{
  "type": "URL",
  "indicator": "https://js.danikoy-cefadi.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://js.danikoy-cefadi.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3894757590,
      "indicator": "https://js.danikoy-cefadi.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "696ac416596cd89cf76bce55",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:04:53.997000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac4327b5bc2e8be34f78a",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:22.323000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696ac438a696c993b672106d",
          "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
          "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
          "modified": "2026-02-15T22:03:06.041000",
          "created": "2026-01-16T23:05:28.261000",
          "tags": [
            "united",
            "win32",
            "urls",
            "twitter",
            "trojan",
            "united states",
            "dynamicloader",
            "default",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "write c",
            "stream",
            "write",
            "malware",
            "dirty",
            "servers",
            "unknown aaaa",
            "Crazy Frost",
            "create c",
            "port",
            "destination",
            "unknown",
            "encrypt",
            "passive dns",
            "Verizon",
            "Twitter",
            "url analysis",
            "url add",
            "http",
            "files related",
            "related tags",
            "Project Cicada",
            "present nov",
            "present dec",
            "present sep",
            "present jul",
            "present jun",
            "or icon",
            "gold w",
            "dots larger",
            "background",
            "pegasus",
            "meta",
            "backdoor",
            "ransom",
            "checkin",
            "trojandropper",
            "mtb nov",
            "ipv4",
            "data upload",
            "extraction",
            "ottow",
            "Christopher Ahmann",
            "Pegasus",
            "url https",
            "hostname",
            "files domain",
            "present jan",
            "moved",
            "ip address",
            "record value",
            "apache",
            "paris",
            "followupboss",
            "type",
            "hostname add",
            "next associated",
            "title error",
            "reverse dns",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "connect",
            "head",
            "tlsv1",
            "accept",
            "date",
            "powershell",
            "iframe",
            "span",
            "push",
            "next",
            "shark",
            "Connection",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "pattern match",
            "size",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "Denver, Co 80211",
            "body",
            "title",
            "One Reach AI"
          ],
          "references": [
            "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
            "pegasuspartners.followupboss.com",
            "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
            "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
            "search.roi.ros.gov.uk",
            "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
            "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
            "Denver, US 80211 http://library.verizon.onereach.ai",
            "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
            "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11078,
            "hostname": 4331,
            "domain": 1932,
            "FileHash-SHA256": 1999,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 169,
            "email": 5,
            "SSLCertFingerprint": 6,
            "CVE": 1
          },
          "indicator_count": 19878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "62 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536881127f5ee988306394",
          "name": "iOS Attack - Crouching Yeti: http://x.com/denverpolice/status/|",
          "description": "Targeted triangulation. Apple iOS iPad. Attack chains of Operation Triangulation involves advanced tactics employed by those acting as secret middleman, deploying spoofed trusted websites, emails, alarming news stories, messages, Bluetooth hacking, if threat actor has full CnC of targets phone via injection (sometimes it's random) can power on B/T.   In Spoofed sites, malicious redirects, iMessage 0day case. Zero-click iMessage exploit seen. Information is sent to attacker and stored. Data harvesting, financial & identity theft, service modification and DoS intended. Used by law enforcement, governments, attorney PI's, cyber security defense, red teams and/or malicious hackers.\n*Crouching Yeti threat description notes: Contextual Indicators: Domain is classified as Social Networking Contextual Indicators: The URL is known benign by Check Point's Threat Cloud Contextual Indicators: Https://x.com is popular among websites with good reputation Contextual Indicators: Domain Cisco Umbrella rank is 312.",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T16:51:13.962000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "663 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536c8eee8d42d670e27723",
          "name": "Eternal Blue _ WannaCry MS17-010  | Apple iOS iMessage injection infiltration",
          "description": "",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T17:08:30.022000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66536881127f5ee988306394",
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "663 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
        "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
        "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
        "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
        "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
        "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
        "Redirects to https://twitter.com?mx=1",
        "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "http://x.com/denverpolice/status/",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
        "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
        "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht",
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "search.roi.ros.gov.uk",
        "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
        "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
        "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
        "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "pegasuspartners.followupboss.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/qqpass",
            "Clicker.bgou",
            "Win.dropper.qqpass-9895638-0",
            "Pegasus",
            "Win.malware.vtflooder-6723768-0",
            "Win.trojan.agent-752791",
            "Win32/vflooder.b checkin",
            "Other malware",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Win32:trojan-gen",
            "Win32/vflooder.b vtapi dos",
            "Wannacry",
            "Win32:malware-gen",
            "Win.trojan.downloader-63174"
          ],
          "industries": [],
          "unique_indicators": 36928
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/danikoy-cefadi.com",
    "whois": "http://whois.domaintools.com/danikoy-cefadi.com",
    "domain": "danikoy-cefadi.com",
    "hostname": "js.danikoy-cefadi.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "696ac416596cd89cf76bce55",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:04:53.997000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac4327b5bc2e8be34f78a",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:22.323000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696ac438a696c993b672106d",
      "name": "VERIZON \u2022 One Reach AI \u2022 LEGAL \u2022 Crazy Frost \u2022 Denver, US MEGA PULSE",
      "description": "Found in peripheral looking for patterns.\nLegal mischief , Monitoring, Spyware. a Pegasus service needs to be examined further. Just glancing. [OTX Auto generated-HOSTNAME: Verizon.com-vdda.co.cc -has been added to the Pulse website, the first time the site has done so.]",
      "modified": "2026-02-15T22:03:06.041000",
      "created": "2026-01-16T23:05:28.261000",
      "tags": [
        "united",
        "win32",
        "urls",
        "twitter",
        "trojan",
        "united states",
        "dynamicloader",
        "default",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "write c",
        "stream",
        "write",
        "malware",
        "dirty",
        "servers",
        "unknown aaaa",
        "Crazy Frost",
        "create c",
        "port",
        "destination",
        "unknown",
        "encrypt",
        "passive dns",
        "Verizon",
        "Twitter",
        "url analysis",
        "url add",
        "http",
        "files related",
        "related tags",
        "Project Cicada",
        "present nov",
        "present dec",
        "present sep",
        "present jul",
        "present jun",
        "or icon",
        "gold w",
        "dots larger",
        "background",
        "pegasus",
        "meta",
        "backdoor",
        "ransom",
        "checkin",
        "trojandropper",
        "mtb nov",
        "ipv4",
        "data upload",
        "extraction",
        "ottow",
        "Christopher Ahmann",
        "Pegasus",
        "url https",
        "hostname",
        "files domain",
        "present jan",
        "moved",
        "ip address",
        "record value",
        "apache",
        "paris",
        "followupboss",
        "type",
        "hostname add",
        "next associated",
        "title error",
        "reverse dns",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "connect",
        "head",
        "tlsv1",
        "accept",
        "date",
        "powershell",
        "iframe",
        "span",
        "push",
        "next",
        "shark",
        "Connection",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "pattern match",
        "size",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "Denver, Co 80211",
        "body",
        "title",
        "One Reach AI"
      ],
      "references": [
        "https://pegasuspartners.followupboss.com/unsubscribe/eh-MhVRQnJl0_bAFwnKkNcLhcpKKkFNZoZGVdqXUj3YdKSnKqAu_ZtK_m2bfbflpBDP5tU_QK4_N_bD0zVR_qs69dqt0K9vHSjNpk4p_WlGOHiyG5drGp98yBthkeHFIf3TXQbQPk8UzVtbZUILxzg~~ No Expiration\t0",
        "pegasuspartners.followupboss.com",
        "Project Cicada: verizon.pr1414.my.nonprod-asurion53.com",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/07d20574d361258ee514f507936703dbea55db4a6d123602c0d2a67e9f14196d",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/fbb538f322026e57d467e9dbccdbaf181e08149c50216385b7235a43e80ea0c8",
        "Hostname admin.test-aws-responsible-oyster-8905-us-east-1.space.dev.a0core.net",
        "search.roi.ros.gov.uk",
        "ftp.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "forum.remote.docs.home.git.fr.yandex.avito.sberbank.pay.avito.blablacar.blablacar.gitlab.ces4ld2kbfghhbju9r40.haard.info",
        "Denver, US 80211 https://otx.alienvault.com/indicator/domain/onereach.ai",
        "Denver, US 80211 http://library.verizon.onereach.ai",
        "https://sa.josht.ca\t\u2022 https://sa.josht.ca/ \u2022 https://staging.josht.ca/\t\u2022 https://test.josht.ca/",
        "https://p2d.josht.ca/api/depots/info/?depot= \u2022 https://p2d.josht"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11078,
        "hostname": 4331,
        "domain": 1932,
        "FileHash-SHA256": 1999,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 169,
        "email": 5,
        "SSLCertFingerprint": 6,
        "CVE": 1
      },
      "indicator_count": 19878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "62 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66536881127f5ee988306394",
      "name": "iOS Attack - Crouching Yeti: http://x.com/denverpolice/status/|",
      "description": "Targeted triangulation. Apple iOS iPad. Attack chains of Operation Triangulation involves advanced tactics employed by those acting as secret middleman, deploying spoofed trusted websites, emails, alarming news stories, messages, Bluetooth hacking, if threat actor has full CnC of targets phone via injection (sometimes it's random) can power on B/T.   In Spoofed sites, malicious redirects, iMessage 0day case. Zero-click iMessage exploit seen. Information is sent to attacker and stored. Data harvesting, financial & identity theft, service modification and DoS intended. Used by law enforcement, governments, attorney PI's, cyber security defense, red teams and/or malicious hackers.\n*Crouching Yeti threat description notes: Contextual Indicators: Domain is classified as Social Networking Contextual Indicators: The URL is known benign by Check Point's Threat Cloud Contextual Indicators: Https://x.com is popular among websites with good reputation Contextual Indicators: Domain Cisco Umbrella rank is 312.",
      "modified": "2024-06-25T16:05:26.604000",
      "created": "2024-05-26T16:51:13.962000",
      "tags": [
        "sha256",
        "sha1",
        "pattern match",
        "ascii text",
        "document file",
        "v2 document",
        "crlf line",
        "size",
        "unicode",
        "beginstring",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "external-resources",
        "dom-modification",
        "third-party-cookies",
        "iframes",
        "trackers",
        "text/html",
        "twitter",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "headers",
        "deny",
        "express",
        "referrer",
        "impacting azure",
        "proofpoint",
        "sneaky server",
        "replacement",
        "unauthorized",
        "switch dns",
        "query",
        "vy binh",
        "hiddentear",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "date",
        "meta",
        "form",
        "submission",
        "expiresthu",
        "path",
        "secure",
        "self",
        "xcitium verdict",
        "cloud",
        "sophos",
        "history first",
        "analysis",
        "cp",
        "cyber",
        "threat",
        "redrum",
        "hit",
        "men",
        "triangulation",
        "historical ssl",
        "apt suspects",
        "critical cmd",
        "hide",
        "asyncrat",
        "jeremy",
        "government",
        "malicious",
        "yuming",
        "name servers",
        "united",
        "passive dns",
        "urls",
        "creation date",
        "search",
        "expiration date",
        "showing",
        "unknown",
        "next",
        "windows nt",
        "malware beacon",
        "memcommit",
        "generic http",
        "exe upload",
        "outbound",
        "etpro trojan",
        "show",
        "trojan",
        "copy",
        "write",
        "win32",
        "malware",
        "read c",
        "entries",
        "medium",
        "markus",
        "contentlength",
        "write c",
        "delete c",
        "create c",
        "yara detections",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "next pe",
        "as32934",
        "hitmen",
        "local government",
        "scene unit",
        "crime",
        "denver police",
        "address",
        "status",
        "aaaa",
        "apple",
        "less whois",
        "registrar",
        "wannacry",
        "http",
        "unique",
        "url https",
        "related nids",
        "code",
        "screenshot",
        "anity",
        "nsa",
        "shadow",
        "saudi telecom",
        "riyadh address",
        "saudi arabia",
        "abuse",
        "ripe",
        "company isp",
        "number",
        "label saudi",
        "telecom company",
        "jsc regional",
        "riyadh",
        "ripe ncc",
        "registry techc",
        "campus",
        "saudi",
        "ripe network",
        "domain",
        "internet se",
        "emails",
        "system",
        "server tsa",
        "b server",
        "certificate",
        "digicert inc",
        "moved",
        "record value"
      ],
      "references": [
        "http://x.com/denverpolice/status/",
        "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
        "Redirects to https://twitter.com?mx=1",
        "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
        "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
        "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
        "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
        "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
        "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
        "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
        "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
        "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
        "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
        "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
        "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
        "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
        "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
        "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
        "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
        "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
        "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32/Vflooder.B Checkin",
          "display_name": "Win32/Vflooder.B Checkin",
          "target": null
        },
        {
          "id": "Win.Malware.Vtflooder-6723768-0",
          "display_name": "Win.Malware.Vtflooder-6723768-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32/Vflooder.B vtapi DOS",
          "display_name": "Win32/Vflooder.B vtapi DOS",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win.Trojan.Downloader-63174",
          "display_name": "Win.Trojan.Downloader-63174",
          "target": null
        },
        {
          "id": "Clicker.BGOU",
          "display_name": "Clicker.BGOU",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-752791",
          "display_name": "Win.Trojan.Agent-752791",
          "target": null
        },
        {
          "id": "Win.Dropper.QQpass-9895638-0",
          "display_name": "Win.Dropper.QQpass-9895638-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1038",
          "name": "DLL Search Order Hijacking",
          "display_name": "T1038 - DLL Search Order Hijacking"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1470",
          "name": "Obtain Device Cloud Backups",
          "display_name": "T1470 - Obtain Device Cloud Backups"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 350,
        "FileHash-SHA1": 348,
        "FileHash-SHA256": 2659,
        "URL": 7850,
        "domain": 2245,
        "hostname": 3611,
        "SSLCertFingerprint": 4,
        "email": 10,
        "CIDR": 4
      },
      "indicator_count": 17081,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "663 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66536c8eee8d42d670e27723",
      "name": "Eternal Blue _ WannaCry MS17-010  | Apple iOS iMessage injection infiltration",
      "description": "",
      "modified": "2024-06-25T16:05:26.604000",
      "created": "2024-05-26T17:08:30.022000",
      "tags": [
        "sha256",
        "sha1",
        "pattern match",
        "ascii text",
        "document file",
        "v2 document",
        "crlf line",
        "size",
        "unicode",
        "beginstring",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "external-resources",
        "dom-modification",
        "third-party-cookies",
        "iframes",
        "trackers",
        "text/html",
        "twitter",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "headers",
        "deny",
        "express",
        "referrer",
        "impacting azure",
        "proofpoint",
        "sneaky server",
        "replacement",
        "unauthorized",
        "switch dns",
        "query",
        "vy binh",
        "hiddentear",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "date",
        "meta",
        "form",
        "submission",
        "expiresthu",
        "path",
        "secure",
        "self",
        "xcitium verdict",
        "cloud",
        "sophos",
        "history first",
        "analysis",
        "cp",
        "cyber",
        "threat",
        "redrum",
        "hit",
        "men",
        "triangulation",
        "historical ssl",
        "apt suspects",
        "critical cmd",
        "hide",
        "asyncrat",
        "jeremy",
        "government",
        "malicious",
        "yuming",
        "name servers",
        "united",
        "passive dns",
        "urls",
        "creation date",
        "search",
        "expiration date",
        "showing",
        "unknown",
        "next",
        "windows nt",
        "malware beacon",
        "memcommit",
        "generic http",
        "exe upload",
        "outbound",
        "etpro trojan",
        "show",
        "trojan",
        "copy",
        "write",
        "win32",
        "malware",
        "read c",
        "entries",
        "medium",
        "markus",
        "contentlength",
        "write c",
        "delete c",
        "create c",
        "yara detections",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "next pe",
        "as32934",
        "hitmen",
        "local government",
        "scene unit",
        "crime",
        "denver police",
        "address",
        "status",
        "aaaa",
        "apple",
        "less whois",
        "registrar",
        "wannacry",
        "http",
        "unique",
        "url https",
        "related nids",
        "code",
        "screenshot",
        "anity",
        "nsa",
        "shadow",
        "saudi telecom",
        "riyadh address",
        "saudi arabia",
        "abuse",
        "ripe",
        "company isp",
        "number",
        "label saudi",
        "telecom company",
        "jsc regional",
        "riyadh",
        "ripe ncc",
        "registry techc",
        "campus",
        "saudi",
        "ripe network",
        "domain",
        "internet se",
        "emails",
        "system",
        "server tsa",
        "b server",
        "certificate",
        "digicert inc",
        "moved",
        "record value"
      ],
      "references": [
        "http://x.com/denverpolice/status/",
        "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
        "Redirects to https://twitter.com?mx=1",
        "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
        "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
        "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
        "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
        "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
        "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
        "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
        "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
        "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
        "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
        "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
        "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
        "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
        "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
        "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
        "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
        "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
        "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32/Vflooder.B Checkin",
          "display_name": "Win32/Vflooder.B Checkin",
          "target": null
        },
        {
          "id": "Win.Malware.Vtflooder-6723768-0",
          "display_name": "Win.Malware.Vtflooder-6723768-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32/Vflooder.B vtapi DOS",
          "display_name": "Win32/Vflooder.B vtapi DOS",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win.Trojan.Downloader-63174",
          "display_name": "Win.Trojan.Downloader-63174",
          "target": null
        },
        {
          "id": "Clicker.BGOU",
          "display_name": "Clicker.BGOU",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-752791",
          "display_name": "Win.Trojan.Agent-752791",
          "target": null
        },
        {
          "id": "Win.Dropper.QQpass-9895638-0",
          "display_name": "Win.Dropper.QQpass-9895638-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1038",
          "name": "DLL Search Order Hijacking",
          "display_name": "T1038 - DLL Search Order Hijacking"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        },
        {
          "id": "T1470",
          "name": "Obtain Device Cloud Backups",
          "display_name": "T1470 - Obtain Device Cloud Backups"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "66536881127f5ee988306394",
      "export_count": 55,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 350,
        "FileHash-SHA1": 348,
        "FileHash-SHA256": 2659,
        "URL": 7850,
        "domain": 2245,
        "hostname": 3611,
        "SSLCertFingerprint": 4,
        "email": 10,
        "CIDR": 4
      },
      "indicator_count": 17081,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "663 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://js.danikoy-cefadi.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://js.danikoy-cefadi.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776634955.655569
}