indicator_count": 7688,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "80 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68cd76f1888c22a2e105e524",
      "name": "Sign in - Google Accounts | Ransomware G3nasom",
      "description": "Needs to more research due to how malicious it is. Did attack a monitored target via Google search.\n\nI haven\u2019t put the time into naming all vulnerabilities. Positive for ransomware ALF:Trojan:Win32/G3nasom formerly named \u201c Win.Ransomware.Gandcrab-10044141-0\u201d",
      "modified": "2025-10-19T14:00:01.535000",
      "created": "2025-09-19T15:29:53.126000",
      "tags": [
        "sign",
        "google account",
        "email",
        "forgot email",
        "private window",
        "learn",
        "guest mode",
        "next create",
        "dynamicloader",
        "windows nt",
        "msie",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "owotrus ca",
        "limited",
        "server ca",
        "python",
        "write",
        "trojan",
        "guard",
        "win64",
        "accept",
        "updater",
        "launcher",
        "malware",
        "contacted",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "passive dns",
        "google trust",
        "ip address",
        "related nids",
        "united",
        "url http",
        "present aug",
        "present sep",
        "present jul",
        "unknown aaaa",
        "domain",
        "title",
        "body",
        "trojandropper",
        "mtb sep",
        "meta",
        "next associated",
        "win32upatre sep",
        "backdoor",
        "ipv4",
        "moved",
        "ddos",
        "data upload",
        "extraction",
        "iocs",
        "failed",
        "source url",
        "indicato",
        "mat my",
        "data",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "found",
        "command",
        "initial access",
        "spawns",
        "chrome",
        "gmt content",
        "avast avg",
        "next http",
        "ascii text",
        "size",
        "pattern match",
        "mitre att",
        "error",
        "null",
        "android",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "trident",
        "write c",
        "medium",
        "search",
        "show",
        "high",
        "push",
        "service",
        "ms defender",
        "files matching",
        "number",
        "hide samples",
        "date hash",
        "next yara",
        "emotet",
        "g3nasom",
        "entries",
        "alerts show",
        "ck technique",
        "technique id",
        "io control",
        "anomalous",
        "geofencing",
        "sha256 add",
        "pulse pulses",
        "copy"
      ],
      "references": [
        "http://accounts.google.com/v3/signin/identifier",
        "Yara Detection: Cabinet _Archive",
        "Banking Malware"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/G3nasom",
          "display_name": "ALF:Trojan:Win32/G3nasom",
          "target": null
        },
        {
          "id": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "display_name": "Win.Ransomware.Gandcrab-10044141-0\t(renamed G3nasom)",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Backdoor:Win32/Berbew",
          "display_name": "Backdoor:Win32/Berbew",
          "target": "/malware/Backdoor:Win32/Berbew"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.KDS!MTB",
          "display_name": "Trojan:Win32/Emotet.KDS!MTB",
          "target": "/malware/Trojan:Win32/Emotet.KDS!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 531,
        "FileHash-SHA256": 1069,
        "URL": 1607,
        "FileHash-MD5": 275,
        "FileHash-SHA1": 187,
        "SSLCertFingerprint": 25,
        "domain": 188,
        "email": 2
      },
      "indicator_count": 3884,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "182 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://hao.360.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://hao.360.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776661907.522867
}