{
  "type": "URL",
  "indicator": "https://help.github.com/pages/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://help.github.com/pages/",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #87",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #560",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain github.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain github.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2439469523,
      "indicator": "https://help.github.com/pages/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "69d8a665177b8f64c7ce5fca",
          "name": "LibraryLoader \u2022 Samuel Tulach | Abuse of malicious sssets engineered by DevOp & Security Researcher",
          "description": "Samuel Tulach is involved in various projects related to government work, particularly in areas like DevSecOps and app modernization. \nOverview of Samuel Tulach's \"uploader.exe\"\nThe file \"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines. This classification indicates that the file poses a potential threat to users' systems.\nSecurity Engine Flags. Several security engines have flagged \"uploader.exe\" as malicious.\nSecureAge APEX\tMalicious\nSentinelOne\tMalicious\nImplications of Malicious Flags\nPotential Risks: Files flagged as malicious can lead to various security issues, including data theft, unauthorized access, or system damage.\nRecommended Actions: Users should avoid downloading or executing this file. If already downloaded, it is advisable to delete it and run a full system scan using reputable antivirus software.",
          "modified": "2026-04-10T07:27:33.587000",
          "created": "2026-04-10T07:27:33.587000",
          "tags": [
            "x vercel",
            "united",
            "america",
            "germany malware",
            "family",
            "ck ids",
            "packing",
            "tulach",
            "ocsp",
            "extraction",
            "data upload",
            "enter sc",
            "extra data",
            "include review",
            "exclude sugges",
            "find s",
            "failed",
            "typ no",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "pattern match",
            "mitre att",
            "ascii text",
            "span",
            "title",
            "meta",
            "path",
            "april",
            "hybrid",
            "general",
            "local",
            "encrypt",
            "click",
            "strings",
            "main",
            "footer",
            "pcsb",
            "naga",
            "magda",
            "no expiration",
            "url https",
            "domain",
            "github pages",
            "a domains",
            "passive dns",
            "mtb jan",
            "class",
            "sea x",
            "accept encoding",
            "trojanspy",
            "accept",
            "otx logo",
            "all ipv4",
            "urls",
            "files",
            "america flag",
            "space",
            "ck matrix",
            "handle",
            "winvmaddress",
            "cdecl crashpad",
            "null",
            "software",
            "comment",
            "entity",
            "internal",
            "blank",
            "magic",
            "infinity",
            "first",
            "valentine",
            "error",
            "webview",
            "front",
            "patched",
            "root",
            "tristate",
            "libraryloader",
            "packing t1045",
            "icmp traffic",
            "memcommit",
            "pe section",
            "low software",
            "pe resource",
            "filehash",
            "win32",
            "malware",
            "write",
            "backdoor",
            "present apr",
            "lowfi",
            "aaaa",
            "lowfijavazkm",
            "x.com",
            "dynamicloader",
            "crlf line",
            "unicode text",
            "utf8",
            "ee fc",
            "ff d5",
            "yara rule",
            "f0 ff",
            "eb e1",
            "unknown",
            "trojan",
            "zeppelin",
            "autorun",
            "united states",
            "china unknown",
            "div div",
            "ip address",
            "record value",
            "samuel tulach",
            "czechia unknown",
            "italy unknown",
            "gmt server",
            "all domain",
            "next associated",
            "reverse dns",
            "location czech",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "file type",
            "telfhash",
            "virustotal api",
            "vendor finding",
            "notes clamav",
            "files matching",
            "number",
            "t1045",
            "search",
            "directui",
            "element",
            "medium",
            "classinfobase",
            "value",
            "write c",
            "hwndhost",
            "sapeav12",
            "worm",
            "explorer",
            "insert",
            "movie",
            "mtb apr",
            "mtb mar",
            "trojandropper",
            "displayname",
            "windows",
            "high",
            "delete c",
            "tofsee",
            "stream",
            "push",
            "url http",
            "c mar",
            "virtool",
            "c jan",
            "c dec",
            "toolbar",
            "ransom",
            "article",
            "windows nt",
            "gmtvia",
            "html",
            "bad traffic",
            "et info",
            "tls handshake",
            "belgium",
            "present dec",
            "present feb",
            "intel",
            "elf upx",
            "medium risk",
            "info",
            "moved",
            "hostname add",
            "whois registrar",
            "media",
            "delphi",
            "guard",
            "code",
            "devsecops",
            "github",
            "github internet",
            "archive samuel",
            "tulach",
            "government work",
            "key areas",
            "devops process",
            "security engine",
            "flags",
            "apex malicious",
            "implications",
            "malicious flags",
            "potential risks",
            "name servers",
            "apple id",
            "script urls",
            "show process",
            "secure",
            "win64",
            "khtml",
            "gecko",
            "programfiles",
            "cookie",
            "comspec",
            "model",
            "june",
            "spawns",
            "id name",
            "malicious",
            "gui",
            "anti cheats",
            "game tech",
            "c++"
          ],
          "references": [
            "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
            "bleepingcomputer.com \u2022 CliffsNotes",
            "x.com - Malware Packed",
            "nr-data.net \u2022 www.youtube.com",
            "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses",
            "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
            "discord.com \u2022 discord.gg",
            "api.item.yixun.com",
            "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
            "Domains Contacted: fenbushijujuefuwu.com",
            "angryblackwomyn.com",
            "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
            "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
            "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
            "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
            "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
            "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
            "https://api.w.org/ \u2022 api.w.org",
            "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
            "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
            "developer.x.com \u2022 https://twitter.com/githubstatus",
            "https://twitter.com/juvlarN",
            "appleid.cdn-apple.com",
            "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
            "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
            "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
            "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
            "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
            "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
            "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
            "The next pulse will show Apple IoC\u2019s related to Tulach.cc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LibraryLoader",
              "display_name": "LibraryLoader",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
              "target": null
            },
            {
              "id": "Win.Packed.Botx-10021462-0",
              "display_name": "Win.Packed.Botx-10021462-0",
              "target": null
            },
            {
              "id": "Win.Malware.Cymt-10023133-0",
              "display_name": "Win.Malware.Cymt-10023133-0",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Nemucod",
              "display_name": "TrojanDownloader:Win32/Nemucod",
              "target": "/malware/TrojanDownloader:Win32/Nemucod"
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Generickdz-9937235-0",
              "display_name": "Win.Malware.Generickdz-9937235-0",
              "target": null
            },
            {
              "id": "Win.Malware.Razy-6979265-0",
              "display_name": "Win.Malware.Razy-6979265-0",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Trojan:Win32/Mydoom",
              "display_name": "Trojan:Win32/Mydoom",
              "target": "/malware/Trojan:Win32/Mydoom"
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.DE",
              "display_name": "TrojanSpy:Win32/Nivdort.DE",
              "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
            },
            {
              "id": "SLF:Win32/Elenquay.A",
              "display_name": "SLF:Win32/Elenquay.A",
              "target": "/malware/SLF:Win32/Elenquay.A"
            },
            {
              "id": "Win.Dropper.QuasarRAT-10023124-0",
              "display_name": "Win.Dropper.QuasarRAT-10023124-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Zegost-9769410-0",
              "display_name": "Win.Trojan.Zegost-9769410-0",
              "target": null
            },
            {
              "id": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
              "display_name": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
              "target": null
            },
            {
              "id": "Win.Malware.Moonlight-9919383-0",
              "display_name": "Win.Malware.Moonlight-9919383-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "Backdoor:Win32/Tofsee.",
              "display_name": "Backdoor:Win32/Tofsee.",
              "target": "/malware/Backdoor:Win32/Tofsee."
            },
            {
              "id": "#LowfiJavaZKM",
              "display_name": "#LowfiJavaZKM",
              "target": null
            },
            {
              "id": "Win.Malware.Swisyn-7610494-0",
              "display_name": "Win.Malware.Swisyn-7610494-0",
              "target": null
            },
            {
              "id": "PWS:Win32/Ymacco.AA50",
              "display_name": "PWS:Win32/Ymacco.AA50",
              "target": "/malware/PWS:Win32/Ymacco.AA50"
            },
            {
              "id": "Win.Packed.Stealerc-10017074-0",
              "display_name": "Win.Packed.Stealerc-10017074-0",
              "target": null
            },
            {
              "id": "#Lowfi:Win32/AutoIt",
              "display_name": "#Lowfi:Win32/AutoIt",
              "target": "/malware/#Lowfi:Win32/AutoIt"
            },
            {
              "id": "Html.Trojan.Ascii212_44_64_202-1",
              "display_name": "Html.Trojan.Ascii212_44_64_202-1",
              "target": null
            },
            {
              "id": "ALFPER:HSTR:WizremURL.A1",
              "display_name": "ALFPER:HSTR:WizremURL.A1",
              "target": null
            },
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847893-0",
              "display_name": "Win.Malware.Midie-6847893-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop.V!MTB",
              "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
              "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Win.Malware.Aauto-9839281-0",
              "display_name": "Win.Malware.Aauto-9839281-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1371484",
              "display_name": "Win.Trojan.Agent-1371484",
              "target": null
            },
            {
              "id": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
              "display_name": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
              "display_name": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-9441505-0",
              "display_name": "Unix.Trojan.Mirai-9441505-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2710,
            "domain": 1227,
            "hostname": 1206,
            "FileHash-SHA256": 3867,
            "IPv4": 318,
            "FileHash-MD5": 593,
            "FileHash-SHA1": 459,
            "IPv6": 1,
            "SSLCertFingerprint": 19,
            "email": 20,
            "CVE": 1
          },
          "indicator_count": 10421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "9 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689cc89e77327602780be49e",
          "name": "Remotewd Devices \u2022 Spectrum / Charter Communications & AT&T",
          "description": "Remotewd Devices expanded \u2022 Spectrum / Charter Communications & AT&T.\nAdvesarial. Polymorphic.",
          "modified": "2025-09-12T16:05:33.542000",
          "created": "2025-08-13T17:17:18.456000",
          "tags": [
            "url https",
            "domain",
            "types of",
            "united kingdom",
            "sweden",
            "virgin islands",
            "china",
            "germany",
            "date",
            "status",
            "ip address",
            "search",
            "domain add",
            "passive dns",
            "urls",
            "files",
            "error sep",
            "present jul",
            "address google",
            "safe browsing",
            "united",
            "unknown ns",
            "moved",
            "body",
            "cloudfront x",
            "hio52 p1",
            "certificate",
            "win32",
            "trojan",
            "entries",
            "next associated",
            "title error",
            "ipv4",
            "host gh",
            "secure path",
            "httponly cache",
            "x github",
            "request id",
            "accept",
            "encrypt",
            "formbook cnc",
            "checkin",
            "a domains",
            "lowfi",
            "mtb jun",
            "github pages",
            "as11427",
            "us note",
            "route",
            "ptr record",
            "hostname add",
            "url analysis",
            "verdict",
            "general info",
            "geo mckinney",
            "texas",
            "spectrum",
            "charter communications",
            "charter collection",
            "auth",
            "files ip",
            "address",
            "asn as16509",
            "record value",
            "germany unknown",
            "meta",
            "gmt cache",
            "sans400",
            "condensed300",
            "feel lost",
            "h1 div",
            "server",
            "gmt connection",
            "keep alive",
            "pragma",
            "ipv4 add",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "unknown aaaa",
            "china unknown",
            "beijing",
            "unknown soa",
            "hostname",
            "present aug",
            "name servers",
            "aaaa",
            "windows nt",
            "dynamicloader",
            "generic http",
            "exe upload",
            "inbound",
            "outbound",
            "host",
            "medium",
            "write",
            "markus",
            "malware",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "showing",
            "error",
            "extraction",
            "se enter",
            "sc type",
            "data upload",
            "failed",
            "extr data",
            "ox sunnort",
            "include review",
            "exclude data",
            "iocs",
            "pdf report",
            "pcap",
            "stix",
            "openloc",
            "pul data",
            "move",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "pattern match",
            "ascii text",
            "show technique",
            "null",
            "refresh",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "class",
            "adversaries",
            "defense evasion",
            "initial access",
            "msie",
            "chrome",
            "gmt content",
            "main",
            "virtool",
            "idran anv",
            "exti",
            "concor referen",
            "running webserver",
            "review iocs",
            "suggested iocs",
            "show",
            "http traffic",
            "intel",
            "ms windows",
            "pe32",
            "high",
            "write c",
            "explorer",
            "unknown",
            "worm",
            "next",
            "comman_and_control",
            "et",
            "vtapi",
            "dos",
            "persistence",
            "polymorphic",
            "virus",
            "device",
            "script",
            "style",
            "endcolorstr",
            "regexp",
            "link",
            "powershell",
            "form",
            "push",
            "active",
            "remote_access",
            "general full",
            "protocol h2",
            "security tls",
            "austin",
            "asn7018",
            "attinternet4",
            "reverse dns",
            "software",
            "domains",
            "hashes",
            "at&t",
            "injection",
            "rwx",
            "hackers",
            "attack",
            "cape",
            "stealth hidden extension",
            "antivm generic",
            "cape detected",
            "threat stealth",
            "public folder",
            "deletes",
            "files anomalous",
            "disables system",
            "restore dead",
            "mail procmem",
            "yara suricata",
            "queries user name"
          ],
          "references": [
            "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
            "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
            "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
            "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
            "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
            "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
            "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
            "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
            "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
            "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
            "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
            "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
            "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
            "Ransomware File Modifications Exec Crash",
            "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
            "Request Queries Keyboard Layout Antivm Generic Disk Resumethread",
            "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
            "Contains Pe Overlay Queries Locale Api Language Check Registry"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "VirTool:Win32/Obfuscator.JM",
              "display_name": "VirTool:Win32/Obfuscator.JM",
              "target": "/malware/VirTool:Win32/Obfuscator.JM"
            },
            {
              "id": "Win.Trojan.Cycbot-1584",
              "display_name": "Win.Trojan.Cycbot-1584",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6171,
            "domain": 1823,
            "hostname": 3155,
            "email": 8,
            "FileHash-SHA256": 950,
            "FileHash-MD5": 345,
            "FileHash-SHA1": 317,
            "CVE": 1,
            "CIDR": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 12772,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "219 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66fc29a49b5ac693c8d75122",
          "name": "Medical Campus - Aurora, Co | Recheck",
          "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
          "modified": "2024-10-31T16:03:52.240000",
          "created": "2024-10-01T16:56:04.004000",
          "tags": [
            "united",
            "as397240",
            "search",
            "showing",
            "as54113",
            "as397241",
            "unknown",
            "moved",
            "creation date",
            "record value",
            "next",
            "date",
            "body",
            "a domains",
            "passive dns",
            "formbook cnc",
            "checkin",
            "entries",
            "github pages",
            "sea x",
            "accept",
            "status",
            "name servers",
            "certificate",
            "urls",
            "aaaa",
            "cname",
            "meta",
            "whitelisted ip",
            "address",
            "location united",
            "asn as36459",
            "github",
            "less whois",
            "registrar",
            "markmonitor",
            "related tags",
            "as36459",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "ninite",
            "expiration date",
            "domain",
            "hostname",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "document file",
            "v2 document",
            "utf8",
            "crlf line",
            "beginstring",
            "size",
            "null",
            "hybrid",
            "refresh",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "url https",
            "tulach type",
            "role title",
            "added active",
            "pulses url",
            "url http",
            "nextc type",
            "type indicator",
            "related pulses",
            "filehashsha256",
            "copyright",
            "ipv6",
            "germany",
            "italy",
            "trojan",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "linux x8664",
            "khtml",
            "gecko",
            "veryhigh",
            "redirect",
            "httpsupgrades",
            "collisionbox",
            "runner",
            "gameoverpanel",
            "trex",
            "orgtechhandle",
            "orgtechref",
            "director",
            "university",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "orgid",
            "east",
            "report spam",
            "as8075",
            "servers",
            "secure server",
            "error all",
            "typeof",
            "error f",
            "crazy doll",
            "created",
            "filehashmd5",
            "types of",
            "russia",
            "emotet type",
            "mirai type",
            "mirai",
            "mtb description",
            "win32 type",
            "as31034 aruba",
            "italy unknown",
            "as19527 google",
            "encrypt",
            "health type",
            "miori hackers",
            "brute force",
            "backdoor",
            "aurora",
            "ip address",
            "path",
            "unis",
            "dotcisoffer",
            "bladabindi",
            "artro",
            "script urls",
            "as46606",
            "brazil unknown",
            "as11284",
            "as10906",
            "apache",
            "lanc type",
            "telper",
            "win32",
            "win64",
            "pulses email",
            "as9009 m247",
            "as7296 alchemy",
            "as14061",
            "as16276",
            "trojandropper",
            "ransom",
            "mtb sep",
            "msie",
            "chrome",
            "ip check",
            "gmt content",
            "pulse submit",
            "url analysis",
            "files ip",
            "aaaa nxdomain",
            "nxdomain",
            "a nxdomain",
            "as22612",
            "dnssec",
            "meta http",
            "accept encoding",
            "request id",
            "united kingdom",
            "div div",
            "arial helvetica",
            "emails",
            "as15169 google",
            "cryp",
            "gmt cache",
            "sameorigin",
            "domain name",
            "code",
            "false",
            "command type",
            "roleselfservice",
            "mcig sep",
            "all search",
            "author avatar",
            "days ago",
            "http",
            "related nids",
            "files location",
            "as30081",
            "gmt contenttype",
            "mozilla",
            "as15133 verizon",
            "whitelisted",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "softcnapp",
            "overview ip",
            "flag united",
            "files related",
            "as62597 nsone",
            "as31898 oracle",
            "mtb aug",
            "class",
            "twitter",
            "april",
            "secure",
            "httponly",
            "expiresthu",
            "pragma",
            "as13414 twitter",
            "smoke loader",
            "reverse dns",
            "asnone united",
            "idlogin sep",
            "uid38009",
            "expiration",
            "hack type",
            "porn type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Aruba"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3850,
            "FileHash-MD5": 6012,
            "FileHash-SHA1": 5906,
            "domain": 3329,
            "email": 33,
            "hostname": 4231,
            "CVE": 2,
            "FileHash-SHA256": 8407,
            "CIDR": 2,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 31779,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "535 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f38d1b2e4ef8d8db533d36",
          "name": "FormBook - moa.moe ??? Pegasus & Brian Sabey Related",
          "description": "",
          "modified": "2024-10-25T03:00:50.871000",
          "created": "2024-09-25T04:10:03.211000",
          "tags": [
            "as54113",
            "united",
            "a domains",
            "passive dns",
            "unknown",
            "mtb sep",
            "github pages",
            "request id",
            "sea x",
            "twitter",
            "accept",
            "status",
            "cookie",
            "search",
            "certificate",
            "record value",
            "showing",
            "as8075",
            "aaaa",
            "asnone united",
            "yara detections",
            "trojan",
            "show",
            "all scoreblue",
            "av detections",
            "ids detections",
            "body",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "urls",
            "443 ma2592000",
            "encrypt",
            "germany unknown",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "ipv4",
            "main",
            "name servers",
            "redacted for",
            "for privacy",
            "servers",
            "meta",
            "homemakers",
            "as212222",
            "script domains",
            "script urls",
            "diy artikelen",
            "zo bieden",
            "class",
            "customer",
            "as16276",
            "canada unknown",
            "sigattr",
            "formbook cnc",
            "checkin",
            "win32",
            "entries",
            "bootasep apr",
            "alerts",
            "read",
            "write",
            "delete",
            "top source",
            "files",
            "location united",
            "creation date",
            "domain",
            "emails",
            "expiration date",
            "next",
            "ovhcloud meta",
            "cname",
            "as36459",
            "whitelisted ip",
            "address",
            "asn as36459",
            "registrar",
            "markmonitor",
            "related tags",
            "france unknown",
            "moved",
            "setcookie",
            "gmt contenttype",
            "refloadapihash",
            "france",
            "nxdomain",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "error",
            "backend",
            "as40065",
            "china unknown",
            "deleted site",
            "atom",
            "record type",
            "ttl value",
            "as174 cogent",
            "pulse submit",
            "url analysis",
            "hostname",
            "as64050 bgpnet",
            "x9875 x9762",
            "gmt max",
            "httponly",
            "hong kong",
            "taiwan unknown",
            "china asn",
            "server",
            "privacy tech",
            "privacy admin",
            "registrar abuse",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr3",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "dns replication",
            "algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "enom"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "China",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4675,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 623,
            "FileHash-MD5": 760,
            "FileHash-SHA1": 794,
            "FileHash-SHA256": 3406,
            "domain": 1633,
            "hostname": 1037,
            "email": 17,
            "CVE": 1
          },
          "indicator_count": 8271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "541 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f1accda30d94af7e846357",
          "name": "Zendesk as VirusTotal \u00bb Ransom:Win32/CVE",
          "description": "*https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088 |||\n\n*In this situation a target received a VirusTotal / Zendesk drive by pop up message that site was unauthorized , fraud risk. The link has it all! Downloaders, install core, browser bar malware, ransomware, python script. Heavy attack. Desires deletion of device , accounts and contents.\n |||\nALF:HeraklezEval:Ransom:Win32/CVE , \nALF:Trojan:Win32/Cassini_6d4ebdc9 ,\nBackdoor:Win32/Zegost ,\nCVE-2023-22518 ,\nCVE-2023-4966 ,\nFakeAV.FOR ,\nMalware:AddsCopyToStartup ,\nNinite ,\nNoobyProtect ,\nTEL:Trojan:Win64/GoCLR ,\nTELPER:HSTR:CLEAN:Ninite ,\nTrojan:Win32/Cobaltstrike ,\nTrojan:Win32/Dridex ,\nTrojan:Win32/Fanop ,\nTrojan:Win32/Neconyd ,\nTrojan:Win32/Startpage ,\nTrojan:Win32/Zombie ,\nVirTool:Win32/Injector.gen!BQ ,\nVirTool:Win32/Obfuscator ,\nWin.Trojan.Generic-9935365-0 ,\nWorm:Win32/Autorun",
          "modified": "2024-10-23T17:03:27.463000",
          "created": "2024-09-23T18:00:45.146000",
          "tags": [
            "as396982 google",
            "setup",
            "passive dns",
            "unknown",
            "ninite sep",
            "a td",
            "443 ma2592000",
            "accept",
            "gmt cache",
            "trojan",
            "status",
            "name servers",
            "urls",
            "creation date",
            "search",
            "emails",
            "servers",
            "as15169 google",
            "aaaa",
            "cname",
            "virtool",
            "cryp",
            "as19527 google",
            "win32",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "trojan features",
            "entries",
            "search otx",
            "telper",
            "worm",
            "copyright",
            "levelblue",
            "files domain",
            "files related",
            "pulses none",
            "accept accept",
            "as16625 akamai",
            "as20940",
            "asnone united",
            "nxdomain",
            "expiration date",
            "as21342",
            "as132147",
            "china",
            "as9808 china",
            "body",
            "all scoreblue",
            "backdoor",
            "alf features",
            "all search",
            "domain",
            "as15133 verizon",
            "as16552 tiggee",
            "url https",
            "http",
            "hostname",
            "ninite",
            "united states",
            "scan endpoints",
            "show",
            "showing",
            "next",
            "united",
            "as54113",
            "github pages",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "class",
            "twitter",
            "certificate",
            "record value",
            "pulse pulses",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "div div",
            "github",
            "meta",
            "homepage",
            "form",
            "as36459",
            "g2 tls",
            "rsa sha256",
            "as29791",
            "dynamicloader",
            "medium",
            "yara detections",
            "dynamic",
            "filehash",
            "sha256",
            "february",
            "copy",
            "otx telemetry",
            "related tags",
            "a li",
            "span p",
            "dj ai",
            "dongjun jeong",
            "a h2",
            "writeups",
            "infosec journey",
            "script urls",
            "netherlands",
            "a nxdomain",
            "aaaa nxdomain",
            "cloudfront",
            "trojandropper",
            "china unknown",
            "msie",
            "chrome",
            "ipv4",
            "noobyprotect",
            "files",
            "peeringdb",
            "sign",
            "github copilot",
            "view",
            "notifications",
            "branches tags",
            "code issues",
            "pull",
            "write",
            "star",
            "code",
            "stars",
            "python",
            "shell",
            "footer",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "as62597 nsone",
            "dnssec",
            "win32mydoom sep",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "query",
            "jpn write",
            "e0e8e",
            "observed dns",
            "expiro",
            "defender",
            "malware",
            "possible",
            "suspicious",
            "activity dns",
            "mtb may",
            "sameorigin",
            "domain name",
            "error",
            "moved",
            "server",
            "mtb sep",
            "win32cve sep",
            "cloud provider",
            "reverse dns",
            "america asn",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "pulses",
            "default",
            "yara rule",
            "high",
            "cnc checkin",
            "cape",
            "powershell",
            "vmprotect",
            "local",
            "agent",
            "domainabuse",
            "su liao",
            "zhi pin",
            "application",
            "expiro malware",
            "anomalous file",
            "june",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "samples",
            "exploit",
            "germany unknown",
            "as14636",
            "russia unknown",
            "as9123 timeweb",
            "as45102 alibaba",
            "as43830",
            "read c",
            "write c",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "installcore",
            "format",
            "delphi",
            "stack",
            "downloader",
            "urls http",
            "delete c",
            "tls handshake",
            "number",
            "failure",
            "delete",
            "ids detections",
            "fadok",
            "template",
            "slcc2",
            "media center",
            "contacted",
            "ollydbg",
            "internal",
            "simda",
            "brian sabey",
            "going dark",
            "stop",
            "as14061",
            "hostnames",
            "as48287 jsc",
            "as50340",
            "czechia unknown",
            "date"
          ],
          "references": [
            "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
            "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
            "00-skillsetparadesarrollo.zendesk.com",
            "https://github.com/peeringdb/peeringdb-py",
            "From the lovely Cyber Folks .PL Cover"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Poland",
            "Australia",
            "Austria",
            "Canada",
            "Netherlands",
            "China"
          ],
          "malware_families": [
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2023-4966",
              "display_name": "CVE-2023-4966",
              "target": null
            },
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "TELPER:HSTR:CLEAN:Ninite",
              "display_name": "TELPER:HSTR:CLEAN:Ninite",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "Trojan:Win32/Dridex",
              "display_name": "Trojan:Win32/Dridex",
              "target": "/malware/Trojan:Win32/Dridex"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Malware:AddsCopyToStartup",
              "display_name": "Malware:AddsCopyToStartup",
              "target": null
            },
            {
              "id": "Trojan:Win32/Cobaltstrike",
              "display_name": "Trojan:Win32/Cobaltstrike",
              "target": "/malware/Trojan:Win32/Cobaltstrike"
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
              "display_name": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage",
              "display_name": "Trojan:Win32/Startpage",
              "target": "/malware/Trojan:Win32/Startpage"
            },
            {
              "id": "Backdoor:Win32/Zegost",
              "display_name": "Backdoor:Win32/Zegost",
              "target": "/malware/Backdoor:Win32/Zegost"
            },
            {
              "id": "Trojan:Win32/Fanop",
              "display_name": "Trojan:Win32/Fanop",
              "target": "/malware/Trojan:Win32/Fanop"
            },
            {
              "id": "Trojan:Win32/Neconyd",
              "display_name": "Trojan:Win32/Neconyd",
              "target": "/malware/Trojan:Win32/Neconyd"
            },
            {
              "id": "Trojan:Win32/Zombie",
              "display_name": "Trojan:Win32/Zombie",
              "target": "/malware/Trojan:Win32/Zombie"
            },
            {
              "id": "Win.Trojan.Generic-9935365-0",
              "display_name": "Win.Trojan.Generic-9935365-0",
              "target": null
            },
            {
              "id": "Ninite",
              "display_name": "Ninite",
              "target": null
            },
            {
              "id": "NoobyProtect",
              "display_name": "NoobyProtect",
              "target": null
            },
            {
              "id": "TEL:Trojan:Win64/GoCLR",
              "display_name": "TEL:Trojan:Win64/GoCLR",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4891,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2436,
            "CVE": 3,
            "FileHash-MD5": 2510,
            "FileHash-SHA1": 2063,
            "FileHash-SHA256": 4054,
            "hostname": 1788,
            "URL": 1228,
            "email": 16
          },
          "indicator_count": 14098,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 239,
          "modified_text": "543 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66c235b05007103d3e3e7038",
          "name": "HCA -  Win32:RansomX-gen affecting HCA (HealthOneCares) + Miscellaneous Attacks",
          "description": "HCA (Health One Cares) affected by a RansomX and various serious attacks. It's linked back to a neurosurgeon who is likely not responsible for attack of course. It has been the same,e group of attackers using Samuel Tulach engineered malware. I'm unsure if there is collusion between Brian Sabey (consistent attacker) and Samuel Tulach. I just know it relates back to the same threat actors that have been hacking healthcare facilities, government offices, telecommunications, technology at health centers abusing webcams and patients records modification, and distribution. PHI PII issues.",
          "modified": "2024-09-17T17:01:24.349000",
          "created": "2024-08-18T17:56:00.485000",
          "tags": [
            "blacklist http",
            "safe site",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "cisco umbrella",
            "site",
            "alexa top",
            "united",
            "million",
            "mail spammer",
            "malicious site",
            "phishing site",
            "team phishing",
            "tofsee",
            "malware",
            "bank",
            "unsafe",
            "azorult",
            "cobalt strike",
            "service",
            "runescape",
            "facebook",
            "download",
            "zbot",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cl0p",
            "inmortal",
            "domains",
            "referrer",
            "historical ssl",
            "apple stuff",
            "combined",
            "hr rtd",
            "network",
            "collection",
            "vt graph",
            "round",
            "metro",
            "execution",
            "emotet",
            "startpage",
            "maltiverse top",
            "paypal",
            "blacklist",
            "passive dns",
            "related nids",
            "urls",
            "flag united",
            "accept",
            "acceptencoding",
            "hit age",
            "ip asn",
            "malware site",
            "adware",
            "fakealert",
            "opencandy",
            "exploit",
            "raccoon",
            "metastealer",
            "redline stealer",
            "anonymizer",
            "heur",
            "outlook",
            "phishing airbnb",
            "engineering",
            "phishing",
            "filerepmalware",
            "maltiverse",
            "div div",
            "c span",
            "div section",
            "span div",
            "search",
            "showing",
            "unknown",
            "as397240",
            "moved",
            "date",
            "body",
            "as54113",
            "github pages",
            "a domains",
            "entries",
            "mtb jul",
            "class",
            "sea x",
            "scan endpoints",
            "all scoreblue",
            "alf features",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "date hash",
            "next",
            "worm",
            "dynamicloader",
            "yara rule",
            "high",
            "windows",
            "grum",
            "medium",
            "installs",
            "windows startup",
            "application",
            "stream",
            "as22612",
            "ipv4",
            "pulse pulses",
            "files",
            "switch dns",
            "query",
            "data",
            "noname057",
            "password",
            "cybercrime",
            "malicious url",
            "kuaizip",
            "team",
            "downloader",
            "generic",
            "crack",
            "presenoker",
            "dapato",
            "riskware",
            "genkryptik",
            "fuery",
            "agent",
            "wacatac",
            "union",
            "shellexecuteexw",
            "hash",
            "writeconsolew",
            "registry",
            "t1031",
            "trojan",
            "copy",
            "dock",
            "write",
            "win32",
            "file execution",
            "explorer",
            "alerts",
            "checks",
            "bios",
            "system restore",
            "anne",
            "training",
            "strings http",
            "basic telephone",
            "xsl stylesheets",
            "apache fop",
            "createdate",
            "modifydate",
            "producer apache",
            "format",
            "core",
            "nxscspu",
            "zsextbzusbrvsk",
            "pxnzj",
            "jwxkrhdlrivprs",
            "default",
            "qxrfnjuodik",
            "mncau",
            "csqvrkwsqka",
            "testpath path",
            "else",
            "null",
            "suspicious",
            "win64",
            "hotkey",
            "ransom",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "push"
          ],
          "references": [
            "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
            "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
            "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
            "https://work.a-poster.info",
            "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
            "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
            "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
            "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
            "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
            "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
            "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
            "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
            "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
            "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
            "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
            "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
            "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.YL",
              "display_name": "Trojan:Win32/Emotet.YL",
              "target": "/malware/Trojan:Win32/Emotet.YL"
            },
            {
              "id": "Win32:RansomX-gen\\ [Ransom]",
              "display_name": "Win32:RansomX-gen\\ [Ransom]",
              "target": null
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "display_name": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [
            "Civilian Society",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Media"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 891,
            "FileHash-MD5": 2368,
            "FileHash-SHA1": 1873,
            "FileHash-SHA256": 5092,
            "domain": 648,
            "hostname": 557,
            "CVE": 8,
            "email": 2
          },
          "indicator_count": 11439,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "579 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66a4d15c60edc83ca6bfc97e",
          "name": "Fraud Services, Updates, Network Worm, SpyWare - Misc Attack",
          "description": "",
          "modified": "2024-08-26T10:04:37.360000",
          "created": "2024-07-27T10:52:12.501000",
          "tags": [
            "united",
            "unknown",
            "a domains",
            "search",
            "creation date",
            "record value",
            "cyberlynk",
            "date",
            "expiration date",
            "title",
            "encrypt",
            "body",
            "as54113",
            "aaaa",
            "cname",
            "next",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr3",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "files",
            "type name",
            "android",
            "server",
            "registrar abuse",
            "dnssec",
            "domain name",
            "contact phone",
            "registrar url",
            "registrar whois",
            "registrar",
            "llc registry",
            "code",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "dns replication",
            "historical ssl",
            "no data",
            "tag count",
            "fakedout threat",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "heur",
            "cisco umbrella",
            "site",
            "malware",
            "safe site",
            "million",
            "alexa top",
            "malicious site",
            "phishing site",
            "suspected",
            "unsafe",
            "wacatac",
            "artemis",
            "iframe",
            "presenoker",
            "phishing",
            "opencandy",
            "downldr",
            "cleaner",
            "conduit",
            "riskware",
            "nircmd",
            "swrort",
            "tiggre",
            "agent",
            "filetour",
            "fusioncore",
            "unruy",
            "crack",
            "exploit",
            "cobalt strike",
            "xrat",
            "alexa",
            "acint",
            "systweak",
            "behav",
            "genkryptik",
            "blacknet rat",
            "stealer",
            "installpack",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "zbot",
            "xtrat",
            "installcore",
            "patcher",
            "adload",
            "win64",
            "class",
            "twitter",
            "accept",
            "malware site",
            "maltiverse",
            "ransomware",
            "phishingms",
            "anonymisation",
            "suppobox",
            "emotet",
            "revengerat",
            "downloader",
            "emailworm",
            "ramnit",
            "warbot",
            "citadel",
            "zeus",
            "simda",
            "keitaro",
            "virut",
            "team",
            "cultureneutral",
            "get na",
            "show",
            "delete c",
            "delete",
            "yara detections",
            "copy",
            "nivdort",
            "write",
            "trojanspy",
            "bayrob",
            "intel",
            "ms windows",
            "default",
            "pe32 executable",
            "document file",
            "v2 document",
            "pe32",
            "worm",
            "entries",
            "td td",
            "rufus",
            "mtb apr",
            "servers",
            "as39122",
            "span",
            "github pages",
            "passive dns",
            "formbook cnc",
            "checkin",
            "dridex",
            "request",
            "less see",
            "http request",
            "status",
            "name servers",
            "certificate",
            "urls",
            "div div",
            "header click",
            "meta",
            "homepage",
            "form",
            "date hash",
            "avast avg",
            "backdoor",
            "mtb jul",
            "as36459",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "sha256",
            "sha1",
            "ascii text",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "null",
            "hybrid",
            "refresh",
            "general",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "suspicious",
            "windows nt",
            "apache",
            "path",
            "pragma",
            "footer",
            "as8068",
            "as8075",
            "as15169 google",
            "as16552 tiggee",
            "virtool",
            "related pulses",
            "file samples",
            "files matching",
            "showing",
            "domain",
            "as22612",
            "as397240",
            "as19527 google",
            "moved",
            "gmt server",
            "as20940",
            "as4230 claro",
            "trojan",
            "ninite",
            "as2914 ntt",
            "win32",
            "brazil unknown",
            "brazil",
            "invalid url",
            "trojandropper",
            "body html",
            "head title",
            "asnone united",
            "as23393"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Brazil",
            "India"
          ],
          "malware_families": [
            {
              "id": "Dridex",
              "display_name": "Dridex",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1034,
            "domain": 1210,
            "email": 13,
            "hostname": 1031,
            "FileHash-SHA1": 685,
            "FileHash-SHA256": 1036,
            "FileHash-MD5": 927,
            "CVE": 10
          },
          "indicator_count": 5946,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "601 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65fc4d4c24f2000879921be5",
          "name": "The Org : FormBook CnC | Pykspa",
          "description": "Front Facing Description:  'TheOrg' (https://theorg.com) The Org\nThe Org is an online professional community platform. It helps organizations get more exposure externally and operate more efficiently internally. | efficiently internally | Nefarious scheme?  Unclear. Possible visa, immigration scheme. | Pykspa is a piece of malware that can be used to remotely control infected systems. It also enables attackers to. download other malware or extract personal data. || Dark. | Score 100% Falcon Sandbox | Evasive. Moved permanently 03/21/2024 | FormBook is an infostealer  of browser cached credentials , screenshots,  keystrokes. | Tags auto populated",
          "modified": "2024-04-20T14:04:02.366000",
          "created": "2024-03-21T15:07:56.415000",
          "tags": [
            "q https",
            "https",
            "enablement",
            "org log",
            "sign",
            "contact",
            "right person",
            "explore",
            "start",
            "grafana labs",
            "ogilvy",
            "figma",
            "find",
            "apollo",
            "http",
            "span",
            "learn",
            "html",
            "expiry",
            "form",
            "label",
            "youtube video",
            "linkedin",
            "input",
            "pixel",
            "legend",
            "cookie",
            "march",
            "de indicators",
            "domains",
            "hashes",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "reverse dns",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "united",
            "resource",
            "asn16509",
            "amazon02",
            "name value",
            "main",
            "ssl certificate",
            "whois record",
            "whois whois",
            "resolutions",
            "threat roundup",
            "communicating",
            "referrer",
            "subdomains",
            "historical ssl",
            "collections",
            "june",
            "february",
            "blister",
            "cobalt strike",
            "phishing",
            "formbook",
            "contacted",
            "ip check",
            "adult content",
            "divergent",
            "hacktool",
            "copy",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers age",
            "cachecontrol",
            "connection",
            "tsara brashears",
            "malicious",
            "life",
            "core",
            "dns replication",
            "date",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "wininit",
            "office open",
            "xml document",
            "qiwi hack",
            "android",
            "mgeinteg",
            "html info",
            "title",
            "org meta",
            "tags viewport",
            "org twitter",
            "org og",
            "the org",
            "utc google",
            "tag manager",
            "g5nxq655fgp",
            "domain",
            "search",
            "status",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "passive dns",
            "urls",
            "bhagam bhag",
            "home screen",
            "entries",
            "createdate",
            "title bhagam",
            "select xmp",
            "filehash",
            "malware",
            "format",
            "unknown",
            "meta",
            "as44273 host",
            "creation date",
            "moved",
            "encrypt",
            "district",
            "body",
            "window",
            "hall law",
            "a domains",
            "script urls",
            "datalayer",
            "registrar",
            "next",
            "accept encoding",
            "showing",
            "yara rule",
            "http host",
            "worm",
            "high",
            "possible",
            "win32",
            "bits",
            "cname",
            "as396982 google",
            "redacted for",
            "expiration date",
            "div div",
            "as26710 icann",
            "script domains",
            "citadel",
            "indonesia",
            "get updates",
            "write c",
            "create c",
            "read c",
            "show",
            "default",
            "common upatre",
            "upatre",
            "downloader",
            "zeus",
            "write",
            "execution",
            "regsetvalueexa",
            "regdword",
            "module load",
            "dock",
            "persistence",
            "as54113",
            "github pages",
            "formbook cnc",
            "checkin",
            "lowfi",
            "class",
            "trojan",
            "accept",
            "visa scheme",
            "mtb feb",
            "mtb jan",
            "romeo scheme",
            "exploitation",
            "pattern match",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "ck id",
            "show technique",
            "ck matrix",
            "suricata udpv4",
            "facebook",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "footer",
            "michelle",
            "nora",
            "hallrender",
            "name servers",
            "record value",
            "emails",
            "servers",
            "found",
            "gmt content",
            "error",
            "code",
            "men",
            "man",
            "woman",
            "hit",
            "sreredrum",
            "honey client",
            "hiv",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "malicious site",
            "phishing site",
            "blockchain",
            "unsafe",
            "malware site",
            "malicious url",
            "phishtank",
            "cyber threat",
            "artemis",
            "asyncrat",
            "team",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "million",
            "xrat",
            "downldr",
            "union",
            "bank",
            "gvt google video transcoding",
            "malvertizing",
            "targeting",
            "target",
            "yandex dropper extend",
            "remote procedure call",
            "identity_helper.exe",
            "cookie bot"
          ],
          "references": [
            "https://theorg.com",
            "Ransom: CVE-2023-4966",
            "Ransom: ransomed.vc",
            "FormBook: a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel | 103.246.145.111",
            "Malware: 0a6e883228a04a6e8738511a6210914dea1773d88cf57950c83e092f02c7f3bf - Other:Malware-gen\\ [Trj]",
            "Yara Detections invalid_trailer_structure ,  multiple_versions",
            "Malware Hosting IP addresses:  141.193.213.20 | 185.199.108.153| 185.199.110.153 | 185.199.111.153",
            "https://otx.alienvault.com/indicator/url/https://theorg.com/_next/data/Gh7c6NpBHZESb74aisPB8/org/springboard-collaborative.json?companySlug=springboard-collaborative",
            "Scanning host: 31.214.178.54 , 37.152.88.54",
            "Yara Detections: vad_contains_network_strings information | HackToolWin32Patch CodeOverlap | PWSWin32Phorex CodeOverlap",
            "Yara: TrojanDropperWin32Ropest | CodeOverlap TrojanWin32Gatsorm | CodeOverlap TrojanWinNTConficker | CodeOverlap Alerts: WormWin32Pykspa",
            "Aspnet collect: https://otx.alienvault.com/otxapi/indicators/file/screenshot/000444cc67b97f45f11e1fdf89ad8f5127c87aa858fe151fa9c4975276f53b42",
            "development.digitalphotogallery.com _YandexDropperExtend",
            "Emotet: FileHash-MD5 bafae95c36402dfc1ea5fa04523e4e81",
            "Emotet: FileHash-SHA256 db9d59b0f192c91f8ecf939c415b3252b13b0fb052d4a66ceefb80dfb43d6e8a |",
            "Emotet: FileHash-SHA1\t19c14ab0aaab2c1dd922f0baca3cf64056f80acc",
            "thevisafirm.com | Immigration Lawyers Capital Immigration Lawyers Green Card Lawyer [ London, DC] malicious",
            "www.hallinjurylaw.com |\tMinneapolis Personal Injury Lawyer Personal Injury Law Experts",
            "Malvertizing, Phishing, Botnet PWD: https://pin.it/ | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "Phishing, Botnet PWD:https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://www.sweetheartvideo.com/tsara-brashears/ | www.sweetheartvideo.com",
            "https://hybrid-analysis.com/sample/ac09d7f6b26675a529a366b47bc09b3fd776576fb099c020f57204ff7b4ea31c",
            "CVE-2007-3896 | CVE-2023-22518 | CVE-2023-4966",
            "jpocxaar1---r3---sn-jpocxaa-a03e.gvt1.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Win32:Renos-KY\\ [Trj]",
              "display_name": "Win32:Renos-KY\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Worm.Pykspa-1",
              "display_name": "Win.Worm.Pykspa-1",
              "target": null
            },
            {
              "id": "Worm:Win32/Pykspa.C",
              "display_name": "Worm:Win32/Pykspa.C",
              "target": "/malware/Worm:Win32/Pykspa.C"
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "ApolloLocker",
              "display_name": "ApolloLocker",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32",
              "display_name": "TrojanDropper:Win32",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Media",
            "Immigration",
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4567,
            "domain": 2576,
            "hostname": 1212,
            "FileHash-SHA256": 3836,
            "FileHash-MD5": 744,
            "FileHash-SHA1": 724,
            "CVE": 5,
            "email": 9,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 13674,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "729 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Domains Contacted: fenbushijujuefuwu.com",
        "angryblackwomyn.com",
        "Yara Detections: vad_contains_network_strings information | HackToolWin32Patch CodeOverlap | PWSWin32Phorex CodeOverlap",
        "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
        "Aspnet collect: https://otx.alienvault.com/otxapi/indicators/file/screenshot/000444cc67b97f45f11e1fdf89ad8f5127c87aa858fe151fa9c4975276f53b42",
        "https://theorg.com",
        "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
        "Yara Detections invalid_trailer_structure ,  multiple_versions",
        "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
        "Ransom: ransomed.vc",
        "x.com - Malware Packed",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
        "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
        "Malware: 0a6e883228a04a6e8738511a6210914dea1773d88cf57950c83e092f02c7f3bf - Other:Malware-gen\\ [Trj]",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "jpocxaar1---r3---sn-jpocxaa-a03e.gvt1.com",
        "From the lovely Cyber Folks .PL Cover",
        "bleepingcomputer.com \u2022 CliffsNotes",
        "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
        "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
        "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
        "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
        "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
        "discord.com \u2022 discord.gg",
        "Ransomware File Modifications Exec Crash",
        "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
        "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg",
        "Emotet: FileHash-SHA256 db9d59b0f192c91f8ecf939c415b3252b13b0fb052d4a66ceefb80dfb43d6e8a |",
        "CVE-2007-3896 | CVE-2023-22518 | CVE-2023-4966",
        "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
        "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
        "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
        "00-skillsetparadesarrollo.zendesk.com",
        "www.hallinjurylaw.com |\tMinneapolis Personal Injury Lawyer Personal Injury Law Experts",
        "Emotet: FileHash-SHA1\t19c14ab0aaab2c1dd922f0baca3cf64056f80acc",
        "Ransom: CVE-2023-4966",
        "Malvertizing, Phishing, Botnet PWD: https://pin.it/ | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
        "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
        "Scanning host: 31.214.178.54 , 37.152.88.54",
        "FormBook: a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
        "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
        "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
        "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
        "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
        "https://github.com/peeringdb/peeringdb-py",
        "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
        "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
        "Yara: TrojanDropperWin32Ropest | CodeOverlap TrojanWin32Gatsorm | CodeOverlap TrojanWinNTConficker | CodeOverlap Alerts: WormWin32Pykspa",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
        "Phishing, Botnet PWD:https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://www.sweetheartvideo.com/tsara-brashears/ | www.sweetheartvideo.com",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
        "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses",
        "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
        "appleid.cdn-apple.com",
        "https://work.a-poster.info",
        "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
        "https://api.w.org/ \u2022 api.w.org",
        "https://hybrid-analysis.com/sample/ac09d7f6b26675a529a366b47bc09b3fd776576fb099c020f57204ff7b4ea31c",
        "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
        "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
        "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
        "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
        "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
        "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
        "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
        "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
        "Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel | 103.246.145.111",
        "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
        "Malware Hosting IP addresses:  141.193.213.20 | 185.199.108.153| 185.199.110.153 | 185.199.111.153",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
        "Emotet: FileHash-MD5 bafae95c36402dfc1ea5fa04523e4e81",
        "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
        "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
        "development.digitalphotogallery.com _YandexDropperExtend",
        "https://twitter.com/juvlarN",
        "thevisafirm.com | Immigration Lawyers Capital Immigration Lawyers Green Card Lawyer [ London, DC] malicious",
        "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
        "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
        "https://otx.alienvault.com/indicator/url/https://theorg.com/_next/data/Gh7c6NpBHZESb74aisPB8/org/springboard-collaborative.json?companySlug=springboard-collaborative",
        "developer.x.com \u2022 https://twitter.com/githubstatus",
        "The next pulse will show Apple IoC\u2019s related to Tulach.cc",
        "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
        "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
        "api.item.yixun.com",
        "Contains Pe Overlay Queries Locale Api Language Check Registry",
        "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
        "nr-data.net \u2022 www.youtube.com",
        "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
        "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
        "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
        "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
        "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
        "Request Queries Keyboard Layout Antivm Generic Disk Resumethread"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/neconyd",
            "Virtool:win32/obfuscator",
            "Html.trojan.ascii212_44_64_202-1",
            "Mirai",
            "Dridex",
            "Emotet",
            "Win.trojan.generic-9935365-0",
            "Alfper:hstr:wizremurl.a1",
            "Backdoor:win32/tofsee.t",
            "Win.packed.botx-10021462-0",
            "Tel:trojan:win64/goclr",
            "Alf:trojan:win32/cassini_6d4ebdc9",
            "Win.trojan.tofsee-7102058-0",
            "Win32:renos-ky\\ [trj]",
            "Win.dropper.quasarrat-10023124-0",
            "Win.packer.pkr_ce1a-9980177-0",
            "Trojandropper:win32",
            "Worm:win32/lightmoon.h",
            "Artro",
            "Worm:win32/autorun",
            "Trojan:win32/mydoom",
            "Win.malware.midie-6847893-0",
            "Backdoor:win32/tofsee.",
            "Other:malware-gen\\ [trj]",
            "Cve-2023-4966",
            "Alf:trojan:win32/cassini_412f60c8!ibt",
            "Trojan:win32/cobaltstrike",
            "Libraryloader",
            "Trojan:win32/emotet.yl",
            "Trojanspy:win32/nivdort",
            "Slf:win32/elenquay.a",
            "Apollolocker",
            "Worm:win32/pykspa.c",
            "Trojandownloader:win32/nemucod",
            "Virtool:win32/injector.gen!bq",
            "Inmortal",
            "Alf:trojandownloader:powershell/ploprolo.db",
            "Cl0p",
            "Formbook",
            "Win.packed.stealerc-10017074-0",
            "Win.malware.generickdz-9937235-0",
            "Win.trojan.agent-1371484",
            "Trojan:win32/startpage",
            "Alf:trojan:win32/cassini_f28c33a2",
            "Alf:heraklezeval:worm:win32/mimail!rfn",
            "Win.malware.swisyn-7610494-0",
            "Backdoor:win32/zegost",
            "Alf:heraklezeval:trojan:win32/azorult.fw!rfn",
            "Virtool:win32/obfuscator.jm",
            "Ninite",
            "Win.malware.aauto-9839281-0",
            "Unix.trojan.mirai-9441505-0",
            "Telper:hstr:clean:ninite",
            "Worm:win32/mofksys.rnd!mtb",
            "Noobyprotect",
            "Win.malware.cymt-10023133-0",
            "Alf:hstr:virtool:win32/obfuscator!pecancer",
            "Trojan:win32/dridex",
            "Win.malware.razy-6979265-0",
            "Malware:addscopytostartup",
            "Pws:win32/ymacco.aa50",
            "Win32:ransomx-gen\\ [ransom]",
            "Trojan:win32/vflooder",
            "Win.malware.jaik-9968280-0",
            "Tulach malware",
            "Domains",
            "#lowfijavazkm",
            "Win.trojan.barys-10005825-0",
            "#lowfi:win32/autoit",
            "Alf:heraklezeval:ransom:win32/cve",
            "Slfper:softwarebundler:win32/icloader.a",
            "Win.packed.generic-9967832-0",
            "Ransom",
            "Win.trojan.vbgeneric-6735875-0",
            "Trojan:win32/fanop",
            "Trojan:win32/zombie",
            "Trojanspy:win32/nivdort.de",
            "Win.malware.moonlight-9919383-0",
            "Fakeav.for",
            "Win.trojan.zegost-9769410-0",
            "Win.worm.pykspa-1",
            "Trojandropper:win32/muldrop.v!mtb",
            "Win.trojan.cycbot-1584",
            "Cve-2023-22518"
          ],
          "industries": [
            "Media",
            "Immigration",
            "Telecommunications",
            "Government",
            "Healthcare",
            "Technology",
            "Civilian society"
          ],
          "unique_indicators": 109189
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/github.com",
    "whois": "http://whois.domaintools.com/github.com",
    "domain": "github.com",
    "hostname": "help.github.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "69d8a665177b8f64c7ce5fca",
      "name": "LibraryLoader \u2022 Samuel Tulach | Abuse of malicious sssets engineered by DevOp & Security Researcher",
      "description": "Samuel Tulach is involved in various projects related to government work, particularly in areas like DevSecOps and app modernization. \nOverview of Samuel Tulach's \"uploader.exe\"\nThe file \"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines. This classification indicates that the file poses a potential threat to users' systems.\nSecurity Engine Flags. Several security engines have flagged \"uploader.exe\" as malicious.\nSecureAge APEX\tMalicious\nSentinelOne\tMalicious\nImplications of Malicious Flags\nPotential Risks: Files flagged as malicious can lead to various security issues, including data theft, unauthorized access, or system damage.\nRecommended Actions: Users should avoid downloading or executing this file. If already downloaded, it is advisable to delete it and run a full system scan using reputable antivirus software.",
      "modified": "2026-04-10T07:27:33.587000",
      "created": "2026-04-10T07:27:33.587000",
      "tags": [
        "x vercel",
        "united",
        "america",
        "germany malware",
        "family",
        "ck ids",
        "packing",
        "tulach",
        "ocsp",
        "extraction",
        "data upload",
        "enter sc",
        "extra data",
        "include review",
        "exclude sugges",
        "find s",
        "failed",
        "typ no",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "pattern match",
        "mitre att",
        "ascii text",
        "span",
        "title",
        "meta",
        "path",
        "april",
        "hybrid",
        "general",
        "local",
        "encrypt",
        "click",
        "strings",
        "main",
        "footer",
        "pcsb",
        "naga",
        "magda",
        "no expiration",
        "url https",
        "domain",
        "github pages",
        "a domains",
        "passive dns",
        "mtb jan",
        "class",
        "sea x",
        "accept encoding",
        "trojanspy",
        "accept",
        "otx logo",
        "all ipv4",
        "urls",
        "files",
        "america flag",
        "space",
        "ck matrix",
        "handle",
        "winvmaddress",
        "cdecl crashpad",
        "null",
        "software",
        "comment",
        "entity",
        "internal",
        "blank",
        "magic",
        "infinity",
        "first",
        "valentine",
        "error",
        "webview",
        "front",
        "patched",
        "root",
        "tristate",
        "libraryloader",
        "packing t1045",
        "icmp traffic",
        "memcommit",
        "pe section",
        "low software",
        "pe resource",
        "filehash",
        "win32",
        "malware",
        "write",
        "backdoor",
        "present apr",
        "lowfi",
        "aaaa",
        "lowfijavazkm",
        "x.com",
        "dynamicloader",
        "crlf line",
        "unicode text",
        "utf8",
        "ee fc",
        "ff d5",
        "yara rule",
        "f0 ff",
        "eb e1",
        "unknown",
        "trojan",
        "zeppelin",
        "autorun",
        "united states",
        "china unknown",
        "div div",
        "ip address",
        "record value",
        "samuel tulach",
        "czechia unknown",
        "italy unknown",
        "gmt server",
        "all domain",
        "next associated",
        "reverse dns",
        "location czech",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "file type",
        "telfhash",
        "virustotal api",
        "vendor finding",
        "notes clamav",
        "files matching",
        "number",
        "t1045",
        "search",
        "directui",
        "element",
        "medium",
        "classinfobase",
        "value",
        "write c",
        "hwndhost",
        "sapeav12",
        "worm",
        "explorer",
        "insert",
        "movie",
        "mtb apr",
        "mtb mar",
        "trojandropper",
        "displayname",
        "windows",
        "high",
        "delete c",
        "tofsee",
        "stream",
        "push",
        "url http",
        "c mar",
        "virtool",
        "c jan",
        "c dec",
        "toolbar",
        "ransom",
        "article",
        "windows nt",
        "gmtvia",
        "html",
        "bad traffic",
        "et info",
        "tls handshake",
        "belgium",
        "present dec",
        "present feb",
        "intel",
        "elf upx",
        "medium risk",
        "info",
        "moved",
        "hostname add",
        "whois registrar",
        "media",
        "delphi",
        "guard",
        "code",
        "devsecops",
        "github",
        "github internet",
        "archive samuel",
        "tulach",
        "government work",
        "key areas",
        "devops process",
        "security engine",
        "flags",
        "apex malicious",
        "implications",
        "malicious flags",
        "potential risks",
        "name servers",
        "apple id",
        "script urls",
        "show process",
        "secure",
        "win64",
        "khtml",
        "gecko",
        "programfiles",
        "cookie",
        "comspec",
        "model",
        "june",
        "spawns",
        "id name",
        "malicious",
        "gui",
        "anti cheats",
        "game tech",
        "c++"
      ],
      "references": [
        "https://nextcloud.tulach.cc/ \u2022 https://nextcloud.tulach.cc/",
        "bleepingcomputer.com \u2022 CliffsNotes",
        "x.com - Malware Packed",
        "nr-data.net \u2022 www.youtube.com",
        "Alerts network_icmp allocates_rwx packer_entropy pe_features pe_unknown_resource_name Related Pulses",
        "https://www.youtube.com/youtubei/v1/log_event?alt=json&key=AIzaSyAO_FJ2SlqU8Q4STEHLGCilw_Y9_11qcW8",
        "discord.com \u2022 discord.gg",
        "api.item.yixun.com",
        "Unix.Trojan.Mirai-9441505-0 Yara Detections is__elf \u2022 217.11.249.145",
        "Domains Contacted: fenbushijujuefuwu.com",
        "angryblackwomyn.com",
        "https://medium.com/the-pink/how-a-white-womans-anger-makes-her-racism-spill-out-563853905a42",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/41ad1d349716b3e62f914c0907323ae8e0a37198d237a02d71a0d5e05ffaa727",
        "https://www.forpsi.com  domain forpsi.com\t  Domain asp.net",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "www.youtube.com/watch?v=GyuMozsVyYs (why would targets channel be controlled by Tulach)",
        "https://x.com/Atlassian__;JS8!!J7H9jp7aFkU!OInVM0IrDSAR1lXf8KzR9vKsmEOVrBkg1M6QqughgO13mcAOawaxDaclQnhkyp3JvPbgCZX33l1xnRdvb4OxVqJcCz2cn9HcSw",
        "x.com \u2022 https://x.com/BastionMediaFR/status/2042194819397673290",
        "cdn777.pussyporn.pro \u2022  https://tubepornstars.co/ \u2022 porneramix.xyz",
        "porneramix.xyz \u2022 porntubner.online \u2022 pornhubhd.shop",
        "https://api.w.org/ \u2022 api.w.org",
        "remote.poc-2.com \u2022 https://otx.alienvault.com/indicator/url/https://tulach.cc/assets/img/ogp.png",
        "https://assets.msn.com/bundles/v1/edgeChromium/latest/svg-assets-Twitter.b90ee19de735e00fb4a0.js",
        "developer.x.com \u2022 https://twitter.com/githubstatus",
        "https://twitter.com/juvlarN",
        "appleid.cdn-apple.com",
        "https://static.digitecgalaxus.ch/Files/communication/app-download-badges/apple_email_rasterized_2x/fr.png",
        "Samuel Tulach , an engineer  writes about game security, Unity engine, and anti-cheat systems on his blog at tulach.cc",
        "Mr. Tulach \u2022 known for his work in cybersecurity, particularly in reverse engineering & malware analysis",
        "\"uploader.exe\" created by Samuel Tulach has been identified as malicious by several security engines",
        "Due to Samuel Tulach\u2019s good reputation , assume his assets are being abused by threat actors targeting",
        "I haven\u2019t yet concluded why Tulach.cc is deeply interwoven in a malicious media campaign",
        "Samuel Tulach\u2019s assets have been tightly connected to M. Brian Sabey, Esq",
        "The next pulse will show Apple IoC\u2019s related to Tulach.cc"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "LibraryLoader",
          "display_name": "LibraryLoader",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Azorult.FW!rfn",
          "target": null
        },
        {
          "id": "Win.Packed.Botx-10021462-0",
          "display_name": "Win.Packed.Botx-10021462-0",
          "target": null
        },
        {
          "id": "Win.Malware.Cymt-10023133-0",
          "display_name": "Win.Malware.Cymt-10023133-0",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Nemucod",
          "display_name": "TrojanDownloader:Win32/Nemucod",
          "target": "/malware/TrojanDownloader:Win32/Nemucod"
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Generickdz-9937235-0",
          "display_name": "Win.Malware.Generickdz-9937235-0",
          "target": null
        },
        {
          "id": "Win.Malware.Razy-6979265-0",
          "display_name": "Win.Malware.Razy-6979265-0",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Trojan:Win32/Mydoom",
          "display_name": "Trojan:Win32/Mydoom",
          "target": "/malware/Trojan:Win32/Mydoom"
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.DE",
          "display_name": "TrojanSpy:Win32/Nivdort.DE",
          "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
        },
        {
          "id": "SLF:Win32/Elenquay.A",
          "display_name": "SLF:Win32/Elenquay.A",
          "target": "/malware/SLF:Win32/Elenquay.A"
        },
        {
          "id": "Win.Dropper.QuasarRAT-10023124-0",
          "display_name": "Win.Dropper.QuasarRAT-10023124-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Zegost-9769410-0",
          "display_name": "Win.Trojan.Zegost-9769410-0",
          "target": null
        },
        {
          "id": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
          "display_name": "ALF:HSTR:VirTool:Win32/Obfuscator!PECancer",
          "target": null
        },
        {
          "id": "Win.Malware.Moonlight-9919383-0",
          "display_name": "Win.Malware.Moonlight-9919383-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "Backdoor:Win32/Tofsee.",
          "display_name": "Backdoor:Win32/Tofsee.",
          "target": "/malware/Backdoor:Win32/Tofsee."
        },
        {
          "id": "#LowfiJavaZKM",
          "display_name": "#LowfiJavaZKM",
          "target": null
        },
        {
          "id": "Win.Malware.Swisyn-7610494-0",
          "display_name": "Win.Malware.Swisyn-7610494-0",
          "target": null
        },
        {
          "id": "PWS:Win32/Ymacco.AA50",
          "display_name": "PWS:Win32/Ymacco.AA50",
          "target": "/malware/PWS:Win32/Ymacco.AA50"
        },
        {
          "id": "Win.Packed.Stealerc-10017074-0",
          "display_name": "Win.Packed.Stealerc-10017074-0",
          "target": null
        },
        {
          "id": "#Lowfi:Win32/AutoIt",
          "display_name": "#Lowfi:Win32/AutoIt",
          "target": "/malware/#Lowfi:Win32/AutoIt"
        },
        {
          "id": "Html.Trojan.Ascii212_44_64_202-1",
          "display_name": "Html.Trojan.Ascii212_44_64_202-1",
          "target": null
        },
        {
          "id": "ALFPER:HSTR:WizremURL.A1",
          "display_name": "ALFPER:HSTR:WizremURL.A1",
          "target": null
        },
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0",
          "display_name": "Win.Trojan.Tofsee-7102058-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0",
          "display_name": "Win.Trojan.Tofsee-7102058-0",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847893-0",
          "display_name": "Win.Malware.Midie-6847893-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Muldrop.V!MTB",
          "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
          "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Win.Malware.Aauto-9839281-0",
          "display_name": "Win.Malware.Aauto-9839281-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-1371484",
          "display_name": "Win.Trojan.Agent-1371484",
          "target": null
        },
        {
          "id": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
          "display_name": "SLFPER:SoftwareBundler:Win32/ICLoader.A",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
          "display_name": "ALF:Trojan:Win32/Cassini_412f60c8!ibt",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-9441505-0",
          "display_name": "Unix.Trojan.Mirai-9441505-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2710,
        "domain": 1227,
        "hostname": 1206,
        "FileHash-SHA256": 3867,
        "IPv4": 318,
        "FileHash-MD5": 593,
        "FileHash-SHA1": 459,
        "IPv6": 1,
        "SSLCertFingerprint": 19,
        "email": 20,
        "CVE": 1
      },
      "indicator_count": 10421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "9 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689cc89e77327602780be49e",
      "name": "Remotewd Devices \u2022 Spectrum / Charter Communications & AT&T",
      "description": "Remotewd Devices expanded \u2022 Spectrum / Charter Communications & AT&T.\nAdvesarial. Polymorphic.",
      "modified": "2025-09-12T16:05:33.542000",
      "created": "2025-08-13T17:17:18.456000",
      "tags": [
        "url https",
        "domain",
        "types of",
        "united kingdom",
        "sweden",
        "virgin islands",
        "china",
        "germany",
        "date",
        "status",
        "ip address",
        "search",
        "domain add",
        "passive dns",
        "urls",
        "files",
        "error sep",
        "present jul",
        "address google",
        "safe browsing",
        "united",
        "unknown ns",
        "moved",
        "body",
        "cloudfront x",
        "hio52 p1",
        "certificate",
        "win32",
        "trojan",
        "entries",
        "next associated",
        "title error",
        "ipv4",
        "host gh",
        "secure path",
        "httponly cache",
        "x github",
        "request id",
        "accept",
        "encrypt",
        "formbook cnc",
        "checkin",
        "a domains",
        "lowfi",
        "mtb jun",
        "github pages",
        "as11427",
        "us note",
        "route",
        "ptr record",
        "hostname add",
        "url analysis",
        "verdict",
        "general info",
        "geo mckinney",
        "texas",
        "spectrum",
        "charter communications",
        "charter collection",
        "auth",
        "files ip",
        "address",
        "asn as16509",
        "record value",
        "germany unknown",
        "meta",
        "gmt cache",
        "sans400",
        "condensed300",
        "feel lost",
        "h1 div",
        "server",
        "gmt connection",
        "keep alive",
        "pragma",
        "ipv4 add",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "unknown aaaa",
        "china unknown",
        "beijing",
        "unknown soa",
        "hostname",
        "present aug",
        "name servers",
        "aaaa",
        "windows nt",
        "dynamicloader",
        "generic http",
        "exe upload",
        "inbound",
        "outbound",
        "host",
        "medium",
        "write",
        "markus",
        "malware",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "showing",
        "error",
        "extraction",
        "se enter",
        "sc type",
        "data upload",
        "failed",
        "extr data",
        "ox sunnort",
        "include review",
        "exclude data",
        "iocs",
        "pdf report",
        "pcap",
        "stix",
        "openloc",
        "pul data",
        "move",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "mitre att",
        "ck techniques",
        "evasion att",
        "pattern match",
        "ascii text",
        "show technique",
        "null",
        "refresh",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "class",
        "adversaries",
        "defense evasion",
        "initial access",
        "msie",
        "chrome",
        "gmt content",
        "main",
        "virtool",
        "idran anv",
        "exti",
        "concor referen",
        "running webserver",
        "review iocs",
        "suggested iocs",
        "show",
        "http traffic",
        "intel",
        "ms windows",
        "pe32",
        "high",
        "write c",
        "explorer",
        "unknown",
        "worm",
        "next",
        "comman_and_control",
        "et",
        "vtapi",
        "dos",
        "persistence",
        "polymorphic",
        "virus",
        "device",
        "script",
        "style",
        "endcolorstr",
        "regexp",
        "link",
        "powershell",
        "form",
        "push",
        "active",
        "remote_access",
        "general full",
        "protocol h2",
        "security tls",
        "austin",
        "asn7018",
        "attinternet4",
        "reverse dns",
        "software",
        "domains",
        "hashes",
        "at&t",
        "injection",
        "rwx",
        "hackers",
        "attack",
        "cape",
        "stealth hidden extension",
        "antivm generic",
        "cape detected",
        "threat stealth",
        "public folder",
        "deletes",
        "files anomalous",
        "disables system",
        "restore dead",
        "mail procmem",
        "yara suricata",
        "queries user name"
      ],
      "references": [
        "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
        "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
        "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
        "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
        "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
        "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
        "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
        "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
        "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
        "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
        "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
        "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
        "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
        "Ransomware File Modifications Exec Crash",
        "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
        "Request Queries Keyboard Layout Antivm Generic Disk Resumethread",
        "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
        "Contains Pe Overlay Queries Locale Api Language Check Registry"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Vflooder",
          "display_name": "Trojan:Win32/Vflooder",
          "target": "/malware/Trojan:Win32/Vflooder"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "VirTool:Win32/Obfuscator.JM",
          "display_name": "VirTool:Win32/Obfuscator.JM",
          "target": "/malware/VirTool:Win32/Obfuscator.JM"
        },
        {
          "id": "Win.Trojan.Cycbot-1584",
          "display_name": "Win.Trojan.Cycbot-1584",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6171,
        "domain": 1823,
        "hostname": 3155,
        "email": 8,
        "FileHash-SHA256": 950,
        "FileHash-MD5": 345,
        "FileHash-SHA1": 317,
        "CVE": 1,
        "CIDR": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 12772,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "219 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66fc29a49b5ac693c8d75122",
      "name": "Medical Campus - Aurora, Co | Recheck",
      "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
      "modified": "2024-10-31T16:03:52.240000",
      "created": "2024-10-01T16:56:04.004000",
      "tags": [
        "united",
        "as397240",
        "search",
        "showing",
        "as54113",
        "as397241",
        "unknown",
        "moved",
        "creation date",
        "record value",
        "next",
        "date",
        "body",
        "a domains",
        "passive dns",
        "formbook cnc",
        "checkin",
        "entries",
        "github pages",
        "sea x",
        "accept",
        "status",
        "name servers",
        "certificate",
        "urls",
        "aaaa",
        "cname",
        "meta",
        "whitelisted ip",
        "address",
        "location united",
        "asn as36459",
        "github",
        "less whois",
        "registrar",
        "markmonitor",
        "related tags",
        "as36459",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "files",
        "ninite",
        "expiration date",
        "domain",
        "hostname",
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "document file",
        "v2 document",
        "utf8",
        "crlf line",
        "beginstring",
        "size",
        "null",
        "hybrid",
        "refresh",
        "span",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "url https",
        "tulach type",
        "role title",
        "added active",
        "pulses url",
        "url http",
        "nextc type",
        "type indicator",
        "related pulses",
        "filehashsha256",
        "copyright",
        "ipv6",
        "germany",
        "italy",
        "trojan",
        "trojanspy",
        "worm",
        "trojanclicker",
        "virtool",
        "service",
        "linux x8664",
        "khtml",
        "gecko",
        "veryhigh",
        "redirect",
        "httpsupgrades",
        "collisionbox",
        "runner",
        "gameoverpanel",
        "trex",
        "orgtechhandle",
        "orgtechref",
        "director",
        "university",
        "nethandle",
        "net168",
        "net1680000",
        "ucha",
        "orgid",
        "east",
        "report spam",
        "as8075",
        "servers",
        "secure server",
        "error all",
        "typeof",
        "error f",
        "crazy doll",
        "created",
        "filehashmd5",
        "types of",
        "russia",
        "emotet type",
        "mirai type",
        "mirai",
        "mtb description",
        "win32 type",
        "as31034 aruba",
        "italy unknown",
        "as19527 google",
        "encrypt",
        "health type",
        "miori hackers",
        "brute force",
        "backdoor",
        "aurora",
        "ip address",
        "path",
        "unis",
        "dotcisoffer",
        "bladabindi",
        "artro",
        "script urls",
        "as46606",
        "brazil unknown",
        "as11284",
        "as10906",
        "apache",
        "lanc type",
        "telper",
        "win32",
        "win64",
        "pulses email",
        "as9009 m247",
        "as7296 alchemy",
        "as14061",
        "as16276",
        "trojandropper",
        "ransom",
        "mtb sep",
        "msie",
        "chrome",
        "ip check",
        "gmt content",
        "pulse submit",
        "url analysis",
        "files ip",
        "aaaa nxdomain",
        "nxdomain",
        "a nxdomain",
        "as22612",
        "dnssec",
        "meta http",
        "accept encoding",
        "request id",
        "united kingdom",
        "div div",
        "arial helvetica",
        "emails",
        "as15169 google",
        "cryp",
        "gmt cache",
        "sameorigin",
        "domain name",
        "code",
        "false",
        "command type",
        "roleselfservice",
        "mcig sep",
        "all search",
        "author avatar",
        "days ago",
        "http",
        "related nids",
        "files location",
        "as30081",
        "gmt contenttype",
        "mozilla",
        "as15133 verizon",
        "whitelisted",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "softcnapp",
        "overview ip",
        "flag united",
        "files related",
        "as62597 nsone",
        "as31898 oracle",
        "mtb aug",
        "class",
        "twitter",
        "april",
        "secure",
        "httponly",
        "expiresthu",
        "pragma",
        "as13414 twitter",
        "smoke loader",
        "reverse dns",
        "asnone united",
        "idlogin sep",
        "uid38009",
        "expiration",
        "hack type",
        "porn type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Aruba"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3850,
        "FileHash-MD5": 6012,
        "FileHash-SHA1": 5906,
        "domain": 3329,
        "email": 33,
        "hostname": 4231,
        "CVE": 2,
        "FileHash-SHA256": 8407,
        "CIDR": 2,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 31779,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "535 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f38d1b2e4ef8d8db533d36",
      "name": "FormBook - moa.moe ??? Pegasus & Brian Sabey Related",
      "description": "",
      "modified": "2024-10-25T03:00:50.871000",
      "created": "2024-09-25T04:10:03.211000",
      "tags": [
        "as54113",
        "united",
        "a domains",
        "passive dns",
        "unknown",
        "mtb sep",
        "github pages",
        "request id",
        "sea x",
        "twitter",
        "accept",
        "status",
        "cookie",
        "search",
        "certificate",
        "record value",
        "showing",
        "as8075",
        "aaaa",
        "asnone united",
        "yara detections",
        "trojan",
        "show",
        "all scoreblue",
        "av detections",
        "ids detections",
        "body",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "urls",
        "443 ma2592000",
        "encrypt",
        "germany unknown",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "ipv4",
        "main",
        "name servers",
        "redacted for",
        "for privacy",
        "servers",
        "meta",
        "homemakers",
        "as212222",
        "script domains",
        "script urls",
        "diy artikelen",
        "zo bieden",
        "class",
        "customer",
        "as16276",
        "canada unknown",
        "sigattr",
        "formbook cnc",
        "checkin",
        "win32",
        "entries",
        "bootasep apr",
        "alerts",
        "read",
        "write",
        "delete",
        "top source",
        "files",
        "location united",
        "creation date",
        "domain",
        "emails",
        "expiration date",
        "next",
        "ovhcloud meta",
        "cname",
        "as36459",
        "whitelisted ip",
        "address",
        "asn as36459",
        "registrar",
        "markmonitor",
        "related tags",
        "france unknown",
        "moved",
        "setcookie",
        "gmt contenttype",
        "refloadapihash",
        "france",
        "nxdomain",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "error",
        "backend",
        "as40065",
        "china unknown",
        "deleted site",
        "atom",
        "record type",
        "ttl value",
        "as174 cogent",
        "pulse submit",
        "url analysis",
        "hostname",
        "as64050 bgpnet",
        "x9875 x9762",
        "gmt max",
        "httponly",
        "hong kong",
        "taiwan unknown",
        "china asn",
        "server",
        "privacy tech",
        "privacy admin",
        "registrar abuse",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr3",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "dns replication",
        "algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "enom"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "China",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4675,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 623,
        "FileHash-MD5": 760,
        "FileHash-SHA1": 794,
        "FileHash-SHA256": 3406,
        "domain": 1633,
        "hostname": 1037,
        "email": 17,
        "CVE": 1
      },
      "indicator_count": 8271,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "541 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f1accda30d94af7e846357",
      "name": "Zendesk as VirusTotal \u00bb Ransom:Win32/CVE",
      "description": "*https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088 |||\n\n*In this situation a target received a VirusTotal / Zendesk drive by pop up message that site was unauthorized , fraud risk. The link has it all! Downloaders, install core, browser bar malware, ransomware, python script. Heavy attack. Desires deletion of device , accounts and contents.\n |||\nALF:HeraklezEval:Ransom:Win32/CVE , \nALF:Trojan:Win32/Cassini_6d4ebdc9 ,\nBackdoor:Win32/Zegost ,\nCVE-2023-22518 ,\nCVE-2023-4966 ,\nFakeAV.FOR ,\nMalware:AddsCopyToStartup ,\nNinite ,\nNoobyProtect ,\nTEL:Trojan:Win64/GoCLR ,\nTELPER:HSTR:CLEAN:Ninite ,\nTrojan:Win32/Cobaltstrike ,\nTrojan:Win32/Dridex ,\nTrojan:Win32/Fanop ,\nTrojan:Win32/Neconyd ,\nTrojan:Win32/Startpage ,\nTrojan:Win32/Zombie ,\nVirTool:Win32/Injector.gen!BQ ,\nVirTool:Win32/Obfuscator ,\nWin.Trojan.Generic-9935365-0 ,\nWorm:Win32/Autorun",
      "modified": "2024-10-23T17:03:27.463000",
      "created": "2024-09-23T18:00:45.146000",
      "tags": [
        "as396982 google",
        "setup",
        "passive dns",
        "unknown",
        "ninite sep",
        "a td",
        "443 ma2592000",
        "accept",
        "gmt cache",
        "trojan",
        "status",
        "name servers",
        "urls",
        "creation date",
        "search",
        "emails",
        "servers",
        "as15169 google",
        "aaaa",
        "cname",
        "virtool",
        "cryp",
        "as19527 google",
        "win32",
        "related pulses",
        "file samples",
        "files matching",
        "date hash",
        "trojan features",
        "entries",
        "search otx",
        "telper",
        "worm",
        "copyright",
        "levelblue",
        "files domain",
        "files related",
        "pulses none",
        "accept accept",
        "as16625 akamai",
        "as20940",
        "asnone united",
        "nxdomain",
        "expiration date",
        "as21342",
        "as132147",
        "china",
        "as9808 china",
        "body",
        "all scoreblue",
        "backdoor",
        "alf features",
        "all search",
        "domain",
        "as15133 verizon",
        "as16552 tiggee",
        "url https",
        "http",
        "hostname",
        "ninite",
        "united states",
        "scan endpoints",
        "show",
        "showing",
        "next",
        "united",
        "as54113",
        "github pages",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "class",
        "twitter",
        "certificate",
        "record value",
        "pulse pulses",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "div div",
        "github",
        "meta",
        "homepage",
        "form",
        "as36459",
        "g2 tls",
        "rsa sha256",
        "as29791",
        "dynamicloader",
        "medium",
        "yara detections",
        "dynamic",
        "filehash",
        "sha256",
        "february",
        "copy",
        "otx telemetry",
        "related tags",
        "a li",
        "span p",
        "dj ai",
        "dongjun jeong",
        "a h2",
        "writeups",
        "infosec journey",
        "script urls",
        "netherlands",
        "a nxdomain",
        "aaaa nxdomain",
        "cloudfront",
        "trojandropper",
        "china unknown",
        "msie",
        "chrome",
        "ipv4",
        "noobyprotect",
        "files",
        "peeringdb",
        "sign",
        "github copilot",
        "view",
        "notifications",
        "branches tags",
        "code issues",
        "pull",
        "write",
        "star",
        "code",
        "stars",
        "python",
        "shell",
        "footer",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "as62597 nsone",
        "dnssec",
        "win32mydoom sep",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "query",
        "jpn write",
        "e0e8e",
        "observed dns",
        "expiro",
        "defender",
        "malware",
        "possible",
        "suspicious",
        "activity dns",
        "mtb may",
        "sameorigin",
        "domain name",
        "error",
        "moved",
        "server",
        "mtb sep",
        "win32cve sep",
        "cloud provider",
        "reverse dns",
        "america asn",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "pulses",
        "default",
        "yara rule",
        "high",
        "cnc checkin",
        "cape",
        "powershell",
        "vmprotect",
        "local",
        "agent",
        "domainabuse",
        "su liao",
        "zhi pin",
        "application",
        "expiro malware",
        "anomalous file",
        "june",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "samples",
        "exploit",
        "germany unknown",
        "as14636",
        "russia unknown",
        "as9123 timeweb",
        "as45102 alibaba",
        "as43830",
        "read c",
        "write c",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "installcore",
        "format",
        "delphi",
        "stack",
        "downloader",
        "urls http",
        "delete c",
        "tls handshake",
        "number",
        "failure",
        "delete",
        "ids detections",
        "fadok",
        "template",
        "slcc2",
        "media center",
        "contacted",
        "ollydbg",
        "internal",
        "simda",
        "brian sabey",
        "going dark",
        "stop",
        "as14061",
        "hostnames",
        "as48287 jsc",
        "as50340",
        "czechia unknown",
        "date"
      ],
      "references": [
        "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
        "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
        "00-skillsetparadesarrollo.zendesk.com",
        "https://github.com/peeringdb/peeringdb-py",
        "From the lovely Cyber Folks .PL Cover"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Poland",
        "Australia",
        "Austria",
        "Canada",
        "Netherlands",
        "China"
      ],
      "malware_families": [
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2023-4966",
          "display_name": "CVE-2023-4966",
          "target": null
        },
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "TELPER:HSTR:CLEAN:Ninite",
          "display_name": "TELPER:HSTR:CLEAN:Ninite",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "Trojan:Win32/Dridex",
          "display_name": "Trojan:Win32/Dridex",
          "target": "/malware/Trojan:Win32/Dridex"
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "Malware:AddsCopyToStartup",
          "display_name": "Malware:AddsCopyToStartup",
          "target": null
        },
        {
          "id": "Trojan:Win32/Cobaltstrike",
          "display_name": "Trojan:Win32/Cobaltstrike",
          "target": "/malware/Trojan:Win32/Cobaltstrike"
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
          "display_name": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
          "target": null
        },
        {
          "id": "Trojan:Win32/Startpage",
          "display_name": "Trojan:Win32/Startpage",
          "target": "/malware/Trojan:Win32/Startpage"
        },
        {
          "id": "Backdoor:Win32/Zegost",
          "display_name": "Backdoor:Win32/Zegost",
          "target": "/malware/Backdoor:Win32/Zegost"
        },
        {
          "id": "Trojan:Win32/Fanop",
          "display_name": "Trojan:Win32/Fanop",
          "target": "/malware/Trojan:Win32/Fanop"
        },
        {
          "id": "Trojan:Win32/Neconyd",
          "display_name": "Trojan:Win32/Neconyd",
          "target": "/malware/Trojan:Win32/Neconyd"
        },
        {
          "id": "Trojan:Win32/Zombie",
          "display_name": "Trojan:Win32/Zombie",
          "target": "/malware/Trojan:Win32/Zombie"
        },
        {
          "id": "Win.Trojan.Generic-9935365-0",
          "display_name": "Win.Trojan.Generic-9935365-0",
          "target": null
        },
        {
          "id": "Ninite",
          "display_name": "Ninite",
          "target": null
        },
        {
          "id": "NoobyProtect",
          "display_name": "NoobyProtect",
          "target": null
        },
        {
          "id": "TEL:Trojan:Win64/GoCLR",
          "display_name": "TEL:Trojan:Win64/GoCLR",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        }
      ],
      "attack_ids": [
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4891,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2436,
        "CVE": 3,
        "FileHash-MD5": 2510,
        "FileHash-SHA1": 2063,
        "FileHash-SHA256": 4054,
        "hostname": 1788,
        "URL": 1228,
        "email": 16
      },
      "indicator_count": 14098,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 239,
      "modified_text": "543 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66c235b05007103d3e3e7038",
      "name": "HCA -  Win32:RansomX-gen affecting HCA (HealthOneCares) + Miscellaneous Attacks",
      "description": "HCA (Health One Cares) affected by a RansomX and various serious attacks. It's linked back to a neurosurgeon who is likely not responsible for attack of course. It has been the same,e group of attackers using Samuel Tulach engineered malware. I'm unsure if there is collusion between Brian Sabey (consistent attacker) and Samuel Tulach. I just know it relates back to the same threat actors that have been hacking healthcare facilities, government offices, telecommunications, technology at health centers abusing webcams and patients records modification, and distribution. PHI PII issues.",
      "modified": "2024-09-17T17:01:24.349000",
      "created": "2024-08-18T17:56:00.485000",
      "tags": [
        "blacklist http",
        "safe site",
        "no data",
        "tag count",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "cisco umbrella",
        "site",
        "alexa top",
        "united",
        "million",
        "mail spammer",
        "malicious site",
        "phishing site",
        "team phishing",
        "tofsee",
        "malware",
        "bank",
        "unsafe",
        "azorult",
        "cobalt strike",
        "service",
        "runescape",
        "facebook",
        "download",
        "zbot",
        "installcore",
        "nymaim",
        "suppobox",
        "malicious",
        "cl0p",
        "inmortal",
        "domains",
        "referrer",
        "historical ssl",
        "apple stuff",
        "combined",
        "hr rtd",
        "network",
        "collection",
        "vt graph",
        "round",
        "metro",
        "execution",
        "emotet",
        "startpage",
        "maltiverse top",
        "paypal",
        "blacklist",
        "passive dns",
        "related nids",
        "urls",
        "flag united",
        "accept",
        "acceptencoding",
        "hit age",
        "ip asn",
        "malware site",
        "adware",
        "fakealert",
        "opencandy",
        "exploit",
        "raccoon",
        "metastealer",
        "redline stealer",
        "anonymizer",
        "heur",
        "outlook",
        "phishing airbnb",
        "engineering",
        "phishing",
        "filerepmalware",
        "maltiverse",
        "div div",
        "c span",
        "div section",
        "span div",
        "search",
        "showing",
        "unknown",
        "as397240",
        "moved",
        "date",
        "body",
        "as54113",
        "github pages",
        "a domains",
        "entries",
        "mtb jul",
        "class",
        "sea x",
        "scan endpoints",
        "all scoreblue",
        "alf features",
        "related pulses",
        "file samples",
        "files matching",
        "show",
        "date hash",
        "next",
        "worm",
        "dynamicloader",
        "yara rule",
        "high",
        "windows",
        "grum",
        "medium",
        "installs",
        "windows startup",
        "application",
        "stream",
        "as22612",
        "ipv4",
        "pulse pulses",
        "files",
        "switch dns",
        "query",
        "data",
        "noname057",
        "password",
        "cybercrime",
        "malicious url",
        "kuaizip",
        "team",
        "downloader",
        "generic",
        "crack",
        "presenoker",
        "dapato",
        "riskware",
        "genkryptik",
        "fuery",
        "agent",
        "wacatac",
        "union",
        "shellexecuteexw",
        "hash",
        "writeconsolew",
        "registry",
        "t1031",
        "trojan",
        "copy",
        "dock",
        "write",
        "win32",
        "file execution",
        "explorer",
        "alerts",
        "checks",
        "bios",
        "system restore",
        "anne",
        "training",
        "strings http",
        "basic telephone",
        "xsl stylesheets",
        "apache fop",
        "createdate",
        "modifydate",
        "producer apache",
        "format",
        "core",
        "nxscspu",
        "zsextbzusbrvsk",
        "pxnzj",
        "jwxkrhdlrivprs",
        "default",
        "qxrfnjuodik",
        "mncau",
        "csqvrkwsqka",
        "testpath path",
        "else",
        "null",
        "suspicious",
        "win64",
        "hotkey",
        "ransom",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "pdb path",
        "pe resource",
        "push"
      ],
      "references": [
        "https://www.healthonecares.com/physicians/profile/xxxxxxxxxx-MD | Attacker is tracking & hacking every service target has used.",
        "Adversary: https://tulach.cc/ - Maware engineer. It's believed his malware is being used by Brian Sabey of Hall Render",
        "Adversary: https://github.com/SamuelTulach/VirusTotalUploader",
        "https://work.a-poster.info",
        "Emotet: FileHash-MD5 9e78accf19de70b1e614c9bd9d9a7928",
        "Emotet:   FileHash-SHA1 2493981a18613a750ac3165199ec030a7c00663f",
        "Emotet: FileHash-SHA256 0071c6eea86a219777df283cc476ca450df4b04f4c7ed0eb48fbdf3a9cf7888f",
        "http://feeds.soundcloud.com/users/soundcloud:users:73198681/sounds.rss",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA1 b0b2c74463496c0020faf4655e83449f7e8019ec",
        "Win32:RansomX-gen\\ [Ransom]: FileHash-SHA256 00000ae84c4f1f2332ef155130b4b8d65f1ed972a9cd851fe9e85f236f8cfa32",
        "pornhero.net| itsyourporn.com | http://cdn.itsyourporn.com | http://cdn.itsyourporn.com/assets/images/logo.jpg.  http://cdn2.video.itsyourporn.com | https://cdn.itsyourporn.com | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Antivirus Detections Other:Malware-gen\\ [Trj] ,  ALF:TrojanDownloader:PowerShell/Ploprolo.DB  Alerts network_icmp nolookup_communication injection_resumethread suspicious_powershell",
        "IDS Detections: IDS Detections SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)",
        "IDS Detections: Possible HTA Application Download Dotted Quad Host HTA Request HTTP request for .exe file with no User-Agent",
        "Alerts: network_icmp nolookup_communication injection_resumethread suspicious_powershell network_cnc_http",
        "Antivirus Detections: Win.Malware.Moonlight-9919383-0 ,  Worm:Win32/Lightmoon.H",
        "Yara Detections: Nrv2x ,  upx_3 ,  UPX_OEP_place ,  UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser , UPX",
        "Alerts: antidebug_windows infostealer_cookies persistence_autorun antivm_generic_bios deletes_executed_files",
        "Alerts: disables_system_restore infostealer_mail persistence_ifeo recon_fingerprint stealth_hidden_extension stealth_hiddenreg"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Cl0p",
          "display_name": "Cl0p",
          "target": null
        },
        {
          "id": "Inmortal",
          "display_name": "Inmortal",
          "target": null
        },
        {
          "id": "Domains",
          "display_name": "Domains",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_f28c33a2",
          "display_name": "ALF:Trojan:Win32/Cassini_f28c33a2",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
          "display_name": "ALF:HeraklezEval:Worm:Win32/Mimail!rfn",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.YL",
          "display_name": "Trojan:Win32/Emotet.YL",
          "target": "/malware/Trojan:Win32/Emotet.YL"
        },
        {
          "id": "Win32:RansomX-gen\\ [Ransom]",
          "display_name": "Win32:RansomX-gen\\ [Ransom]",
          "target": null
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
          "display_name": "ALF:TrojanDownloader:PowerShell/Ploprolo.DB",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [
        "Civilian Society",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Media"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 50,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 891,
        "FileHash-MD5": 2368,
        "FileHash-SHA1": 1873,
        "FileHash-SHA256": 5092,
        "domain": 648,
        "hostname": 557,
        "CVE": 8,
        "email": 2
      },
      "indicator_count": 11439,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "579 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66a4d15c60edc83ca6bfc97e",
      "name": "Fraud Services, Updates, Network Worm, SpyWare - Misc Attack",
      "description": "",
      "modified": "2024-08-26T10:04:37.360000",
      "created": "2024-07-27T10:52:12.501000",
      "tags": [
        "united",
        "unknown",
        "a domains",
        "search",
        "creation date",
        "record value",
        "cyberlynk",
        "date",
        "expiration date",
        "title",
        "encrypt",
        "body",
        "as54113",
        "aaaa",
        "cname",
        "next",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr3",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "files",
        "type name",
        "android",
        "server",
        "registrar abuse",
        "dnssec",
        "domain name",
        "contact phone",
        "registrar url",
        "registrar whois",
        "registrar",
        "llc registry",
        "code",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "dns replication",
        "historical ssl",
        "no data",
        "tag count",
        "fakedout threat",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "heur",
        "cisco umbrella",
        "site",
        "malware",
        "safe site",
        "million",
        "alexa top",
        "malicious site",
        "phishing site",
        "suspected",
        "unsafe",
        "wacatac",
        "artemis",
        "iframe",
        "presenoker",
        "phishing",
        "opencandy",
        "downldr",
        "cleaner",
        "conduit",
        "riskware",
        "nircmd",
        "swrort",
        "tiggre",
        "agent",
        "filetour",
        "fusioncore",
        "unruy",
        "crack",
        "exploit",
        "cobalt strike",
        "xrat",
        "alexa",
        "acint",
        "systweak",
        "behav",
        "genkryptik",
        "blacknet rat",
        "stealer",
        "installpack",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "zbot",
        "xtrat",
        "installcore",
        "patcher",
        "adload",
        "win64",
        "class",
        "twitter",
        "accept",
        "malware site",
        "maltiverse",
        "ransomware",
        "phishingms",
        "anonymisation",
        "suppobox",
        "emotet",
        "revengerat",
        "downloader",
        "emailworm",
        "ramnit",
        "warbot",
        "citadel",
        "zeus",
        "simda",
        "keitaro",
        "virut",
        "team",
        "cultureneutral",
        "get na",
        "show",
        "delete c",
        "delete",
        "yara detections",
        "copy",
        "nivdort",
        "write",
        "trojanspy",
        "bayrob",
        "intel",
        "ms windows",
        "default",
        "pe32 executable",
        "document file",
        "v2 document",
        "pe32",
        "worm",
        "entries",
        "td td",
        "rufus",
        "mtb apr",
        "servers",
        "as39122",
        "span",
        "github pages",
        "passive dns",
        "formbook cnc",
        "checkin",
        "dridex",
        "request",
        "less see",
        "http request",
        "status",
        "name servers",
        "certificate",
        "urls",
        "div div",
        "header click",
        "meta",
        "homepage",
        "form",
        "date hash",
        "avast avg",
        "backdoor",
        "mtb jul",
        "as36459",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "sha256",
        "sha1",
        "ascii text",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "pattern match",
        "null",
        "hybrid",
        "refresh",
        "general",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "suspicious",
        "windows nt",
        "apache",
        "path",
        "pragma",
        "footer",
        "as8068",
        "as8075",
        "as15169 google",
        "as16552 tiggee",
        "virtool",
        "related pulses",
        "file samples",
        "files matching",
        "showing",
        "domain",
        "as22612",
        "as397240",
        "as19527 google",
        "moved",
        "gmt server",
        "as20940",
        "as4230 claro",
        "trojan",
        "ninite",
        "as2914 ntt",
        "win32",
        "brazil unknown",
        "brazil",
        "invalid url",
        "trojandropper",
        "body html",
        "head title",
        "asnone united",
        "as23393"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Brazil",
        "India"
      ],
      "malware_families": [
        {
          "id": "Dridex",
          "display_name": "Dridex",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 46,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1034,
        "domain": 1210,
        "email": 13,
        "hostname": 1031,
        "FileHash-SHA1": 685,
        "FileHash-SHA256": 1036,
        "FileHash-MD5": 927,
        "CVE": 10
      },
      "indicator_count": 5946,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "601 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65fc4d4c24f2000879921be5",
      "name": "The Org : FormBook CnC | Pykspa",
      "description": "Front Facing Description:  'TheOrg' (https://theorg.com) The Org\nThe Org is an online professional community platform. It helps organizations get more exposure externally and operate more efficiently internally. | efficiently internally | Nefarious scheme?  Unclear. Possible visa, immigration scheme. | Pykspa is a piece of malware that can be used to remotely control infected systems. It also enables attackers to. download other malware or extract personal data. || Dark. | Score 100% Falcon Sandbox | Evasive. Moved permanently 03/21/2024 | FormBook is an infostealer  of browser cached credentials , screenshots,  keystrokes. | Tags auto populated",
      "modified": "2024-04-20T14:04:02.366000",
      "created": "2024-03-21T15:07:56.415000",
      "tags": [
        "q https",
        "https",
        "enablement",
        "org log",
        "sign",
        "contact",
        "right person",
        "explore",
        "start",
        "grafana labs",
        "ogilvy",
        "figma",
        "find",
        "apollo",
        "http",
        "span",
        "learn",
        "html",
        "expiry",
        "form",
        "label",
        "youtube video",
        "linkedin",
        "input",
        "pixel",
        "legend",
        "cookie",
        "march",
        "de indicators",
        "domains",
        "hashes",
        "gmbh version",
        "status page",
        "service privacy",
        "legal",
        "impressum",
        "reverse dns",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "united",
        "resource",
        "asn16509",
        "amazon02",
        "name value",
        "main",
        "ssl certificate",
        "whois record",
        "whois whois",
        "resolutions",
        "threat roundup",
        "communicating",
        "referrer",
        "subdomains",
        "historical ssl",
        "collections",
        "june",
        "february",
        "blister",
        "cobalt strike",
        "phishing",
        "formbook",
        "contacted",
        "ip check",
        "adult content",
        "divergent",
        "hacktool",
        "copy",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers age",
        "cachecontrol",
        "connection",
        "tsara brashears",
        "malicious",
        "life",
        "core",
        "dns replication",
        "date",
        "win32 exe",
        "files",
        "detections type",
        "name",
        "wininit",
        "office open",
        "xml document",
        "qiwi hack",
        "android",
        "mgeinteg",
        "html info",
        "title",
        "org meta",
        "tags viewport",
        "org twitter",
        "org og",
        "the org",
        "utc google",
        "tag manager",
        "g5nxq655fgp",
        "domain",
        "search",
        "status",
        "scan endpoints",
        "all scoreblue",
        "hostname",
        "pulse pulses",
        "passive dns",
        "urls",
        "bhagam bhag",
        "home screen",
        "entries",
        "createdate",
        "title bhagam",
        "select xmp",
        "filehash",
        "malware",
        "format",
        "unknown",
        "meta",
        "as44273 host",
        "creation date",
        "moved",
        "encrypt",
        "district",
        "body",
        "window",
        "hall law",
        "a domains",
        "script urls",
        "datalayer",
        "registrar",
        "next",
        "accept encoding",
        "showing",
        "yara rule",
        "http host",
        "worm",
        "high",
        "possible",
        "win32",
        "bits",
        "cname",
        "as396982 google",
        "redacted for",
        "expiration date",
        "div div",
        "as26710 icann",
        "script domains",
        "citadel",
        "indonesia",
        "get updates",
        "write c",
        "create c",
        "read c",
        "show",
        "default",
        "common upatre",
        "upatre",
        "downloader",
        "zeus",
        "write",
        "execution",
        "regsetvalueexa",
        "regdword",
        "module load",
        "dock",
        "persistence",
        "as54113",
        "github pages",
        "formbook cnc",
        "checkin",
        "lowfi",
        "class",
        "trojan",
        "accept",
        "visa scheme",
        "mtb feb",
        "mtb jan",
        "romeo scheme",
        "exploitation",
        "pattern match",
        "command decode",
        "mitre att",
        "suricata ipv4",
        "ck id",
        "show technique",
        "ck matrix",
        "suricata udpv4",
        "facebook",
        "hybrid",
        "general",
        "model",
        "comspec",
        "click",
        "strings",
        "footer",
        "michelle",
        "nora",
        "hallrender",
        "name servers",
        "record value",
        "emails",
        "servers",
        "found",
        "gmt content",
        "error",
        "code",
        "men",
        "man",
        "woman",
        "hit",
        "sreredrum",
        "honey client",
        "hiv",
        "threat",
        "paste",
        "iocs",
        "urls https",
        "malicious site",
        "phishing site",
        "blockchain",
        "unsafe",
        "malware site",
        "malicious url",
        "phishtank",
        "cyber threat",
        "artemis",
        "asyncrat",
        "team",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "million",
        "xrat",
        "downldr",
        "union",
        "bank",
        "gvt google video transcoding",
        "malvertizing",
        "targeting",
        "target",
        "yandex dropper extend",
        "remote procedure call",
        "identity_helper.exe",
        "cookie bot"
      ],
      "references": [
        "https://theorg.com",
        "Ransom: CVE-2023-4966",
        "Ransom: ransomed.vc",
        "FormBook: a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel | 103.246.145.111",
        "Malware: 0a6e883228a04a6e8738511a6210914dea1773d88cf57950c83e092f02c7f3bf - Other:Malware-gen\\ [Trj]",
        "Yara Detections invalid_trailer_structure ,  multiple_versions",
        "Malware Hosting IP addresses:  141.193.213.20 | 185.199.108.153| 185.199.110.153 | 185.199.111.153",
        "https://otx.alienvault.com/indicator/url/https://theorg.com/_next/data/Gh7c6NpBHZESb74aisPB8/org/springboard-collaborative.json?companySlug=springboard-collaborative",
        "Scanning host: 31.214.178.54 , 37.152.88.54",
        "Yara Detections: vad_contains_network_strings information | HackToolWin32Patch CodeOverlap | PWSWin32Phorex CodeOverlap",
        "Yara: TrojanDropperWin32Ropest | CodeOverlap TrojanWin32Gatsorm | CodeOverlap TrojanWinNTConficker | CodeOverlap Alerts: WormWin32Pykspa",
        "Aspnet collect: https://otx.alienvault.com/otxapi/indicators/file/screenshot/000444cc67b97f45f11e1fdf89ad8f5127c87aa858fe151fa9c4975276f53b42",
        "development.digitalphotogallery.com _YandexDropperExtend",
        "Emotet: FileHash-MD5 bafae95c36402dfc1ea5fa04523e4e81",
        "Emotet: FileHash-SHA256 db9d59b0f192c91f8ecf939c415b3252b13b0fb052d4a66ceefb80dfb43d6e8a |",
        "Emotet: FileHash-SHA1\t19c14ab0aaab2c1dd922f0baca3cf64056f80acc",
        "thevisafirm.com | Immigration Lawyers Capital Immigration Lawyers Green Card Lawyer [ London, DC] malicious",
        "www.hallinjurylaw.com |\tMinneapolis Personal Injury Lawyer Personal Injury Law Experts",
        "Malvertizing, Phishing, Botnet PWD: https://pin.it/ | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "Phishing, Botnet PWD:https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://www.sweetheartvideo.com/tsara-brashears/ | www.sweetheartvideo.com",
        "https://hybrid-analysis.com/sample/ac09d7f6b26675a529a366b47bc09b3fd776576fb099c020f57204ff7b4ea31c",
        "CVE-2007-3896 | CVE-2023-22518 | CVE-2023-4966",
        "jpocxaar1---r3---sn-jpocxaa-a03e.gvt1.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Win32:Renos-KY\\ [Trj]",
          "display_name": "Win32:Renos-KY\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Worm.Pykspa-1",
          "display_name": "Win.Worm.Pykspa-1",
          "target": null
        },
        {
          "id": "Worm:Win32/Pykspa.C",
          "display_name": "Worm:Win32/Pykspa.C",
          "target": "/malware/Worm:Win32/Pykspa.C"
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        },
        {
          "id": "ApolloLocker",
          "display_name": "ApolloLocker",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32",
          "display_name": "TrojanDropper:Win32",
          "target": null
        },
        {
          "id": "Other:Malware-gen\\ [Trj]",
          "display_name": "Other:Malware-gen\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        }
      ],
      "industries": [
        "Media",
        "Immigration",
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 55,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4567,
        "domain": 2576,
        "hostname": 1212,
        "FileHash-SHA256": 3836,
        "FileHash-MD5": 744,
        "FileHash-SHA1": 724,
        "CVE": 5,
        "email": 9,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 13674,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 232,
      "modified_text": "729 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://help.github.com/pages/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://help.github.com/pages/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629429.6903677
}