{
  "type": "URL",
  "indicator": "https://help.axur.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://help.axur.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3003607968,
      "indicator": "https://help.axur.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "698e906da16336f8e87c3b90",
          "name": "CoinHive Clone ",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-02-13T02:46:05.544000",
          "tags": [
            "united",
            "td tr",
            "a domains",
            "history group",
            "state",
            "b td",
            "present sep",
            "find",
            "alabama",
            "iowa",
            "apache",
            "content type",
            "passive dns",
            "meta http",
            "content",
            "gmt server",
            "pragma",
            "title",
            "linksys eseries",
            "device rce",
            "inbound",
            "et exploit",
            "attempt",
            "et webserver",
            "suspicious user",
            "user agent",
            "et worm",
            "policy python",
            "python",
            "agent",
            "generic",
            "malware",
            "nids",
            "dst_ip",
            "\"sid\": 2017515,",
            "2020/08/23",
            "dst_port\": 8080",
            "suricata",
            "network_icmp",
            "tcp_syn_scan",
            "unix",
            "mirai",
            "infection",
            "port 8080",
            "aitm",
            "mitm",
            "xfinity",
            "lumen backbone",
            "xfinity cf",
            "et info",
            "useragent",
            "webserver",
            "android",
            "linux",
            "statistically stripped",
            "local",
            "Jefferson County",
            "Colorado",
            "State",
            "is__elf",
            "is__war",
            "cyber warfare",
            "marking",
            "targeting",
            "stalking",
            "impersonating",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "mitre att",
            "ck matrix",
            "february",
            "hybrid",
            "general",
            "path",
            "encrypt",
            "click",
            "strings",
            "attack",
            "ssl certificate",
            "ascii text",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "medium",
            "high",
            "eb d8",
            "f0 ff",
            "ff bb",
            "host",
            "unknown",
            "explorer",
            "virtool",
            "write",
            "next",
            "Douglas County",
            "Michael Roberts",
            "Brian Sabey",
            "Chris\u2019Buzz\u2019 Ahmann",
            "Mirai BotMaster",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "date march",
            "am size",
            "imphash",
            "otx logo",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "moved",
            "urls",
            "expiration date",
            "all hostname",
            "files",
            "media",
            "present feb",
            "present jan",
            "present dec",
            "present nov",
            "ip address",
            "present",
            "codex",
            "sf.net",
            "next associated",
            "ipv4 add",
            "location united",
            "america flag",
            "spawns",
            "found",
            "t1480 execution",
            "pattern match",
            "present aug",
            "search",
            "name servers",
            "showing",
            "record value",
            "meta",
            "accept",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "denver",
            "yandex",
            "post",
            "entries",
            "post http",
            "show",
            "post liquor",
            "execution",
            "port",
            "destination",
            "icmp traffic",
            "dns query",
            "include",
            "top source"
          ],
          "references": [
            "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
            "genealogytrails.com",
            "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
            "Has been present throughout a specific campaign",
            "Mirai",
            "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
            "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
            "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
            "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
            "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
            "ET INFO User-Agent (python-requests) Inbound to Webserver",
            "Suspicious User Agent | ETPRO POLICY Python Requests",
            "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
            "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
            "TCP SYN packets were observed",
            "ET WORM TheMoon.linksys.router",
            "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
            "\"ET WEB_SERVER WebShell Generic - wget http - POST",
            "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
            "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
            "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
            "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
            "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
            "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
            "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
            "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
            "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
            "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
            "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
            "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
            "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
            "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
            "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
            "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
            "IPs Contacted:  149.56.240.31  172.66.136.209",
            "Domains Contacted: c.statcounter.com sstatic1.histats.com",
            "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
            "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
            "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
            "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
            "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
            "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
            "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
            "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-7646352-0",
              "display_name": "Unix.Trojan.Mirai-7646352-0",
              "target": null
            },
            {
              "id": "SpyFu",
              "display_name": "SpyFu",
              "target": null
            },
            {
              "id": "Win.Trojan.VB-83922",
              "display_name": "Win.Trojan.VB-83922",
              "target": null
            },
            {
              "id": "virtool:Win32/VBInject.gen!JB",
              "display_name": "virtool:Win32/VBInject.gen!JB",
              "target": "/malware/virtool:Win32/VBInject.gen!JB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "698966742c9fd9691396bb3a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5836,
            "domain": 857,
            "FileHash-MD5": 185,
            "FileHash-SHA1": 147,
            "hostname": 1842,
            "email": 7,
            "FileHash-SHA256": 947,
            "CVE": 43,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 9872,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "698966742c9fd9691396bb3a",
          "name": "CoinHive In-Browser Miner | ET EXPLOIT Linksys E-Series Device RCE Attempt via \u2018AI chat\u2019  Xfinity Commercial Fleet vehicle parked /AITM",
          "description": "Merits further research. Work no is consistent with a man advocate named Michael\nRoberts of Rexxfield and Miles2/ Mile2 / seen frequently in attacks against females | targeted individual apparently was using an AI browser search when a keyword triggered glitches.\nSearch of a URL\ntarget has never heard of or seen found in device search results. Targets device injected, Mirai botnet found, Other suspicious findings. TBConrinued..:.\n[OTX. Auto populated Significantly more details have been revealed about the GoDaddy.com domain, which has been listed as an unregistered domain by the Internet Service Authority (icann). and its users are not allowed to use it.] #man_jn_tve_midxle #drive_ by_compromise #injection.",
          "modified": "2026-03-11T04:02:50.189000",
          "created": "2026-02-09T04:45:40.250000",
          "tags": [
            "united",
            "td tr",
            "a domains",
            "history group",
            "state",
            "b td",
            "present sep",
            "find",
            "alabama",
            "iowa",
            "apache",
            "content type",
            "passive dns",
            "meta http",
            "content",
            "gmt server",
            "pragma",
            "title",
            "linksys eseries",
            "device rce",
            "inbound",
            "et exploit",
            "attempt",
            "et webserver",
            "suspicious user",
            "user agent",
            "et worm",
            "policy python",
            "python",
            "agent",
            "generic",
            "malware",
            "nids",
            "dst_ip",
            "\"sid\": 2017515,",
            "2020/08/23",
            "dst_port\": 8080",
            "suricata",
            "network_icmp",
            "tcp_syn_scan",
            "unix",
            "mirai",
            "infection",
            "port 8080",
            "aitm",
            "mitm",
            "xfinity",
            "lumen backbone",
            "xfinity cf",
            "et info",
            "useragent",
            "webserver",
            "android",
            "linux",
            "statistically stripped",
            "local",
            "Jefferson County",
            "Colorado",
            "State",
            "is__elf",
            "is__war",
            "cyber warfare",
            "marking",
            "targeting",
            "stalking",
            "impersonating",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "mitre att",
            "ck matrix",
            "february",
            "hybrid",
            "general",
            "path",
            "encrypt",
            "click",
            "strings",
            "attack",
            "ssl certificate",
            "ascii text",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "medium",
            "high",
            "eb d8",
            "f0 ff",
            "ff bb",
            "host",
            "unknown",
            "explorer",
            "virtool",
            "write",
            "next",
            "Douglas County",
            "Michael Roberts",
            "Brian Sabey",
            "Chris\u2019Buzz\u2019 Ahmann",
            "Mirai BotMaster",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "date march",
            "am size",
            "imphash",
            "otx logo",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "moved",
            "urls",
            "expiration date",
            "all hostname",
            "files",
            "media",
            "present feb",
            "present jan",
            "present dec",
            "present nov",
            "ip address",
            "present",
            "codex",
            "sf.net",
            "next associated",
            "ipv4 add",
            "location united",
            "america flag",
            "spawns",
            "found",
            "t1480 execution",
            "pattern match",
            "present aug",
            "search",
            "name servers",
            "showing",
            "record value",
            "meta",
            "accept",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "denver",
            "yandex",
            "post",
            "entries",
            "post http",
            "show",
            "post liquor",
            "execution",
            "port",
            "destination",
            "icmp traffic",
            "dns query",
            "include",
            "top source"
          ],
          "references": [
            "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
            "genealogytrails.com",
            "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
            "Has been present throughout a specific campaign",
            "Mirai",
            "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
            "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
            "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
            "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
            "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
            "ET INFO User-Agent (python-requests) Inbound to Webserver",
            "Suspicious User Agent | ETPRO POLICY Python Requests",
            "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
            "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
            "TCP SYN packets were observed",
            "ET WORM TheMoon.linksys.router",
            "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
            "\"ET WEB_SERVER WebShell Generic - wget http - POST",
            "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
            "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
            "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
            "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
            "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
            "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
            "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
            "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
            "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
            "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
            "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
            "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
            "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
            "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
            "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
            "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
            "IPs Contacted:  149.56.240.31  172.66.136.209",
            "Domains Contacted: c.statcounter.com sstatic1.histats.com",
            "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
            "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
            "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
            "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
            "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
            "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
            "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
            "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-7646352-0",
              "display_name": "Unix.Trojan.Mirai-7646352-0",
              "target": null
            },
            {
              "id": "SpyFu",
              "display_name": "SpyFu",
              "target": null
            },
            {
              "id": "Win.Trojan.VB-83922",
              "display_name": "Win.Trojan.VB-83922",
              "target": null
            },
            {
              "id": "virtool:Win32/VBInject.gen!JB",
              "display_name": "virtool:Win32/VBInject.gen!JB",
              "target": "/malware/virtool:Win32/VBInject.gen!JB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5779,
            "domain": 730,
            "FileHash-MD5": 185,
            "FileHash-SHA1": 147,
            "hostname": 1790,
            "email": 5,
            "FileHash-SHA256": 947,
            "CVE": 3,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 9594,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "39 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570800373899fd03e2e49db",
          "name": "Democrats.org",
          "description": "",
          "modified": "2023-12-06T14:06:59.250000",
          "created": "2023-12-06T14:06:59.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3114,
            "domain": 3501,
            "hostname": 3860,
            "URL": 17938,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220c81aaf6fddde0116569a",
          "name": "Democrats.org",
          "description": "",
          "modified": "2022-04-02T00:04:50.405000",
          "created": "2022-03-03T13:52:26.328000",
          "tags": [
            "date",
            "dns replication"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 17938,
            "hostname": 3860,
            "domain": 3501,
            "FileHash-SHA256": 3114,
            "FileHash-MD5": 2,
            "FileHash-SHA1": 10
          },
          "indicator_count": 28425,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "genealogytrails.com",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "Has been present throughout a specific campaign",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "TCP SYN packets were observed",
        "ET WORM TheMoon.linksys.router",
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "Mirai",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile .."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Et",
            "Spyfu",
            "Nids",
            "Unix.trojan.mirai-7646352-0",
            "Virtool:win32/vbinject.gen!jb",
            "Win.trojan.vb-83922"
          ],
          "industries": [],
          "unique_indicators": 39424
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/axur.com",
    "whois": "http://whois.domaintools.com/axur.com",
    "domain": "axur.com",
    "hostname": "help.axur.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "698e906da16336f8e87c3b90",
      "name": "CoinHive Clone ",
      "description": "",
      "modified": "2026-03-27T00:30:39.055000",
      "created": "2026-02-13T02:46:05.544000",
      "tags": [
        "united",
        "td tr",
        "a domains",
        "history group",
        "state",
        "b td",
        "present sep",
        "find",
        "alabama",
        "iowa",
        "apache",
        "content type",
        "passive dns",
        "meta http",
        "content",
        "gmt server",
        "pragma",
        "title",
        "linksys eseries",
        "device rce",
        "inbound",
        "et exploit",
        "attempt",
        "et webserver",
        "suspicious user",
        "user agent",
        "et worm",
        "policy python",
        "python",
        "agent",
        "generic",
        "malware",
        "nids",
        "dst_ip",
        "\"sid\": 2017515,",
        "2020/08/23",
        "dst_port\": 8080",
        "suricata",
        "network_icmp",
        "tcp_syn_scan",
        "unix",
        "mirai",
        "infection",
        "port 8080",
        "aitm",
        "mitm",
        "xfinity",
        "lumen backbone",
        "xfinity cf",
        "et info",
        "useragent",
        "webserver",
        "android",
        "linux",
        "statistically stripped",
        "local",
        "Jefferson County",
        "Colorado",
        "State",
        "is__elf",
        "is__war",
        "cyber warfare",
        "marking",
        "targeting",
        "stalking",
        "impersonating",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "mitre att",
        "ck matrix",
        "february",
        "hybrid",
        "general",
        "path",
        "encrypt",
        "click",
        "strings",
        "attack",
        "ssl certificate",
        "ascii text",
        "dynamicloader",
        "yara rule",
        "ff d5",
        "medium",
        "high",
        "eb d8",
        "f0 ff",
        "ff bb",
        "host",
        "unknown",
        "explorer",
        "virtool",
        "write",
        "next",
        "Douglas County",
        "Michael Roberts",
        "Brian Sabey",
        "Chris\u2019Buzz\u2019 Ahmann",
        "Mirai BotMaster",
        "file type",
        "pexe",
        "pe32",
        "intel",
        "ms windows",
        "date march",
        "am size",
        "imphash",
        "otx logo",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "moved",
        "urls",
        "expiration date",
        "all hostname",
        "files",
        "media",
        "present feb",
        "present jan",
        "present dec",
        "present nov",
        "ip address",
        "present",
        "codex",
        "sf.net",
        "next associated",
        "ipv4 add",
        "location united",
        "america flag",
        "spawns",
        "found",
        "t1480 execution",
        "pattern match",
        "present aug",
        "search",
        "name servers",
        "showing",
        "record value",
        "meta",
        "accept",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "denver",
        "yandex",
        "post",
        "entries",
        "post http",
        "show",
        "post liquor",
        "execution",
        "port",
        "destination",
        "icmp traffic",
        "dns query",
        "include",
        "top source"
      ],
      "references": [
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "genealogytrails.com",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "Has been present throughout a specific campaign",
        "Mirai",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "TCP SYN packets were observed",
        "ET WORM TheMoon.linksys.router",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-7646352-0",
          "display_name": "Unix.Trojan.Mirai-7646352-0",
          "target": null
        },
        {
          "id": "SpyFu",
          "display_name": "SpyFu",
          "target": null
        },
        {
          "id": "Win.Trojan.VB-83922",
          "display_name": "Win.Trojan.VB-83922",
          "target": null
        },
        {
          "id": "virtool:Win32/VBInject.gen!JB",
          "display_name": "virtool:Win32/VBInject.gen!JB",
          "target": "/malware/virtool:Win32/VBInject.gen!JB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "698966742c9fd9691396bb3a",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5836,
        "domain": 857,
        "FileHash-MD5": 185,
        "FileHash-SHA1": 147,
        "hostname": 1842,
        "email": 7,
        "FileHash-SHA256": 947,
        "CVE": 43,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 9872,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "23 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "698966742c9fd9691396bb3a",
      "name": "CoinHive In-Browser Miner | ET EXPLOIT Linksys E-Series Device RCE Attempt via \u2018AI chat\u2019  Xfinity Commercial Fleet vehicle parked /AITM",
      "description": "Merits further research. Work no is consistent with a man advocate named Michael\nRoberts of Rexxfield and Miles2/ Mile2 / seen frequently in attacks against females | targeted individual apparently was using an AI browser search when a keyword triggered glitches.\nSearch of a URL\ntarget has never heard of or seen found in device search results. Targets device injected, Mirai botnet found, Other suspicious findings. TBConrinued..:.\n[OTX. Auto populated Significantly more details have been revealed about the GoDaddy.com domain, which has been listed as an unregistered domain by the Internet Service Authority (icann). and its users are not allowed to use it.] #man_jn_tve_midxle #drive_ by_compromise #injection.",
      "modified": "2026-03-11T04:02:50.189000",
      "created": "2026-02-09T04:45:40.250000",
      "tags": [
        "united",
        "td tr",
        "a domains",
        "history group",
        "state",
        "b td",
        "present sep",
        "find",
        "alabama",
        "iowa",
        "apache",
        "content type",
        "passive dns",
        "meta http",
        "content",
        "gmt server",
        "pragma",
        "title",
        "linksys eseries",
        "device rce",
        "inbound",
        "et exploit",
        "attempt",
        "et webserver",
        "suspicious user",
        "user agent",
        "et worm",
        "policy python",
        "python",
        "agent",
        "generic",
        "malware",
        "nids",
        "dst_ip",
        "\"sid\": 2017515,",
        "2020/08/23",
        "dst_port\": 8080",
        "suricata",
        "network_icmp",
        "tcp_syn_scan",
        "unix",
        "mirai",
        "infection",
        "port 8080",
        "aitm",
        "mitm",
        "xfinity",
        "lumen backbone",
        "xfinity cf",
        "et info",
        "useragent",
        "webserver",
        "android",
        "linux",
        "statistically stripped",
        "local",
        "Jefferson County",
        "Colorado",
        "State",
        "is__elf",
        "is__war",
        "cyber warfare",
        "marking",
        "targeting",
        "stalking",
        "impersonating",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "mitre att",
        "ck matrix",
        "february",
        "hybrid",
        "general",
        "path",
        "encrypt",
        "click",
        "strings",
        "attack",
        "ssl certificate",
        "ascii text",
        "dynamicloader",
        "yara rule",
        "ff d5",
        "medium",
        "high",
        "eb d8",
        "f0 ff",
        "ff bb",
        "host",
        "unknown",
        "explorer",
        "virtool",
        "write",
        "next",
        "Douglas County",
        "Michael Roberts",
        "Brian Sabey",
        "Chris\u2019Buzz\u2019 Ahmann",
        "Mirai BotMaster",
        "file type",
        "pexe",
        "pe32",
        "intel",
        "ms windows",
        "date march",
        "am size",
        "imphash",
        "otx logo",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "moved",
        "urls",
        "expiration date",
        "all hostname",
        "files",
        "media",
        "present feb",
        "present jan",
        "present dec",
        "present nov",
        "ip address",
        "present",
        "codex",
        "sf.net",
        "next associated",
        "ipv4 add",
        "location united",
        "america flag",
        "spawns",
        "found",
        "t1480 execution",
        "pattern match",
        "present aug",
        "search",
        "name servers",
        "showing",
        "record value",
        "meta",
        "accept",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "denver",
        "yandex",
        "post",
        "entries",
        "post http",
        "show",
        "post liquor",
        "execution",
        "port",
        "destination",
        "icmp traffic",
        "dns query",
        "include",
        "top source"
      ],
      "references": [
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "genealogytrails.com",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "Has been present throughout a specific campaign",
        "Mirai",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "TCP SYN packets were observed",
        "ET WORM TheMoon.linksys.router",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-7646352-0",
          "display_name": "Unix.Trojan.Mirai-7646352-0",
          "target": null
        },
        {
          "id": "SpyFu",
          "display_name": "SpyFu",
          "target": null
        },
        {
          "id": "Win.Trojan.VB-83922",
          "display_name": "Win.Trojan.VB-83922",
          "target": null
        },
        {
          "id": "virtool:Win32/VBInject.gen!JB",
          "display_name": "virtool:Win32/VBInject.gen!JB",
          "target": "/malware/virtool:Win32/VBInject.gen!JB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5779,
        "domain": 730,
        "FileHash-MD5": 185,
        "FileHash-SHA1": 147,
        "hostname": 1790,
        "email": 5,
        "FileHash-SHA256": 947,
        "CVE": 3,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 9594,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "39 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570800373899fd03e2e49db",
      "name": "Democrats.org",
      "description": "",
      "modified": "2023-12-06T14:06:59.250000",
      "created": "2023-12-06T14:06:59.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3114,
        "domain": 3501,
        "hostname": 3860,
        "URL": 17938,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6220c81aaf6fddde0116569a",
      "name": "Democrats.org",
      "description": "",
      "modified": "2022-04-02T00:04:50.405000",
      "created": "2022-03-03T13:52:26.328000",
      "tags": [
        "date",
        "dns replication"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 17938,
        "hostname": 3860,
        "domain": 3501,
        "FileHash-SHA256": 3114,
        "FileHash-MD5": 2,
        "FileHash-SHA1": 10
      },
      "indicator_count": 28425,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 408,
      "modified_text": "1478 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://help.axur.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://help.axur.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638781.8866227
}