{
  "type": "URL",
  "indicator": "https://i.crdvivaimg.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://i.crdvivaimg.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4119715951,
      "indicator": "https://i.crdvivaimg.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "68a0cb6a89a10d13623a0018",
          "name": "Medicaid Mirai Botnet | United Healthcare Mirai Botnet",
          "description": "https://myhpnmedicaid.com/Looking-For-A-Plan/Enroll. Medicaid Botnet work managed by Lumen Technologies as part of a massive silencing campaign. |\n\nPhone calls routed since forces and  investigated disclosures of several attack resulting in great bodily harm and life threatening, ending injuries.\nThis campaign date has one start date 11/13/2013.\n#missed assaults internal investigated 10/08/2013 -11/31/ 2013.\nI\u2019m sure other targets are impacted . This stems from targets  personal , documented experiences. \nFormerly k/a Century Link was confronted by associate of targets when a plain clothed male entered targets yard in 11/ 2013, told  their box controlled entire neighborhood. Continuously accessed properties. \n\n\n\n#rip #lumen #botnet #fencing #malware #silencing #civil_liberties # monitored_target #remote #corruption #privacy_abuse #centurylink",
          "modified": "2025-09-15T16:04:47.043000",
          "created": "2025-08-16T18:18:18.657000",
          "tags": [
            "url https",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "entries",
            "httponly",
            "samesitelax",
            "read c",
            "medium",
            "rgba",
            "unicode",
            "port",
            "memcommit",
            "delete",
            "next",
            "dock",
            "write",
            "execution",
            "present aug",
            "united",
            "ip address",
            "name servers",
            "unknown ns",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "pattern match",
            "show technique",
            "ck matrix",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "href",
            "size",
            "t1480 execution",
            "file defense",
            "ascii text",
            "trojan",
            "passive dns",
            "trojandropper",
            "next associated",
            "fastly error",
            "please",
            "sea p",
            "mozilla",
            "accept",
            "ipv4 add",
            "urls",
            "files",
            "location united",
            "ipv4",
            "url analysis",
            "america flag",
            "america asn",
            "backdoor",
            "win32",
            "malware",
            "date",
            "domain",
            "segoe ui",
            "a domains",
            "security tls",
            "san jose",
            "asn8075",
            "reverse dns",
            "software",
            "resource hash",
            "general full",
            "status",
            "emails",
            "expiration date",
            "asp",
            "microsoft oem",
            "found",
            "running webserver",
            "netherlands",
            "creation date",
            "aaaa",
            "certificate",
            "protocol h2",
            "name value",
            "hash",
            "present jun",
            "present apr",
            "moved",
            "control att",
            "t1573 encrypted",
            "channel command",
            "decrypted ssl",
            "runtime process",
            "appdata",
            "windows nt",
            "svg scalable",
            "patch",
            "internal",
            "core",
            "high",
            "tcp syn",
            "icmp traffic",
            "dns query",
            "av detections",
            "ashburn",
            "ai device id",
            "telnet",
            "windows script",
            "microsoft",
            "host",
            "yara detections",
            "pdb path",
            "pe resource",
            "script host",
            "test",
            "hostname add",
            "files ip",
            "domains",
            "hashes",
            "ireland",
            "mtb jun",
            "mtb may",
            "device local",
            "remotewd",
            "nemtih",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses otx",
            "present jul",
            "domain add",
            "colorado",
            "quasi",
            "contracts",
            "botnet",
            "remote access",
            "virginia",
            "c++",
            "hacking",
            "monitored target",
            "silencing campaign",
            "audio recording",
            "cameras",
            "full service",
            "tactics"
          ],
          "references": [
            "Handled by Lumen Technologies | What kind of darkness is this?",
            "https://myhpnmedicaid.com/Looking-For-A-Plan/Enroll  https://myhpnmedicaid.com/Provider",
            "dev.myhpnmedicaid.com",
            "ELF:Mirai-ATI | United Healthcare Dark? | https://otx.alienvault.com/indicator/ip/205.132.162.113",
            "https://hybrid-analysis.com/sample/e439d3dd3d943ecc702d12998a32e15c00008a8f276e6c89cb54f6de43f36de8/689fccb81c4f237eb6009b0f",
            "https://hybrid-analysis.com/sample/f095ee58f390749315e72cfa46d979cb25a15884b66c7951719c844ebc82b3a3/689fcc753aca4827cd036851",
            "https://hybrid-analysis.com/sample/dd09e575e6dfa77f081bf0014b2494e02f90cb23723fbb35d6b2a92e7c629920/689fcc40b786f8eaa20534b5",
            "Primary Request aspnet dotnet.microsoft.com/en-us/apps/ Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/   https://dotnet.microsoft.com/en-us/apps/aspnet",
            "Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/",
            "https://dotnet.microsoft.com/en-us/apps/aspnet",
            "ASP.net - Hack Together: Mar 1-15 Join the hack. Build an app with NET & Microsoft Graph for a\u2026 .",
            "ASP.net - chance to win prizes! \u53e3\u3001\u4ecb\u5973\u8fa3 All Microsoft Learn more ASP.NET Free. Cross-platform\u2026.",
            "ASP.net Open source. A framework for building web apps and services with .NET and C#",
            "Registrant Org: Japan Computer Emergency Response Team Coordination Center",
            "Interesting: unitedhealthcare  cdn.member.unitedhealthcare.com \u2022 data.aca.unitedhealthcare.com \u2022 data.member.unitedhealthcare.com",
            "Interesting Domain Tactics: https://click.benefits.unitedhealthcare.com/",
            "Interesting: dev-optum-dataintelligence.com \u2022 optumcoding.xxx \u2022 optuminsightcoding.xxx \u2022 optumrx.xxx",
            "Interesting: memberforms.optumrx.com \u2022  myoptum.info \u2022 optumrx.com \u2022 cte-scl.new.optumrx.com \u2022 dev-scl.optumrx.com",
            "http://www.nexcentra.com/fox-news-faces-another-sexual-harassment-lawsuit"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Custom Malware",
              "display_name": "Custom Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Daws",
              "display_name": "Trojan:Win32/Daws",
              "target": "/malware/Trojan:Win32/Daws"
            },
            {
              "id": "ELF:Mirai-ATI",
              "display_name": "ELF:Mirai-ATI",
              "target": null
            },
            {
              "id": "Trojan:Win32/IRCbot",
              "display_name": "Trojan:Win32/IRCbot",
              "target": "/malware/Trojan:Win32/IRCbot"
            },
            {
              "id": "alf:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "alf:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/Muldrop.V!MTB",
              "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
              "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1092",
              "name": "Communication Through Removable Media",
              "display_name": "T1092 - Communication Through Removable Media"
            },
            {
              "id": "T1433",
              "name": "Access Call Log",
              "display_name": "T1433 - Access Call Log"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Contracts",
            "Government",
            "Finance",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4880,
            "domain": 575,
            "hostname": 1419,
            "FileHash-SHA256": 1745,
            "FileHash-MD5": 284,
            "FileHash-SHA1": 263,
            "email": 5,
            "CVE": 1
          },
          "indicator_count": 9172,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "216 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689fb86af7ae894997245158",
          "name": "Lumen Technologies attacks. Affects telecommunication between patient and Intermountain Health",
          "description": "Severely impacted a monitored target\u2019s communication with health provider , prohibited patient calls, borne answering calls at UC Health & Intermountain Healthcare. Targets devices routed and / or hijacked by or to other known carriers.\nImpacts Medicaid patient files. NOT CHINA. Colorado. Message #trulymissed intentionally routed to outbound decimated her health & provider relationships. \n\u201cYour administrator contact lumen at 877-453-8353 to resolve the issue. You may dial zero to be connected with an operator to complete your call. The charges may apply operator services will require a valid telephone number and a method of payment for charges to complete the call thank you for calling Luman error code CPN1\u201d\n\nWin32:Downloader-KEQ\\ [Trj]\t\t\n#Lowfi:Cutwail_Upatre_GameOver_Obfuscator\n#malware #Schoolboy\n#.Bulz\n#trojan #Redline\n#.Dorkbot\t#Azorult\n#HawkEye\n#Msilperseus\n#AgentTesla\nhacktool:MSIL/Boilod",
          "modified": "2025-09-14T21:02:42.856000",
          "created": "2025-08-15T22:44:58.153000",
          "tags": [
            "united",
            "passive dns",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "creation date",
            "communications",
            "expiration date",
            "domain",
            "files ip",
            "address",
            "asn as3356",
            "el dorado",
            "present jun",
            "present dec",
            "present sep",
            "present nov",
            "present may",
            "entries",
            "showing",
            "next associated",
            "urls show",
            "search",
            "read c",
            "show",
            "medium",
            "unicode",
            "rgba",
            "next",
            "memcommit",
            "delete",
            "dock",
            "write",
            "execution",
            "copy",
            "status",
            "value emails",
            "name level",
            "llc name",
            "org level",
            "llc address",
            "city broomfield",
            "date",
            "error nov",
            "next http",
            "scans record",
            "value",
            "body head",
            "document moved",
            "title head",
            "object moved",
            "href http",
            "denver",
            "hostname add",
            "ip address",
            "pulse pulses",
            "verdict",
            "present aug",
            "name servers",
            "hong kong",
            "china unknown",
            "domain add",
            "present jul",
            "china showing",
            "date checked",
            "url hostname",
            "mirai",
            "crlf line",
            "body",
            "please",
            "x msedge",
            "unknown ns",
            "unknown soa",
            "trojan",
            "virtool",
            "ipv4 add",
            "hostname",
            "set cookie",
            "accept",
            "dispatcher",
            "ref b",
            "wed may",
            "backdoor",
            "mtb aug",
            "mtb dec",
            "twitter",
            "smoke loader",
            "malware",
            "hacktool",
            "mtb feb",
            "aaaa",
            "cname"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 562,
            "hostname": 1988,
            "URL": 7800,
            "FileHash-SHA256": 657,
            "email": 5,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 127
          },
          "indicator_count": 11289,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "216 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d5115ad786de4ff048e5b",
          "name": "TEL:ECCert!SSLCO | Mirai Malware Hosting | Multi user Tracker",
          "description": "https://api.mirai.com/MiraiWebService/passbook/180823-77257/4001645 [Malware hosting]\n*TEL:ECCert!SSLCO\nYARA Detections:\nDelphi\nThis program must be run under Win32\ncompilers.\nCode Overlap of Trojan Droppers Backdoors , TrojanSpy\n\n\n#injection_inter_process\n#creates_largekey\n#network_bind\n#ransomware_file_modifications\n#antivm_generic_bios\n#antivm_generic_disk\n#enumerates_physical_drives\n#physical_drive_access\n#deletes_executed_files\n#recon_fingerprint\n#suspicious_command_tools\n#anomalous_deletefile\n#antisandbox_sleep\n#dead_connect\n#dynamic_function_loading\n#http_request\n#ipc_namedpipe\n#network_anomaly\n#powershell_download\n#powershell_request #track #locate #remote_access",
          "modified": "2025-09-13T02:00:42.729000",
          "created": "2025-08-14T02:59:33.036000",
          "tags": [
            "url https",
            "url http",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "entries",
            "present sep",
            "united",
            "present aug",
            "present jul",
            "present jun",
            "moved",
            "unknown ns",
            "present may",
            "present apr",
            "passive dns",
            "date",
            "encrypt",
            "body",
            "cookie",
            "gmt server",
            "content type",
            "dynamicloader",
            "medium",
            "x17x03x01",
            "download studio",
            "high",
            "read c",
            "show",
            "windows",
            "copy",
            "powershell",
            "write",
            "anomaly",
            "next",
            "unknown",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "yara detections",
            "delphi",
            "codeoverlap",
            "win32",
            "rgba",
            "memcommit",
            "delete",
            "png image",
            "hash",
            "dock",
            "execution",
            "malware",
            "wine emulator",
            "dynamic",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "capture",
            "persistence",
            "sha256",
            "submitted",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "script",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "august",
            "span",
            "refresh",
            "meta",
            "mirai",
            "february",
            "april",
            "june",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "caribe",
            "rest",
            "accept",
            "friday",
            "look",
            "verify",
            "restart"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6211,
            "domain": 682,
            "hostname": 1661,
            "FileHash-MD5": 117,
            "FileHash-SHA1": 100,
            "FileHash-SHA256": 1386,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 10162,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d14258dd07e26a3bb1d46",
          "name": "PalantirFoundry.com (?) Multiple Remote Controlled Devices",
          "description": "Hacking.\nI\u2019m not sure if this is masquerading or not yet. Anything with \u2018PalantirFoundry.com\u2019 redirects to actual Palanrir login. Multiple users. Potentially 5000+ devices included in pulse. All monitored targets.",
          "modified": "2025-09-12T22:00:43.252000",
          "created": "2025-08-13T22:39:33.511000",
          "tags": [
            "passive dns",
            "urls",
            "files",
            "ip address",
            "asn as16509",
            "less whois",
            "registrar",
            "unknown related",
            "servers",
            "status",
            "hostname",
            "domain",
            "files ip",
            "address",
            "united",
            "unknown ns",
            "a domains",
            "search",
            "script urls",
            "authority",
            "record value",
            "service",
            "mirai",
            "cloud provider",
            "reverse dns",
            "sydney",
            "australia asn",
            "as16509",
            "dns resolutions",
            "related tags",
            "none indicator",
            "write c",
            "mozilla",
            "nsisinetc",
            "show",
            "medium",
            "entries",
            "high",
            "http",
            "delete",
            "write",
            "malware",
            "data upload",
            "ms windows",
            "intel",
            "pe32",
            "lowfi",
            "next",
            "showing",
            "present feb",
            "present jun",
            "present dec",
            "present aug",
            "present may",
            "present jul",
            "moved",
            "media",
            "segoe ui",
            "ipv4",
            "url analysis",
            "location united",
            "error",
            "regopenkeyexa",
            "regsetvalueexa",
            "read c",
            "port",
            "destination",
            "regdword",
            "windows nt",
            "hostile",
            "win32",
            "unknown",
            "delphi",
            "persistence",
            "execution",
            "extraction",
            "l data",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "sha1",
            "sha256",
            "ascii text",
            "mitre att",
            "pattern match",
            "show technique",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "type",
            "please",
            "pulse submit",
            "url add",
            "pulse pulses",
            "related nids",
            "files location",
            "flag united",
            "ddos",
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "virtool",
            "downloader",
            "dadobra",
            "date",
            "certificate",
            "montreal",
            "canada",
            "asn16509",
            "amazon02",
            "screenshot",
            "title login",
            "palantir",
            "page url",
            "history https",
            "evasion att",
            "remember",
            "label",
            "button",
            "form",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "software envoy",
            "value",
            "domainpath name",
            "header value",
            "self",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "returnur",
            "south korea",
            "as9318 sk",
            "sqlite rollback",
            "journal",
            "as701 verizon",
            "bittorrent dht",
            "win64",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFi:LinkularNSIS",
              "display_name": "#LowFi:LinkularNSIS",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
              "display_name": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
              "target": null
            },
            {
              "id": "Fareit",
              "display_name": "Fareit",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Dadobra.E",
              "display_name": "TrojanDownloader:Win32/Dadobra.E",
              "target": "/malware/TrojanDownloader:Win32/Dadobra.E"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3149,
            "domain": 1304,
            "URL": 5269,
            "FileHash-SHA256": 968,
            "FileHash-SHA1": 206,
            "email": 7,
            "FileHash-MD5": 274,
            "SSLCertFingerprint": 1,
            "CVE": 1
          },
          "indicator_count": 11179,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Primary Request aspnet dotnet.microsoft.com/en-us/apps/ Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/   https://dotnet.microsoft.com/en-us/apps/aspnet",
        "Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/",
        "Interesting: memberforms.optumrx.com \u2022  myoptum.info \u2022 optumrx.com \u2022 cte-scl.new.optumrx.com \u2022 dev-scl.optumrx.com",
        "Interesting Domain Tactics: https://click.benefits.unitedhealthcare.com/",
        "https://hybrid-analysis.com/sample/dd09e575e6dfa77f081bf0014b2494e02f90cb23723fbb35d6b2a92e7c629920/689fcc40b786f8eaa20534b5",
        "https://myhpnmedicaid.com/Looking-For-A-Plan/Enroll  https://myhpnmedicaid.com/Provider",
        "Interesting: unitedhealthcare  cdn.member.unitedhealthcare.com \u2022 data.aca.unitedhealthcare.com \u2022 data.member.unitedhealthcare.com",
        "https://dotnet.microsoft.com/en-us/apps/aspnet",
        "https://hybrid-analysis.com/sample/f095ee58f390749315e72cfa46d979cb25a15884b66c7951719c844ebc82b3a3/689fcc753aca4827cd036851",
        "Registrant Org: Japan Computer Emergency Response Team Coordination Center",
        "Interesting: dev-optum-dataintelligence.com \u2022 optumcoding.xxx \u2022 optuminsightcoding.xxx \u2022 optumrx.xxx",
        "http://www.nexcentra.com/fox-news-faces-another-sexual-harassment-lawsuit",
        "ASP.net Open source. A framework for building web apps and services with .NET and C#",
        "dev.myhpnmedicaid.com",
        "ELF:Mirai-ATI | United Healthcare Dark? | https://otx.alienvault.com/indicator/ip/205.132.162.113",
        "ASP.net - Hack Together: Mar 1-15 Join the hack. Build an app with NET & Microsoft Graph for a\u2026 .",
        "ASP.net - chance to win prizes! \u53e3\u3001\u4ecb\u5973\u8fa3 All Microsoft Learn more ASP.NET Free. Cross-platform\u2026.",
        "https://hybrid-analysis.com/sample/e439d3dd3d943ecc702d12998a32e15c00008a8f276e6c89cb54f6de43f36de8/689fccb81c4f237eb6009b0f",
        "Handled by Lumen Technologies | What kind of darkness is this?"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.packed.generic-9967832-0",
            "Trojan:win32/daws",
            "Elf:mirai-ati",
            "Malware",
            "#lowfi:hstr:win32/obfuscatordynmemjmpapi",
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Trojan:win32/ircbot",
            "Tofsee",
            "Custom malware",
            "Trojandropper:win32/muldrop.v!mtb",
            "Fareit",
            "Trojan:win32/zombie.a",
            "Trojandownloader:win32/dadobra.e",
            "#lowfi:linkularnsis"
          ],
          "industries": [
            "Technology",
            "Government",
            "Contracts",
            "Civil society",
            "Finance",
            "Telecommunications",
            "Insurance"
          ],
          "unique_indicators": 52147
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/crdvivaimg.com",
    "whois": "http://whois.domaintools.com/crdvivaimg.com",
    "domain": "crdvivaimg.com",
    "hostname": "i.crdvivaimg.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "68a0cb6a89a10d13623a0018",
      "name": "Medicaid Mirai Botnet | United Healthcare Mirai Botnet",
      "description": "https://myhpnmedicaid.com/Looking-For-A-Plan/Enroll. Medicaid Botnet work managed by Lumen Technologies as part of a massive silencing campaign. |\n\nPhone calls routed since forces and  investigated disclosures of several attack resulting in great bodily harm and life threatening, ending injuries.\nThis campaign date has one start date 11/13/2013.\n#missed assaults internal investigated 10/08/2013 -11/31/ 2013.\nI\u2019m sure other targets are impacted . This stems from targets  personal , documented experiences. \nFormerly k/a Century Link was confronted by associate of targets when a plain clothed male entered targets yard in 11/ 2013, told  their box controlled entire neighborhood. Continuously accessed properties. \n\n\n\n#rip #lumen #botnet #fencing #malware #silencing #civil_liberties # monitored_target #remote #corruption #privacy_abuse #centurylink",
      "modified": "2025-09-15T16:04:47.043000",
      "created": "2025-08-16T18:18:18.657000",
      "tags": [
        "url https",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "entries",
        "httponly",
        "samesitelax",
        "read c",
        "medium",
        "rgba",
        "unicode",
        "port",
        "memcommit",
        "delete",
        "next",
        "dock",
        "write",
        "execution",
        "present aug",
        "united",
        "ip address",
        "name servers",
        "unknown ns",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "mitre att",
        "ck techniques",
        "evasion att",
        "pattern match",
        "show technique",
        "ck matrix",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "href",
        "size",
        "t1480 execution",
        "file defense",
        "ascii text",
        "trojan",
        "passive dns",
        "trojandropper",
        "next associated",
        "fastly error",
        "please",
        "sea p",
        "mozilla",
        "accept",
        "ipv4 add",
        "urls",
        "files",
        "location united",
        "ipv4",
        "url analysis",
        "america flag",
        "america asn",
        "backdoor",
        "win32",
        "malware",
        "date",
        "domain",
        "segoe ui",
        "a domains",
        "security tls",
        "san jose",
        "asn8075",
        "reverse dns",
        "software",
        "resource hash",
        "general full",
        "status",
        "emails",
        "expiration date",
        "asp",
        "microsoft oem",
        "found",
        "running webserver",
        "netherlands",
        "creation date",
        "aaaa",
        "certificate",
        "protocol h2",
        "name value",
        "hash",
        "present jun",
        "present apr",
        "moved",
        "control att",
        "t1573 encrypted",
        "channel command",
        "decrypted ssl",
        "runtime process",
        "appdata",
        "windows nt",
        "svg scalable",
        "patch",
        "internal",
        "core",
        "high",
        "tcp syn",
        "icmp traffic",
        "dns query",
        "av detections",
        "ashburn",
        "ai device id",
        "telnet",
        "windows script",
        "microsoft",
        "host",
        "yara detections",
        "pdb path",
        "pe resource",
        "script host",
        "test",
        "hostname add",
        "files ip",
        "domains",
        "hashes",
        "ireland",
        "mtb jun",
        "mtb may",
        "device local",
        "remotewd",
        "nemtih",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "pulses otx",
        "present jul",
        "domain add",
        "colorado",
        "quasi",
        "contracts",
        "botnet",
        "remote access",
        "virginia",
        "c++",
        "hacking",
        "monitored target",
        "silencing campaign",
        "audio recording",
        "cameras",
        "full service",
        "tactics"
      ],
      "references": [
        "Handled by Lumen Technologies | What kind of darkness is this?",
        "https://myhpnmedicaid.com/Looking-For-A-Plan/Enroll  https://myhpnmedicaid.com/Provider",
        "dev.myhpnmedicaid.com",
        "ELF:Mirai-ATI | United Healthcare Dark? | https://otx.alienvault.com/indicator/ip/205.132.162.113",
        "https://hybrid-analysis.com/sample/e439d3dd3d943ecc702d12998a32e15c00008a8f276e6c89cb54f6de43f36de8/689fccb81c4f237eb6009b0f",
        "https://hybrid-analysis.com/sample/f095ee58f390749315e72cfa46d979cb25a15884b66c7951719c844ebc82b3a3/689fcc753aca4827cd036851",
        "https://hybrid-analysis.com/sample/dd09e575e6dfa77f081bf0014b2494e02f90cb23723fbb35d6b2a92e7c629920/689fcc40b786f8eaa20534b5",
        "Primary Request aspnet dotnet.microsoft.com/en-us/apps/ Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/   https://dotnet.microsoft.com/en-us/apps/aspnet",
        "Redirect Chain  http://asp.net/   https://asp.net/   https://www.asp.net/",
        "https://dotnet.microsoft.com/en-us/apps/aspnet",
        "ASP.net - Hack Together: Mar 1-15 Join the hack. Build an app with NET & Microsoft Graph for a\u2026 .",
        "ASP.net - chance to win prizes! \u53e3\u3001\u4ecb\u5973\u8fa3 All Microsoft Learn more ASP.NET Free. Cross-platform\u2026.",
        "ASP.net Open source. A framework for building web apps and services with .NET and C#",
        "Registrant Org: Japan Computer Emergency Response Team Coordination Center",
        "Interesting: unitedhealthcare  cdn.member.unitedhealthcare.com \u2022 data.aca.unitedhealthcare.com \u2022 data.member.unitedhealthcare.com",
        "Interesting Domain Tactics: https://click.benefits.unitedhealthcare.com/",
        "Interesting: dev-optum-dataintelligence.com \u2022 optumcoding.xxx \u2022 optuminsightcoding.xxx \u2022 optumrx.xxx",
        "Interesting: memberforms.optumrx.com \u2022  myoptum.info \u2022 optumrx.com \u2022 cte-scl.new.optumrx.com \u2022 dev-scl.optumrx.com",
        "http://www.nexcentra.com/fox-news-faces-another-sexual-harassment-lawsuit"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "Custom Malware",
          "display_name": "Custom Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Daws",
          "display_name": "Trojan:Win32/Daws",
          "target": "/malware/Trojan:Win32/Daws"
        },
        {
          "id": "ELF:Mirai-ATI",
          "display_name": "ELF:Mirai-ATI",
          "target": null
        },
        {
          "id": "Trojan:Win32/IRCbot",
          "display_name": "Trojan:Win32/IRCbot",
          "target": "/malware/Trojan:Win32/IRCbot"
        },
        {
          "id": "alf:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "alf:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/Muldrop.V!MTB",
          "display_name": "Trojandropper:Win32/Muldrop.V!MTB",
          "target": "/malware/Trojandropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1092",
          "name": "Communication Through Removable Media",
          "display_name": "T1092 - Communication Through Removable Media"
        },
        {
          "id": "T1433",
          "name": "Access Call Log",
          "display_name": "T1433 - Access Call Log"
        }
      ],
      "industries": [
        "Technology",
        "Telecommunications",
        "Contracts",
        "Government",
        "Finance",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4880,
        "domain": 575,
        "hostname": 1419,
        "FileHash-SHA256": 1745,
        "FileHash-MD5": 284,
        "FileHash-SHA1": 263,
        "email": 5,
        "CVE": 1
      },
      "indicator_count": 9172,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "216 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689fb86af7ae894997245158",
      "name": "Lumen Technologies attacks. Affects telecommunication between patient and Intermountain Health",
      "description": "Severely impacted a monitored target\u2019s communication with health provider , prohibited patient calls, borne answering calls at UC Health & Intermountain Healthcare. Targets devices routed and / or hijacked by or to other known carriers.\nImpacts Medicaid patient files. NOT CHINA. Colorado. Message #trulymissed intentionally routed to outbound decimated her health & provider relationships. \n\u201cYour administrator contact lumen at 877-453-8353 to resolve the issue. You may dial zero to be connected with an operator to complete your call. The charges may apply operator services will require a valid telephone number and a method of payment for charges to complete the call thank you for calling Luman error code CPN1\u201d\n\nWin32:Downloader-KEQ\\ [Trj]\t\t\n#Lowfi:Cutwail_Upatre_GameOver_Obfuscator\n#malware #Schoolboy\n#.Bulz\n#trojan #Redline\n#.Dorkbot\t#Azorult\n#HawkEye\n#Msilperseus\n#AgentTesla\nhacktool:MSIL/Boilod",
      "modified": "2025-09-14T21:02:42.856000",
      "created": "2025-08-15T22:44:58.153000",
      "tags": [
        "united",
        "passive dns",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "creation date",
        "communications",
        "expiration date",
        "domain",
        "files ip",
        "address",
        "asn as3356",
        "el dorado",
        "present jun",
        "present dec",
        "present sep",
        "present nov",
        "present may",
        "entries",
        "showing",
        "next associated",
        "urls show",
        "search",
        "read c",
        "show",
        "medium",
        "unicode",
        "rgba",
        "next",
        "memcommit",
        "delete",
        "dock",
        "write",
        "execution",
        "copy",
        "status",
        "value emails",
        "name level",
        "llc name",
        "org level",
        "llc address",
        "city broomfield",
        "date",
        "error nov",
        "next http",
        "scans record",
        "value",
        "body head",
        "document moved",
        "title head",
        "object moved",
        "href http",
        "denver",
        "hostname add",
        "ip address",
        "pulse pulses",
        "verdict",
        "present aug",
        "name servers",
        "hong kong",
        "china unknown",
        "domain add",
        "present jul",
        "china showing",
        "date checked",
        "url hostname",
        "mirai",
        "crlf line",
        "body",
        "please",
        "x msedge",
        "unknown ns",
        "unknown soa",
        "trojan",
        "virtool",
        "ipv4 add",
        "hostname",
        "set cookie",
        "accept",
        "dispatcher",
        "ref b",
        "wed may",
        "backdoor",
        "mtb aug",
        "mtb dec",
        "twitter",
        "smoke loader",
        "malware",
        "hacktool",
        "mtb feb",
        "aaaa",
        "cname"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 562,
        "hostname": 1988,
        "URL": 7800,
        "FileHash-SHA256": 657,
        "email": 5,
        "FileHash-MD5": 150,
        "FileHash-SHA1": 127
      },
      "indicator_count": 11289,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "216 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d5115ad786de4ff048e5b",
      "name": "TEL:ECCert!SSLCO | Mirai Malware Hosting | Multi user Tracker",
      "description": "https://api.mirai.com/MiraiWebService/passbook/180823-77257/4001645 [Malware hosting]\n*TEL:ECCert!SSLCO\nYARA Detections:\nDelphi\nThis program must be run under Win32\ncompilers.\nCode Overlap of Trojan Droppers Backdoors , TrojanSpy\n\n\n#injection_inter_process\n#creates_largekey\n#network_bind\n#ransomware_file_modifications\n#antivm_generic_bios\n#antivm_generic_disk\n#enumerates_physical_drives\n#physical_drive_access\n#deletes_executed_files\n#recon_fingerprint\n#suspicious_command_tools\n#anomalous_deletefile\n#antisandbox_sleep\n#dead_connect\n#dynamic_function_loading\n#http_request\n#ipc_namedpipe\n#network_anomaly\n#powershell_download\n#powershell_request #track #locate #remote_access",
      "modified": "2025-09-13T02:00:42.729000",
      "created": "2025-08-14T02:59:33.036000",
      "tags": [
        "url https",
        "url http",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "entries",
        "present sep",
        "united",
        "present aug",
        "present jul",
        "present jun",
        "moved",
        "unknown ns",
        "present may",
        "present apr",
        "passive dns",
        "date",
        "encrypt",
        "body",
        "cookie",
        "gmt server",
        "content type",
        "dynamicloader",
        "medium",
        "x17x03x01",
        "download studio",
        "high",
        "read c",
        "show",
        "windows",
        "copy",
        "powershell",
        "write",
        "anomaly",
        "next",
        "unknown",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "yara detections",
        "delphi",
        "codeoverlap",
        "win32",
        "rgba",
        "memcommit",
        "delete",
        "png image",
        "hash",
        "dock",
        "execution",
        "malware",
        "wine emulator",
        "dynamic",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "capture",
        "persistence",
        "sha256",
        "submitted",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "script",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "august",
        "span",
        "refresh",
        "meta",
        "mirai",
        "february",
        "april",
        "june",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "caribe",
        "rest",
        "accept",
        "friday",
        "look",
        "verify",
        "restart"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6211,
        "domain": 682,
        "hostname": 1661,
        "FileHash-MD5": 117,
        "FileHash-SHA1": 100,
        "FileHash-SHA256": 1386,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 10162,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d14258dd07e26a3bb1d46",
      "name": "PalantirFoundry.com (?) Multiple Remote Controlled Devices",
      "description": "Hacking.\nI\u2019m not sure if this is masquerading or not yet. Anything with \u2018PalantirFoundry.com\u2019 redirects to actual Palanrir login. Multiple users. Potentially 5000+ devices included in pulse. All monitored targets.",
      "modified": "2025-09-12T22:00:43.252000",
      "created": "2025-08-13T22:39:33.511000",
      "tags": [
        "passive dns",
        "urls",
        "files",
        "ip address",
        "asn as16509",
        "less whois",
        "registrar",
        "unknown related",
        "servers",
        "status",
        "hostname",
        "domain",
        "files ip",
        "address",
        "united",
        "unknown ns",
        "a domains",
        "search",
        "script urls",
        "authority",
        "record value",
        "service",
        "mirai",
        "cloud provider",
        "reverse dns",
        "sydney",
        "australia asn",
        "as16509",
        "dns resolutions",
        "related tags",
        "none indicator",
        "write c",
        "mozilla",
        "nsisinetc",
        "show",
        "medium",
        "entries",
        "high",
        "http",
        "delete",
        "write",
        "malware",
        "data upload",
        "ms windows",
        "intel",
        "pe32",
        "lowfi",
        "next",
        "showing",
        "present feb",
        "present jun",
        "present dec",
        "present aug",
        "present may",
        "present jul",
        "moved",
        "media",
        "segoe ui",
        "ipv4",
        "url analysis",
        "location united",
        "error",
        "regopenkeyexa",
        "regsetvalueexa",
        "read c",
        "port",
        "destination",
        "regdword",
        "windows nt",
        "hostile",
        "win32",
        "unknown",
        "delphi",
        "persistence",
        "execution",
        "extraction",
        "l data",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "sha1",
        "sha256",
        "ascii text",
        "mitre att",
        "pattern match",
        "show technique",
        "null",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "type",
        "please",
        "pulse submit",
        "url add",
        "pulse pulses",
        "related nids",
        "files location",
        "flag united",
        "ddos",
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "virtool",
        "downloader",
        "dadobra",
        "date",
        "certificate",
        "montreal",
        "canada",
        "asn16509",
        "amazon02",
        "screenshot",
        "title login",
        "palantir",
        "page url",
        "history https",
        "evasion att",
        "remember",
        "label",
        "button",
        "form",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "software envoy",
        "value",
        "domainpath name",
        "header value",
        "self",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "returnur",
        "south korea",
        "as9318 sk",
        "sqlite rollback",
        "journal",
        "as701 verizon",
        "bittorrent dht",
        "win64",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFi:LinkularNSIS",
          "display_name": "#LowFi:LinkularNSIS",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
          "display_name": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
          "target": null
        },
        {
          "id": "Fareit",
          "display_name": "Fareit",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Dadobra.E",
          "display_name": "TrojanDownloader:Win32/Dadobra.E",
          "target": "/malware/TrojanDownloader:Win32/Dadobra.E"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 3149,
        "domain": 1304,
        "URL": 5269,
        "FileHash-SHA256": 968,
        "FileHash-SHA1": 206,
        "email": 7,
        "FileHash-MD5": 274,
        "SSLCertFingerprint": 1,
        "CVE": 1
      },
      "indicator_count": 11179,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://i.crdvivaimg.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://i.crdvivaimg.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776628141.2276144
}