{
  "type": "URL",
  "indicator": "https://imagery.antsle.us",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://imagery.antsle.us",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4145922301,
      "indicator": "https://imagery.antsle.us",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "6967bc8b26b69d4dc2604a13",
          "name": "Telegram@V2ray_Alpha/ | Mirai | ExhoBot CNC | EtT",
          "description": "Inbound Outbound connections. Tel et error. Hacking activity affecting various forms of connectivity via telecom. Possibly  a controls\n computer vehicle connects to. Related? I was researching increased malicious activity aimed against a target. An associate close to target reported (mid research) Vehicle reported \u2018no longer being able to communicate. Module 5 has an error. Please contact customer service). Targets car was powered oof. No Bluetooth connection.  No reports. Audio off. No phone message, connection or dial. This is targets experience not mowing what I was researching.",
          "modified": "2026-02-13T15:04:30.631000",
          "created": "2026-01-14T15:55:55.693000",
          "tags": [
            "v2rayalpha",
            "united",
            "unknown ns",
            "unknown aaaa",
            "domain add",
            "urls",
            "files",
            "domain",
            "github",
            "file format",
            "jkvpn",
            "jointelegram",
            "farahvpn vless",
            "post",
            "universal",
            "scribd",
            "typews",
            "telegram",
            "rdap",
            "handle",
            "iana registrar",
            "roles",
            "dnssec",
            "aaaa",
            "ttl value",
            "rdap database",
            "links",
            "backdoor",
            "antigua",
            "virgin islands",
            "status",
            "org domains",
            "proxy",
            "ip address",
            "barbuda unknown",
            "passive dns",
            "ipv4 add",
            "twitter",
            "dynamicloader",
            "port",
            "delete c",
            "destination",
            "high",
            "windows",
            "medium",
            "displayname",
            "write",
            "tofsee",
            "stream",
            "malware",
            "push",
            "next",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "spawns",
            "ck techniques",
            "evasion att",
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "href",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "search",
            "moved",
            "record value",
            "servers",
            "title",
            "encrypt",
            "canada unknown",
            "gmt content",
            "reverse dns",
            "location canada",
            "canada asn",
            "accept",
            "cookie",
            "dll read",
            "function read",
            "wscriptshell",
            "shortcut",
            "guard",
            "error",
            "present jan",
            "name servers",
            "registrar url",
            "hong kong",
            "invalid url",
            "url analysis",
            "location hong",
            "kong flag",
            "msie",
            "chrome",
            "type",
            "media type",
            "certificate",
            "hostname add",
            "present nov",
            "present sep",
            "present oct",
            "expiration date",
            "present dec",
            "script urls",
            "a domains",
            "present mar",
            "present feb",
            "meta",
            "show",
            "read c",
            "entries",
            "read",
            "intel",
            "ms windows",
            "delete",
            "please",
            "artemis",
            "virustotal",
            "trojan",
            "mcafee",
            "drweb",
            "vipre",
            "panda",
            "write c",
            "total",
            "next associated",
            "thursday",
            "gmt cache",
            "ipv4",
            "form",
            "date",
            "mirai",
            "telnet login",
            "south korea",
            "bad login",
            "as4766 korea",
            "taiwan as3462",
            "china as45090",
            "telnet root",
            "cve201717215",
            "execution",
            "copy",
            "contacted",
            "mtb ids",
            "dns query",
            "variant cnc",
            "domain huawei",
            "remote command",
            "huawei remote",
            "echobot",
            "linux mirai",
            "monitoring",
            "cnc"
          ],
          "references": [
            "https://pamchall.com/Telegram@V2ray_Alpha/",
            "Domain: t.me \u2022 Email: 1047f946-a6da-45dd-fa53-e00edb48e367@www.speedtest.net",
            "https://t.me/",
            "Win32/Tofsee.AX google.com connectivity check",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
            "Yara Detections: Cabinet_Archive ,  SFX_CAB",
            "ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile",
            "Antivirus Detections: ELF:Mirai-AAL\\ [Trj] ,  Unix.Trojan.Mirai-1 ,  Backdoor:Linux/Mirai.N!MTB",
            "IDS Detections: Observed DNS Query to ELF/Various Mirai Variant CnC Domain Huawei Remote Command Execution (CVE-2017-17215)",
            "Huawei Remote Command Execution - Outbound (CVE-2017-17215)",
            "Huawei HG532 RCE Vulnerability (CVE-2017-17215)",
            "DYNAMIC_DNS Query to *.duckdns. Domain",
            "SUSPICIOUS Path to BusyBox HiSilicon DVR - Default",
            "Telnet Root Password Inbound TELNET login failed root login Bad Login Less",
            "Yara Detections Mirai_Botnet_Malware ,  Mirai_2 ,  is__elf ,  Linux_Mirai ,  ECHOBOT",
            "dead_host network_icmp tcp_syn_scan nolookup_communication networkdyndns_checkip writes_to_stdout",
            "IP\u2019s Contacted:  1.0.21.231  1.0.42.181  1.1.116.28  1.10.203.28  1.10.54.62  1.101.0.202",
            "IP\u2019s Contacted:  1.101.184.254  1.103.104.9  1.103.141.89  1.104.104.227",
            "Contacted: newmethcnc.duckdns.org",
            "https://otx.alienvault.com/indicator/file/3215b2d1c44c7114c7f94af1bbcb858707b636baeae2c6752219fdf184c7b00e",
            "https://eurotarget.com/it/auto/toyota/c-hr/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Malware.Reline-9887776-0",
              "display_name": "Win.Malware.Reline-9887776-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.N!MTB",
              "display_name": "Backdoor:Linux/Mirai.N!MTB",
              "target": "/malware/Backdoor:Linux/Mirai.N!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1399",
              "name": "Modify Trusted Execution Environment",
              "display_name": "T1399 - Modify Trusted Execution Environment"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1011.001",
              "name": "Exfiltration Over Bluetooth",
              "display_name": "T1011.001 - Exfiltration Over Bluetooth"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            }
          ],
          "industries": [
            "Telecom"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6227,
            "domain": 1437,
            "hostname": 2331,
            "email": 8,
            "FileHash-SHA256": 3252,
            "FileHash-MD5": 465,
            "FileHash-SHA1": 457,
            "CIDR": 1,
            "CVE": 3
          },
          "indicator_count": 14181,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "65 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "692e1b4122a419384f1add7f",
          "name": "Cutwail Trojan DownLoader | Driveby compromises | Redirect",
          "description": "Cutwail Trojan DownLoader | Driveby comprises | Malicious Redirects.\n\nSuspicious redirects from Google homepage to \u2018Doodle\u2019s\nHeavy , ongoing cyber attack. Affects, iOS, Android, Cellular networks (global)\n\nI\u2019m hoping OTX will fully pulse. Indicators will be pulsed fully relying on OTX auto\npulse alone. No references or input from me.",
          "modified": "2025-12-31T22:02:44.679000",
          "created": "2025-12-01T22:48:33.510000",
          "tags": [
            "filehashmd5",
            "filehashsha256",
            "sha256",
            "filehashsha1",
            "indicator role",
            "title added",
            "active related",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "dynamicloader",
            "medium",
            "show",
            "entries",
            "dynamic",
            "pe section",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "copy",
            "write",
            "flag",
            "misc activity",
            "et info",
            "cloudflare dns",
            "over https",
            "windir",
            "openurl c",
            "prefetch2",
            "dns requests",
            "domain address",
            "google homepage",
            "html",
            "binary file",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "matched",
            "redirect",
            "t1189",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "found",
            "ck techniques",
            "alert",
            "potential ip",
            "general",
            "click",
            "united",
            "analysis tip",
            "analysis",
            "tor analysis",
            "date",
            "c pe",
            "data upload",
            "extraction",
            "iocs",
            "manually add",
            "network traffic",
            "detected",
            "t1566",
            "submitted url",
            "t1204"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 95,
            "FileHash-SHA1": 95,
            "FileHash-SHA256": 183,
            "hostname": 227,
            "domain": 83,
            "URL": 575
          },
          "indicator_count": 1258,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "108 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "690af480b45560b4ae78a863",
          "name": "Mirai \u2022 Cycbot - Who is Dennis Schroeder (303) 444-4444 | Social Engineering ~ Legal",
          "description": "Mirai \u2022\nCycBot. Hackers connected\nto targets phone intercepting calls. |\nHi Dennis, how the heck are you? Who are you? We connected targets former phone to a lawyer to become familiar with botnet experience. Time spent speaking to several fraudulent people who pretend to be people they are not. \n\nFrom our side: A factual account was given to a professional sounding female phone actor who answered call without giving name of law firm or her own name / title , listened for some time , few screening questions, no one in \u2018 law firm\u2019 didn\u2019t know statutes of limitations.\n\nSad there was never a way for  target to contact find legitimate legal representation due to being in multiple botnets. \n Very disturbing. \n\n#colorado_government",
          "modified": "2025-12-05T06:05:48.164000",
          "created": "2025-11-05T06:53:52.767000",
          "tags": [
            "url https",
            "url http",
            "related pulses",
            "united",
            "redacted for",
            "meta",
            "accept encoding",
            "moved",
            "ip address",
            "record value",
            "encrypt",
            "backdoor",
            "trojandropper",
            "passive dns",
            "mtb oct",
            "ipv4 add",
            "urls",
            "twitter",
            "trojan",
            "cycbot",
            "dynamicloader",
            "medium",
            "ms windows",
            "write",
            "yara rule",
            "named pipe",
            "pe32",
            "defender",
            "install",
            "smartassembly",
            "malware",
            "local",
            "dns query",
            "xxx adult",
            "site top",
            "level domain",
            "total",
            "whitelisted",
            "yara detections",
            "dyndns domain",
            "filehash",
            "av detections",
            "ids detections",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "acceptencoding",
            "as46606",
            "xserver",
            "killer gecko",
            "host",
            "hello2malware",
            "cnlocalhost",
            "dclocal",
            "guard",
            "url analysis",
            "files",
            "reverse dns",
            "azerbaijan asn",
            "asnone related",
            "destination",
            "port",
            "unknown",
            "et smtp",
            "message",
            "united kingdom",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "found",
            "newremotehost",
            "newexternalport",
            "newprotocol",
            "newinternalport",
            "helloworld",
            "nids",
            "high",
            "ddos",
            "hstr",
            "mtb nov",
            "ransom",
            "msie",
            "chrome",
            "gmt content",
            "hostname add",
            "present jun",
            "germany unknown",
            "domain add",
            "asn as24940",
            "germany asn",
            "domain",
            "files ip",
            "address",
            "less",
            "script urls",
            "dennis schrder",
            "a domains",
            "prox",
            "aaaa",
            "present nov",
            "blog von",
            "apache",
            "dennis schroder",
            "servers",
            "emails",
            "dnssec",
            "as197540",
            "dns resolutions",
            "hostname",
            "verdict",
            "present",
            "directui",
            "element",
            "classinfobase",
            "write c",
            "getclassinfoptr",
            "sgpauiclassinfo",
            "file v2",
            "document",
            "explorer",
            "movie",
            "insert",
            "mitre att",
            "ck matrix",
            "path",
            "hybrid",
            "general",
            "iframe",
            "click",
            "strings",
            "forbidden",
            "default",
            "pdf library",
            "delete c",
            "https domain",
            "tls sni",
            "steals",
            "format",
            "for privacy",
            "name servers",
            "date",
            "japan unknown",
            "entries",
            "next associated",
            "gmt etag",
            "pragma",
            "body",
            "accept",
            "script domains",
            "gmt cache",
            "certificate",
            "alerts",
            "analysis date",
            "file score",
            "present sep",
            "iemobile",
            "ok accept",
            "mirai",
            "cdn.calltrk.com",
            "type indicator"
          ],
          "references": [
            "Redirect from actual firm called - https://coloradoinjurylaw.com/denver-sexual-abuse-lawyer/",
            "leg.colorado.gov \u2022\tmaps.app.goo.gl",
            "https://leg.colorado.gov/bills/hb20 ?",
            "https://mirai-nameko.jp/assets/delighters-js.php",
            "Government porn: https://thehotporn.info/ \u2022 http://live-sex.space/ \u2022 charoenpornintergroup.com",
            "https://fr.bongacams10.com/erikasexy1 \u2022  https://www.bigcitycreations.com/s/stories/a-unisex-guide-to-pairing-colors",
            "colorado.gov"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Japan",
            "Italy",
            "Aruba",
            "Finland",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "Australia",
            "Hong Kong",
            "Hungary",
            "Switzerland",
            "China",
            "France",
            "T\u00fcrkiye",
            "Canada",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "Trojan:Win32/Predator.PVD!MTB",
              "display_name": "Trojan:Win32/Predator.PVD!MTB",
              "target": "/malware/Trojan:Win32/Predator.PVD!MTB"
            },
            {
              "id": "Trojandropper:Win32/Cutwail.gen!K",
              "display_name": "Trojandropper:Win32/Cutwail.gen!K",
              "target": "/malware/Trojandropper:Win32/Cutwail.gen!K"
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7782,
            "domain": 5008,
            "hostname": 2287,
            "FileHash-SHA1": 318,
            "email": 7,
            "FileHash-SHA256": 1608,
            "FileHash-MD5": 356,
            "SSLCertFingerprint": 11,
            "CVE": 1
          },
          "indicator_count": 17378,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "135 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "690af483e0e2ee05752043cd",
          "name": "Mirai \u2022 Cycbot - Who is Dennis Schroeder (303) 444-4444 | Social Engineering ~ Legal",
          "description": "Mirai \u2022\nCycBot. Hackers connected\nto targets phone intercepting calls. |\nHi Dennis, how the heck are you? Who are you? We connected targets former phone to a lawyer to become familiar with botnet experience. Time spent speaking to several fraudulent people who pretend to be people they are not. \n\nFrom our side: A factual account was given to a professional sounding female phone actor who answered call without giving name of law firm or her own name / title , listened for some time , few screening questions, no one in \u2018 law firm\u2019 didn\u2019t know statutes of limitations.\n\nSad there was never a way for  target to contact find legitimate legal representation due to being in multiple botnets. \n Very disturbing. \n\n#colorado_government",
          "modified": "2025-12-05T06:05:48.164000",
          "created": "2025-11-05T06:53:55.844000",
          "tags": [
            "url https",
            "url http",
            "related pulses",
            "united",
            "redacted for",
            "meta",
            "accept encoding",
            "moved",
            "ip address",
            "record value",
            "encrypt",
            "backdoor",
            "trojandropper",
            "passive dns",
            "mtb oct",
            "ipv4 add",
            "urls",
            "twitter",
            "trojan",
            "cycbot",
            "dynamicloader",
            "medium",
            "ms windows",
            "write",
            "yara rule",
            "named pipe",
            "pe32",
            "defender",
            "install",
            "smartassembly",
            "malware",
            "local",
            "dns query",
            "xxx adult",
            "site top",
            "level domain",
            "total",
            "whitelisted",
            "yara detections",
            "dyndns domain",
            "filehash",
            "av detections",
            "ids detections",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "acceptencoding",
            "as46606",
            "xserver",
            "killer gecko",
            "host",
            "hello2malware",
            "cnlocalhost",
            "dclocal",
            "guard",
            "url analysis",
            "files",
            "reverse dns",
            "azerbaijan asn",
            "asnone related",
            "destination",
            "port",
            "unknown",
            "et smtp",
            "message",
            "united kingdom",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "found",
            "newremotehost",
            "newexternalport",
            "newprotocol",
            "newinternalport",
            "helloworld",
            "nids",
            "high",
            "ddos",
            "hstr",
            "mtb nov",
            "ransom",
            "msie",
            "chrome",
            "gmt content",
            "hostname add",
            "present jun",
            "germany unknown",
            "domain add",
            "asn as24940",
            "germany asn",
            "domain",
            "files ip",
            "address",
            "less",
            "script urls",
            "dennis schrder",
            "a domains",
            "prox",
            "aaaa",
            "present nov",
            "blog von",
            "apache",
            "dennis schroder",
            "servers",
            "emails",
            "dnssec",
            "as197540",
            "dns resolutions",
            "hostname",
            "verdict",
            "present",
            "directui",
            "element",
            "classinfobase",
            "write c",
            "getclassinfoptr",
            "sgpauiclassinfo",
            "file v2",
            "document",
            "explorer",
            "movie",
            "insert",
            "mitre att",
            "ck matrix",
            "path",
            "hybrid",
            "general",
            "iframe",
            "click",
            "strings",
            "forbidden",
            "default",
            "pdf library",
            "delete c",
            "https domain",
            "tls sni",
            "steals",
            "format",
            "for privacy",
            "name servers",
            "date",
            "japan unknown",
            "entries",
            "next associated",
            "gmt etag",
            "pragma",
            "body",
            "accept",
            "script domains",
            "gmt cache",
            "certificate",
            "alerts",
            "analysis date",
            "file score",
            "present sep",
            "iemobile",
            "ok accept",
            "mirai",
            "cdn.calltrk.com",
            "type indicator"
          ],
          "references": [
            "Redirect from actual firm called - https://coloradoinjurylaw.com/denver-sexual-abuse-lawyer/",
            "leg.colorado.gov \u2022\tmaps.app.goo.gl",
            "https://leg.colorado.gov/bills/hb20 ?",
            "https://mirai-nameko.jp/assets/delighters-js.php",
            "Government porn: https://thehotporn.info/ \u2022 http://live-sex.space/ \u2022 charoenpornintergroup.com",
            "https://fr.bongacams10.com/erikasexy1 \u2022  https://www.bigcitycreations.com/s/stories/a-unisex-guide-to-pairing-colors",
            "colorado.gov"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Japan",
            "Italy",
            "Aruba",
            "Finland",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "Australia",
            "Hong Kong",
            "Hungary",
            "Switzerland",
            "China",
            "France",
            "T\u00fcrkiye",
            "Canada",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Cycbot",
              "display_name": "Cycbot",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot.Aa!MTB",
              "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
              "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
            },
            {
              "id": "ALF:NID:Susp_NSIS_Stub.A",
              "display_name": "ALF:NID:Susp_NSIS_Stub.A",
              "target": null
            },
            {
              "id": "Trojan:Win32/Predator.PVD!MTB",
              "display_name": "Trojan:Win32/Predator.PVD!MTB",
              "target": "/malware/Trojan:Win32/Predator.PVD!MTB"
            },
            {
              "id": "Trojandropper:Win32/Cutwail.gen!K",
              "display_name": "Trojandropper:Win32/Cutwail.gen!K",
              "target": "/malware/Trojandropper:Win32/Cutwail.gen!K"
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Legal",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7782,
            "domain": 5008,
            "hostname": 2287,
            "FileHash-SHA1": 318,
            "email": 7,
            "FileHash-SHA256": 1608,
            "FileHash-MD5": 356,
            "SSLCertFingerprint": 11,
            "CVE": 1
          },
          "indicator_count": 17378,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "135 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Yara Detections Mirai_Botnet_Malware ,  Mirai_2 ,  is__elf ,  Linux_Mirai ,  ECHOBOT",
        "Contacted: newmethcnc.duckdns.org",
        "SUSPICIOUS Path to BusyBox HiSilicon DVR - Default",
        "Telnet Root Password Inbound TELNET login failed root login Bad Login Less",
        "https://leg.colorado.gov/bills/hb20 ?",
        "Domain: t.me \u2022 Email: 1047f946-a6da-45dd-fa53-e00edb48e367@www.speedtest.net",
        "https://pamchall.com/Telegram@V2ray_Alpha/",
        "https://fr.bongacams10.com/erikasexy1 \u2022  https://www.bigcitycreations.com/s/stories/a-unisex-guide-to-pairing-colors",
        "DYNAMIC_DNS Query to *.duckdns. Domain",
        "IP\u2019s Contacted:  1.0.21.231  1.0.42.181  1.1.116.28  1.10.203.28  1.10.54.62  1.101.0.202",
        "IP\u2019s Contacted:  1.101.184.254  1.103.104.9  1.103.141.89  1.104.104.227",
        "Yara Detections: Cabinet_Archive ,  SFX_CAB",
        "colorado.gov",
        "Huawei Remote Command Execution - Outbound (CVE-2017-17215)",
        "https://otx.alienvault.com/indicator/file/3215b2d1c44c7114c7f94af1bbcb858707b636baeae2c6752219fdf184c7b00e",
        "Government porn: https://thehotporn.info/ \u2022 http://live-sex.space/ \u2022 charoenpornintergroup.com",
        "https://mirai-nameko.jp/assets/delighters-js.php",
        "https://t.me/",
        "Win32/Tofsee.AX google.com connectivity check",
        "ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile",
        "dead_host network_icmp tcp_syn_scan nolookup_communication networkdyndns_checkip writes_to_stdout",
        "leg.colorado.gov \u2022\tmaps.app.goo.gl",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
        "Huawei HG532 RCE Vulnerability (CVE-2017-17215)",
        "Redirect from actual firm called - https://coloradoinjurylaw.com/denver-sexual-abuse-lawyer/",
        "https://eurotarget.com/it/auto/toyota/c-hr/",
        "IDS Detections: Observed DNS Query to ELF/Various Mirai Variant CnC Domain Huawei Remote Command Execution (CVE-2017-17215)",
        "Antivirus Detections: ELF:Mirai-AAL\\ [Trj] ,  Unix.Trojan.Mirai-1 ,  Backdoor:Linux/Mirai.N!MTB"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Backdoor:linux/demonbot.aa!mtb",
            "Mirai (elf)",
            "Trojandropper:win32/cutwail.gen!k",
            "Nids",
            "Win.malware.reline-9887776-0",
            "Trojan:win32/predator.pvd!mtb",
            "Mirai",
            "#lowfi:suspicioussectionname",
            "Backdoor:win32/tofsee.t",
            "Backdoor:linux/mirai.n!mtb",
            "Alf:nid:susp_nsis_stub.a",
            "Cycbot"
          ],
          "industries": [
            "Legal",
            "Telecom",
            "Technology",
            "Government"
          ],
          "unique_indicators": 36166
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/antsle.us",
    "whois": "http://whois.domaintools.com/antsle.us",
    "domain": "antsle.us",
    "hostname": "imagery.antsle.us"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "6967bc8b26b69d4dc2604a13",
      "name": "Telegram@V2ray_Alpha/ | Mirai | ExhoBot CNC | EtT",
      "description": "Inbound Outbound connections. Tel et error. Hacking activity affecting various forms of connectivity via telecom. Possibly  a controls\n computer vehicle connects to. Related? I was researching increased malicious activity aimed against a target. An associate close to target reported (mid research) Vehicle reported \u2018no longer being able to communicate. Module 5 has an error. Please contact customer service). Targets car was powered oof. No Bluetooth connection.  No reports. Audio off. No phone message, connection or dial. This is targets experience not mowing what I was researching.",
      "modified": "2026-02-13T15:04:30.631000",
      "created": "2026-01-14T15:55:55.693000",
      "tags": [
        "v2rayalpha",
        "united",
        "unknown ns",
        "unknown aaaa",
        "domain add",
        "urls",
        "files",
        "domain",
        "github",
        "file format",
        "jkvpn",
        "jointelegram",
        "farahvpn vless",
        "post",
        "universal",
        "scribd",
        "typews",
        "telegram",
        "rdap",
        "handle",
        "iana registrar",
        "roles",
        "dnssec",
        "aaaa",
        "ttl value",
        "rdap database",
        "links",
        "backdoor",
        "antigua",
        "virgin islands",
        "status",
        "org domains",
        "proxy",
        "ip address",
        "barbuda unknown",
        "passive dns",
        "ipv4 add",
        "twitter",
        "dynamicloader",
        "port",
        "delete c",
        "destination",
        "high",
        "windows",
        "medium",
        "displayname",
        "write",
        "tofsee",
        "stream",
        "malware",
        "push",
        "next",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "spawns",
        "ck techniques",
        "evasion att",
        "sha256",
        "sha1",
        "pattern match",
        "ascii text",
        "href",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "search",
        "moved",
        "record value",
        "servers",
        "title",
        "encrypt",
        "canada unknown",
        "gmt content",
        "reverse dns",
        "location canada",
        "canada asn",
        "accept",
        "cookie",
        "dll read",
        "function read",
        "wscriptshell",
        "shortcut",
        "guard",
        "error",
        "present jan",
        "name servers",
        "registrar url",
        "hong kong",
        "invalid url",
        "url analysis",
        "location hong",
        "kong flag",
        "msie",
        "chrome",
        "type",
        "media type",
        "certificate",
        "hostname add",
        "present nov",
        "present sep",
        "present oct",
        "expiration date",
        "present dec",
        "script urls",
        "a domains",
        "present mar",
        "present feb",
        "meta",
        "show",
        "read c",
        "entries",
        "read",
        "intel",
        "ms windows",
        "delete",
        "please",
        "artemis",
        "virustotal",
        "trojan",
        "mcafee",
        "drweb",
        "vipre",
        "panda",
        "write c",
        "total",
        "next associated",
        "thursday",
        "gmt cache",
        "ipv4",
        "form",
        "date",
        "mirai",
        "telnet login",
        "south korea",
        "bad login",
        "as4766 korea",
        "taiwan as3462",
        "china as45090",
        "telnet root",
        "cve201717215",
        "execution",
        "copy",
        "contacted",
        "mtb ids",
        "dns query",
        "variant cnc",
        "domain huawei",
        "remote command",
        "huawei remote",
        "echobot",
        "linux mirai",
        "monitoring",
        "cnc"
      ],
      "references": [
        "https://pamchall.com/Telegram@V2ray_Alpha/",
        "Domain: t.me \u2022 Email: 1047f946-a6da-45dd-fa53-e00edb48e367@www.speedtest.net",
        "https://t.me/",
        "Win32/Tofsee.AX google.com connectivity check",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
        "Yara Detections: Cabinet_Archive ,  SFX_CAB",
        "ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile",
        "Antivirus Detections: ELF:Mirai-AAL\\ [Trj] ,  Unix.Trojan.Mirai-1 ,  Backdoor:Linux/Mirai.N!MTB",
        "IDS Detections: Observed DNS Query to ELF/Various Mirai Variant CnC Domain Huawei Remote Command Execution (CVE-2017-17215)",
        "Huawei Remote Command Execution - Outbound (CVE-2017-17215)",
        "Huawei HG532 RCE Vulnerability (CVE-2017-17215)",
        "DYNAMIC_DNS Query to *.duckdns. Domain",
        "SUSPICIOUS Path to BusyBox HiSilicon DVR - Default",
        "Telnet Root Password Inbound TELNET login failed root login Bad Login Less",
        "Yara Detections Mirai_Botnet_Malware ,  Mirai_2 ,  is__elf ,  Linux_Mirai ,  ECHOBOT",
        "dead_host network_icmp tcp_syn_scan nolookup_communication networkdyndns_checkip writes_to_stdout",
        "IP\u2019s Contacted:  1.0.21.231  1.0.42.181  1.1.116.28  1.10.203.28  1.10.54.62  1.101.0.202",
        "IP\u2019s Contacted:  1.101.184.254  1.103.104.9  1.103.141.89  1.104.104.227",
        "Contacted: newmethcnc.duckdns.org",
        "https://otx.alienvault.com/indicator/file/3215b2d1c44c7114c7f94af1bbcb858707b636baeae2c6752219fdf184c7b00e",
        "https://eurotarget.com/it/auto/toyota/c-hr/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Malware.Reline-9887776-0",
          "display_name": "Win.Malware.Reline-9887776-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.N!MTB",
          "display_name": "Backdoor:Linux/Mirai.N!MTB",
          "target": "/malware/Backdoor:Linux/Mirai.N!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1399",
          "name": "Modify Trusted Execution Environment",
          "display_name": "T1399 - Modify Trusted Execution Environment"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1011.001",
          "name": "Exfiltration Over Bluetooth",
          "display_name": "T1011.001 - Exfiltration Over Bluetooth"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0029",
          "name": "Privilege Escalation",
          "display_name": "TA0029 - Privilege Escalation"
        }
      ],
      "industries": [
        "Telecom"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6227,
        "domain": 1437,
        "hostname": 2331,
        "email": 8,
        "FileHash-SHA256": 3252,
        "FileHash-MD5": 465,
        "FileHash-SHA1": 457,
        "CIDR": 1,
        "CVE": 3
      },
      "indicator_count": 14181,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "65 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "692e1b4122a419384f1add7f",
      "name": "Cutwail Trojan DownLoader | Driveby compromises | Redirect",
      "description": "Cutwail Trojan DownLoader | Driveby comprises | Malicious Redirects.\n\nSuspicious redirects from Google homepage to \u2018Doodle\u2019s\nHeavy , ongoing cyber attack. Affects, iOS, Android, Cellular networks (global)\n\nI\u2019m hoping OTX will fully pulse. Indicators will be pulsed fully relying on OTX auto\npulse alone. No references or input from me.",
      "modified": "2025-12-31T22:02:44.679000",
      "created": "2025-12-01T22:48:33.510000",
      "tags": [
        "filehashmd5",
        "filehashsha256",
        "sha256",
        "filehashsha1",
        "indicator role",
        "title added",
        "active related",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "dynamicloader",
        "medium",
        "show",
        "entries",
        "dynamic",
        "pe section",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "copy",
        "write",
        "flag",
        "misc activity",
        "et info",
        "cloudflare dns",
        "over https",
        "windir",
        "openurl c",
        "prefetch2",
        "dns requests",
        "domain address",
        "google homepage",
        "html",
        "binary file",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "matched",
        "redirect",
        "t1189",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "found",
        "ck techniques",
        "alert",
        "potential ip",
        "general",
        "click",
        "united",
        "analysis tip",
        "analysis",
        "tor analysis",
        "date",
        "c pe",
        "data upload",
        "extraction",
        "iocs",
        "manually add",
        "network traffic",
        "detected",
        "t1566",
        "submitted url",
        "t1204"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 95,
        "FileHash-SHA1": 95,
        "FileHash-SHA256": 183,
        "hostname": 227,
        "domain": 83,
        "URL": 575
      },
      "indicator_count": 1258,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "108 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "690af480b45560b4ae78a863",
      "name": "Mirai \u2022 Cycbot - Who is Dennis Schroeder (303) 444-4444 | Social Engineering ~ Legal",
      "description": "Mirai \u2022\nCycBot. Hackers connected\nto targets phone intercepting calls. |\nHi Dennis, how the heck are you? Who are you? We connected targets former phone to a lawyer to become familiar with botnet experience. Time spent speaking to several fraudulent people who pretend to be people they are not. \n\nFrom our side: A factual account was given to a professional sounding female phone actor who answered call without giving name of law firm or her own name / title , listened for some time , few screening questions, no one in \u2018 law firm\u2019 didn\u2019t know statutes of limitations.\n\nSad there was never a way for  target to contact find legitimate legal representation due to being in multiple botnets. \n Very disturbing. \n\n#colorado_government",
      "modified": "2025-12-05T06:05:48.164000",
      "created": "2025-11-05T06:53:52.767000",
      "tags": [
        "url https",
        "url http",
        "related pulses",
        "united",
        "redacted for",
        "meta",
        "accept encoding",
        "moved",
        "ip address",
        "record value",
        "encrypt",
        "backdoor",
        "trojandropper",
        "passive dns",
        "mtb oct",
        "ipv4 add",
        "urls",
        "twitter",
        "trojan",
        "cycbot",
        "dynamicloader",
        "medium",
        "ms windows",
        "write",
        "yara rule",
        "named pipe",
        "pe32",
        "defender",
        "install",
        "smartassembly",
        "malware",
        "local",
        "dns query",
        "xxx adult",
        "site top",
        "level domain",
        "total",
        "whitelisted",
        "yara detections",
        "dyndns domain",
        "filehash",
        "av detections",
        "ids detections",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "acceptencoding",
        "as46606",
        "xserver",
        "killer gecko",
        "host",
        "hello2malware",
        "cnlocalhost",
        "dclocal",
        "guard",
        "url analysis",
        "files",
        "reverse dns",
        "azerbaijan asn",
        "asnone related",
        "destination",
        "port",
        "unknown",
        "et smtp",
        "message",
        "united kingdom",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "found",
        "newremotehost",
        "newexternalport",
        "newprotocol",
        "newinternalport",
        "helloworld",
        "nids",
        "high",
        "ddos",
        "hstr",
        "mtb nov",
        "ransom",
        "msie",
        "chrome",
        "gmt content",
        "hostname add",
        "present jun",
        "germany unknown",
        "domain add",
        "asn as24940",
        "germany asn",
        "domain",
        "files ip",
        "address",
        "less",
        "script urls",
        "dennis schrder",
        "a domains",
        "prox",
        "aaaa",
        "present nov",
        "blog von",
        "apache",
        "dennis schroder",
        "servers",
        "emails",
        "dnssec",
        "as197540",
        "dns resolutions",
        "hostname",
        "verdict",
        "present",
        "directui",
        "element",
        "classinfobase",
        "write c",
        "getclassinfoptr",
        "sgpauiclassinfo",
        "file v2",
        "document",
        "explorer",
        "movie",
        "insert",
        "mitre att",
        "ck matrix",
        "path",
        "hybrid",
        "general",
        "iframe",
        "click",
        "strings",
        "forbidden",
        "default",
        "pdf library",
        "delete c",
        "https domain",
        "tls sni",
        "steals",
        "format",
        "for privacy",
        "name servers",
        "date",
        "japan unknown",
        "entries",
        "next associated",
        "gmt etag",
        "pragma",
        "body",
        "accept",
        "script domains",
        "gmt cache",
        "certificate",
        "alerts",
        "analysis date",
        "file score",
        "present sep",
        "iemobile",
        "ok accept",
        "mirai",
        "cdn.calltrk.com",
        "type indicator"
      ],
      "references": [
        "Redirect from actual firm called - https://coloradoinjurylaw.com/denver-sexual-abuse-lawyer/",
        "leg.colorado.gov \u2022\tmaps.app.goo.gl",
        "https://leg.colorado.gov/bills/hb20 ?",
        "https://mirai-nameko.jp/assets/delighters-js.php",
        "Government porn: https://thehotporn.info/ \u2022 http://live-sex.space/ \u2022 charoenpornintergroup.com",
        "https://fr.bongacams10.com/erikasexy1 \u2022  https://www.bigcitycreations.com/s/stories/a-unisex-guide-to-pairing-colors",
        "colorado.gov"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Japan",
        "Italy",
        "Aruba",
        "Finland",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "Australia",
        "Hong Kong",
        "Hungary",
        "Switzerland",
        "China",
        "France",
        "T\u00fcrkiye",
        "Canada",
        "Poland"
      ],
      "malware_families": [
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "Trojan:Win32/Predator.PVD!MTB",
          "display_name": "Trojan:Win32/Predator.PVD!MTB",
          "target": "/malware/Trojan:Win32/Predator.PVD!MTB"
        },
        {
          "id": "Trojandropper:Win32/Cutwail.gen!K",
          "display_name": "Trojandropper:Win32/Cutwail.gen!K",
          "target": "/malware/Trojandropper:Win32/Cutwail.gen!K"
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7782,
        "domain": 5008,
        "hostname": 2287,
        "FileHash-SHA1": 318,
        "email": 7,
        "FileHash-SHA256": 1608,
        "FileHash-MD5": 356,
        "SSLCertFingerprint": 11,
        "CVE": 1
      },
      "indicator_count": 17378,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "135 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "690af483e0e2ee05752043cd",
      "name": "Mirai \u2022 Cycbot - Who is Dennis Schroeder (303) 444-4444 | Social Engineering ~ Legal",
      "description": "Mirai \u2022\nCycBot. Hackers connected\nto targets phone intercepting calls. |\nHi Dennis, how the heck are you? Who are you? We connected targets former phone to a lawyer to become familiar with botnet experience. Time spent speaking to several fraudulent people who pretend to be people they are not. \n\nFrom our side: A factual account was given to a professional sounding female phone actor who answered call without giving name of law firm or her own name / title , listened for some time , few screening questions, no one in \u2018 law firm\u2019 didn\u2019t know statutes of limitations.\n\nSad there was never a way for  target to contact find legitimate legal representation due to being in multiple botnets. \n Very disturbing. \n\n#colorado_government",
      "modified": "2025-12-05T06:05:48.164000",
      "created": "2025-11-05T06:53:55.844000",
      "tags": [
        "url https",
        "url http",
        "related pulses",
        "united",
        "redacted for",
        "meta",
        "accept encoding",
        "moved",
        "ip address",
        "record value",
        "encrypt",
        "backdoor",
        "trojandropper",
        "passive dns",
        "mtb oct",
        "ipv4 add",
        "urls",
        "twitter",
        "trojan",
        "cycbot",
        "dynamicloader",
        "medium",
        "ms windows",
        "write",
        "yara rule",
        "named pipe",
        "pe32",
        "defender",
        "install",
        "smartassembly",
        "malware",
        "local",
        "dns query",
        "xxx adult",
        "site top",
        "level domain",
        "total",
        "whitelisted",
        "yara detections",
        "dyndns domain",
        "filehash",
        "av detections",
        "ids detections",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "acceptencoding",
        "as46606",
        "xserver",
        "killer gecko",
        "host",
        "hello2malware",
        "cnlocalhost",
        "dclocal",
        "guard",
        "url analysis",
        "files",
        "reverse dns",
        "azerbaijan asn",
        "asnone related",
        "destination",
        "port",
        "unknown",
        "et smtp",
        "message",
        "united kingdom",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "found",
        "newremotehost",
        "newexternalport",
        "newprotocol",
        "newinternalport",
        "helloworld",
        "nids",
        "high",
        "ddos",
        "hstr",
        "mtb nov",
        "ransom",
        "msie",
        "chrome",
        "gmt content",
        "hostname add",
        "present jun",
        "germany unknown",
        "domain add",
        "asn as24940",
        "germany asn",
        "domain",
        "files ip",
        "address",
        "less",
        "script urls",
        "dennis schrder",
        "a domains",
        "prox",
        "aaaa",
        "present nov",
        "blog von",
        "apache",
        "dennis schroder",
        "servers",
        "emails",
        "dnssec",
        "as197540",
        "dns resolutions",
        "hostname",
        "verdict",
        "present",
        "directui",
        "element",
        "classinfobase",
        "write c",
        "getclassinfoptr",
        "sgpauiclassinfo",
        "file v2",
        "document",
        "explorer",
        "movie",
        "insert",
        "mitre att",
        "ck matrix",
        "path",
        "hybrid",
        "general",
        "iframe",
        "click",
        "strings",
        "forbidden",
        "default",
        "pdf library",
        "delete c",
        "https domain",
        "tls sni",
        "steals",
        "format",
        "for privacy",
        "name servers",
        "date",
        "japan unknown",
        "entries",
        "next associated",
        "gmt etag",
        "pragma",
        "body",
        "accept",
        "script domains",
        "gmt cache",
        "certificate",
        "alerts",
        "analysis date",
        "file score",
        "present sep",
        "iemobile",
        "ok accept",
        "mirai",
        "cdn.calltrk.com",
        "type indicator"
      ],
      "references": [
        "Redirect from actual firm called - https://coloradoinjurylaw.com/denver-sexual-abuse-lawyer/",
        "leg.colorado.gov \u2022\tmaps.app.goo.gl",
        "https://leg.colorado.gov/bills/hb20 ?",
        "https://mirai-nameko.jp/assets/delighters-js.php",
        "Government porn: https://thehotporn.info/ \u2022 http://live-sex.space/ \u2022 charoenpornintergroup.com",
        "https://fr.bongacams10.com/erikasexy1 \u2022  https://www.bigcitycreations.com/s/stories/a-unisex-guide-to-pairing-colors",
        "colorado.gov"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Japan",
        "Italy",
        "Aruba",
        "Finland",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "Australia",
        "Hong Kong",
        "Hungary",
        "Switzerland",
        "China",
        "France",
        "T\u00fcrkiye",
        "Canada",
        "Poland"
      ],
      "malware_families": [
        {
          "id": "Cycbot",
          "display_name": "Cycbot",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot.Aa!MTB",
          "display_name": "Backdoor:Linux/DemonBot.Aa!MTB",
          "target": "/malware/Backdoor:Linux/DemonBot.Aa!MTB"
        },
        {
          "id": "ALF:NID:Susp_NSIS_Stub.A",
          "display_name": "ALF:NID:Susp_NSIS_Stub.A",
          "target": null
        },
        {
          "id": "Trojan:Win32/Predator.PVD!MTB",
          "display_name": "Trojan:Win32/Predator.PVD!MTB",
          "target": "/malware/Trojan:Win32/Predator.PVD!MTB"
        },
        {
          "id": "Trojandropper:Win32/Cutwail.gen!K",
          "display_name": "Trojandropper:Win32/Cutwail.gen!K",
          "target": "/malware/Trojandropper:Win32/Cutwail.gen!K"
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        }
      ],
      "industries": [
        "Legal",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7782,
        "domain": 5008,
        "hostname": 2287,
        "FileHash-SHA1": 318,
        "email": 7,
        "FileHash-SHA256": 1608,
        "FileHash-MD5": 356,
        "SSLCertFingerprint": 11,
        "CVE": 1
      },
      "indicator_count": 17378,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "135 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://imagery.antsle.us",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://imagery.antsle.us",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776618588.0807965
}