{
  "type": "URL",
  "indicator": "https://l03-fs.damstracking.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://l03-fs.damstracking.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3832017179,
      "indicator": "https://l03-fs.damstracking.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "69bf8e2663d5480917ddb699",
          "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
          "description": "",
          "modified": "2026-03-22T08:35:26.266000",
          "created": "2026-03-22T06:37:26.233000",
          "tags": [
            "united",
            "as393601 state",
            "a domains",
            "passive dns",
            "as397241",
            "certificate",
            "urls",
            "search",
            "showing",
            "entries",
            "algorithm",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "ca1 odigicert",
            "info",
            "record type",
            "ttl value",
            "all txt",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "resolutions",
            "historical ssl",
            "communicating",
            "problems",
            "parent domain",
            "njrat",
            "ransomware",
            "startpage",
            "historical",
            "malware",
            "execution",
            "threat roundup",
            "april",
            "september",
            "remcos rat",
            "august",
            "june",
            "qakbot",
            "push",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "qbot",
            "cobalt strike",
            "core",
            "hacktool",
            "november",
            "october",
            "roundup",
            "threat network",
            "cellbrite",
            "february",
            "emotet",
            "maze",
            "metro",
            "dark",
            "malicious",
            "team",
            "critical",
            "copy",
            "awful",
            "parallax rat",
            "banker",
            "keylogger",
            "dns replication",
            "date",
            "csc corporate",
            "domains",
            "code",
            "server",
            "registrar abuse",
            "registrar iana",
            "registry domain",
            "registrar url",
            "registrar",
            "contact phone",
            "apple ios",
            "quasar",
            "remcos",
            "ursnif",
            "chaos",
            "ransomexx",
            "azorult",
            "agent tesla",
            "evilnum",
            "asyncrat",
            "win32 exe",
            "wininit",
            "beta version",
            "cmstp",
            "taskscheduler",
            "ieudinit",
            "nat32",
            "certsentry",
            "type name",
            "wc3 rpg",
            "pegasus",
            "unknown",
            "domain",
            "servers",
            "germany unknown",
            "name servers",
            "status",
            "next",
            "as29066 host",
            "as133618",
            "cname",
            "as47846",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "encrypt",
            "china unknown",
            "as38365 beijing",
            "as134175 unit",
            "707713",
            "hong kong",
            "virgin islands",
            "as6461 zayo",
            "ransom",
            "exploit",
            "ipv4",
            "pulse submit",
            "url analysis",
            "trojan",
            "body",
            "click",
            "creation date",
            "emails",
            "expiration date",
            "domain privacy",
            "hostname",
            "dynamicloader",
            "state",
            "medium",
            "msie",
            "windows nt",
            "wow64",
            "show",
            "slcc2",
            "media center",
            "error",
            "delphi",
            "guard",
            "write",
            "win32",
            "target",
            "redir",
            "facebook",
            "dcom",
            "local",
            "delete",
            "utf8",
            "unicode text",
            "crlf line",
            "rgba",
            "yara detections",
            "default",
            "asnone",
            "get na",
            "dns lookup",
            "probe ms17010",
            "eternalblue",
            "playgame",
            "high",
            "related pulses",
            "yara rule",
            "anomalous file",
            "dynamic",
            "malware infection",
            "cnc",
            "procmem_yara",
            "antivm_generic_disk",
            "modify_proxy infostealer_cookies",
            "network_http",
            "anomalous_deletefile",
            "antidebug_guardpages",
            "powershell_request",
            "powershell_download",
            "as63949 linode",
            "mtb feb",
            "open ports",
            "backdoor",
            "gmt content",
            "trojandropper",
            "simda",
            "lockbit",
            "win.trojan",
            "midia-4",
            "floxif",
            "cryptowall",
            "brontok",
            "check in",
            "record value",
            "files",
            "location united",
            "america asn",
            "as16509",
            "download",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls http",
            "samples",
            "tsara brashears",
            "2nd corintnthians 4:8-9",
            "injection_inter_process",
            "injection_create_remote_thread",
            "persistence_autorun",
            "bypass_firewall",
            "disables_windowsupdate",
            "dynamic_function_loading",
            "http_request",
            "query",
            "delete c",
            "activity dns",
            "components",
            "file execution",
            "observed dns",
            "as4837 china",
            "nxdomain",
            "a nxdomain",
            "wannacry",
            "missouri",
            "safebae",
            "hallrender",
            "house.mo.gov",
            "typosquatting",
            "tactics",
            "google",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "dalles",
            "cookie",
            "urls https",
            "xpcegvo2adsnq",
            "mhkz",
            "mvi2",
            "keepaliveyes",
            "fexp24007246",
            "nsyt",
            "eva reimer",
            "daisy coleman",
            "brian sabey",
            "https://lawlink.com/documents/10935/blackbag-technologies-announ"
          ],
          "references": [
            "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
            "dns.msftncsi.com",
            "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
            "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "23.216.147.64",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
            "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
            "alohatube.xyz [BotNetwork]",
            "facebooksunglassshop.com",
            "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
            "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
            "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
            "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
            "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
            "remote.utorrent.com [remote router logins]",
            "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
            "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
            "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
            "http://tvm77.fashiongup.in/tracking/track-open",
            "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
            "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
            "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
            "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
            "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
            "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
            "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
            "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
            "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
            "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
            "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
            "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
            "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
            "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
            "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [
            "United States of America",
            "China",
            "Australia",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "EVILNUM",
              "display_name": "EVILNUM",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "Parallax RAT",
              "display_name": "Parallax RAT",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Remcos RAT",
              "display_name": "Remcos RAT",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-336074",
              "display_name": "Win.Trojan.Agent-336074",
              "target": null
            },
            {
              "id": "Arid.Viper_CnC",
              "display_name": "Arid.Viper_CnC",
              "target": null
            },
            {
              "id": "WininiCrypt",
              "display_name": "WininiCrypt",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.CI",
              "display_name": "PWS:Win32/QQpass.CI",
              "target": "/malware/PWS:Win32/QQpass.CI"
            },
            {
              "id": "Win.Trojan.Midia-4",
              "display_name": "Win.Trojan.Midia-4",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Win32/SocStealer!rfn",
              "display_name": "Win32/SocStealer!rfn",
              "target": null
            },
            {
              "id": "Backdoor.Win32.Shiz.ufj",
              "display_name": "Backdoor.Win32.Shiz.ufj",
              "target": null
            },
            {
              "id": "Email-Worm.Win32.Brontok.n",
              "display_name": "Email-Worm.Win32.Brontok.n",
              "target": null
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65c91f2b7c03b480379ae4d1",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2668,
            "FileHash-SHA1": 2469,
            "FileHash-SHA256": 8054,
            "URL": 6185,
            "domain": 2421,
            "hostname": 3042,
            "CVE": 5,
            "email": 15,
            "CIDR": 1,
            "IPv4": 18
          },
          "indicator_count": 24878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "28 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "686ab98ff0cb9baa4e2b2000",
          "name": "https://house.mo.gov/ Palantir Technologies HARMFUL (copied  OctoseekPulse)  Attacks SA victims?",
          "description": "",
          "modified": "2025-08-05T21:02:46.419000",
          "created": "2025-07-06T17:59:43.440000",
          "tags": [
            "runtime process",
            "localappdata",
            "size",
            "sha256",
            "sha1",
            "temp",
            "prefetch8",
            "prefetch1",
            "unicode text",
            "type data",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "mitre",
            "writes a pe file header to disc",
            "show process",
            "date",
            "document file",
            "v2 document",
            "ascii text",
            "malicious",
            "local",
            "path",
            "found",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "october",
            "resolutions",
            "apple ios",
            "referrer",
            "communicating",
            "execution",
            "june",
            "august",
            "emotet",
            "qakbot",
            "agent tesla",
            "azorult",
            "core",
            "maze",
            "metro",
            "dark",
            "team",
            "critical",
            "copy",
            "awful",
            "ursnif",
            "hacktool",
            "info",
            "qbot",
            "april",
            "njrat",
            "nokoyawa",
            "djvu",
            "flubot",
            "ransomware",
            "bandit stealer",
            "hallrender",
            "spyware",
            "safebae",
            "tsara brashears",
            "westlaw",
            "river.rocks",
            "brian sabey",
            "targeting",
            "dnspionage",
            "united",
            "unknown",
            "search",
            "aaaa",
            "showing",
            "domain",
            "creation date",
            "record value",
            "dnssec",
            "body",
            "passive dns",
            "encrypt",
            "as14061",
            "germany unknown",
            "as397240",
            "gmt server",
            "443 ma2592000",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "main",
            "installing",
            "as16276",
            "france unknown",
            "name servers",
            "as8075",
            "servers",
            "next",
            "as63949 linode",
            "as206834 team",
            "canada unknown",
            "status",
            "as61969 team",
            "msie",
            "chrome",
            "ransom",
            "gone",
            "title",
            "head body",
            "malware"
          ],
          "references": [
            "\u2193\u2192Found in: https://house.mo.gov/\u2193",
            "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
            "demo.auth.civicalg.com.sni.cloudflaressl.com",
            "happyrabbit.kr [Apple iOS threat]",
            "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
            "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
            "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
            "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
            "http://nudeteenporn.site"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Nokoyawa Ransomware",
              "display_name": "Nokoyawa Ransomware",
              "target": null
            },
            {
              "id": "Bandit Stealer",
              "display_name": "Bandit Stealer",
              "target": null
            },
            {
              "id": "FluBot",
              "display_name": "FluBot",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Djvu",
              "display_name": "Djvu",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1065",
              "name": "Uncommonly Used Port",
              "display_name": "T1065 - Uncommonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65c96df8fe0657d56a206a49",
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 251,
            "FileHash-SHA1": 211,
            "FileHash-SHA256": 3226,
            "domain": 1867,
            "URL": 10030,
            "hostname": 2919,
            "CVE": 7,
            "email": 6
          },
          "indicator_count": 18517,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "257 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e3fe91a1aceb955e54f6",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:30.147000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e3fe934ae9d391614c0d",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:30.585000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e4017a14cda8d09c9bf8",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:33.270000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e406028ca6f363f41315",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:38.424000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8071976a7e6dccaabbada",
          "name": "NSO Group Pegasus",
          "description": "",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T20:14:17.001000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b7e406028ca6f363f41315",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "dns.msftncsi.com",
        "facebooksunglassshop.com",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
        "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "23.216.147.64",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "demo.auth.civicalg.com.sni.cloudflaressl.com",
        "http://nudeteenporn.site",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "\u2193\u2192Found in: https://house.mo.gov/\u2193",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
        "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "remote.utorrent.com [remote router logins]",
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "https://en.m.wikipedia.org \u203a wiki NSO Group",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
        "happyrabbit.kr [Apple iOS threat]",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "ww.google.com.uy",
        "321Survive.exe",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "alohatube.xyz [BotNetwork]",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO Group"
          ],
          "malware_families": [
            "Keylogger",
            "Eternalblue",
            "Win.trojan.midia-4",
            "Flubot",
            "Ransomware",
            "Amadey",
            "Win32/socstealer!rfn",
            "Quasar rat",
            "Wannacry",
            "Hacktool",
            "Tulach",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Pws:win32/qqpass.ci",
            "Dark",
            "Ursnif",
            "Chaos",
            "Win.trojan.agent-336074",
            "Emotet",
            "Lockbit",
            "Email-worm.win32.brontok.n",
            "Djvu",
            "Nokoyawa ransomware",
            "Ransomexx",
            "Qbot",
            "Arid.viper_cnc",
            "Cobalt strike",
            "Evilnum",
            "Qakbot",
            "Backdoor.win32.shiz.ufj",
            "Hallrender",
            "Bandit stealer",
            "Pegasus",
            "Remcos rat",
            "Azorult",
            "Wininicrypt",
            "Parallax rat",
            "Asyncrat",
            "Njrat",
            "Agent tesla",
            "Trojan.wanna/wannacry",
            "Maze"
          ],
          "industries": [],
          "unique_indicators": 39149
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/damstracking.com",
    "whois": "http://whois.domaintools.com/damstracking.com",
    "domain": "damstracking.com",
    "hostname": "l03-fs.damstracking.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "69bf8e2663d5480917ddb699",
      "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
      "description": "",
      "modified": "2026-03-22T08:35:26.266000",
      "created": "2026-03-22T06:37:26.233000",
      "tags": [
        "united",
        "as393601 state",
        "a domains",
        "passive dns",
        "as397241",
        "certificate",
        "urls",
        "search",
        "showing",
        "entries",
        "algorithm",
        "full name",
        "data",
        "v3 serial",
        "number",
        "cus cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "ca1 odigicert",
        "info",
        "record type",
        "ttl value",
        "all txt",
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "resolutions",
        "historical ssl",
        "communicating",
        "problems",
        "parent domain",
        "njrat",
        "ransomware",
        "startpage",
        "historical",
        "malware",
        "execution",
        "threat roundup",
        "april",
        "september",
        "remcos rat",
        "august",
        "june",
        "qakbot",
        "push",
        "service",
        "privateloader",
        "amadey",
        "powershell",
        "qbot",
        "cobalt strike",
        "core",
        "hacktool",
        "november",
        "october",
        "roundup",
        "threat network",
        "cellbrite",
        "february",
        "emotet",
        "maze",
        "metro",
        "dark",
        "malicious",
        "team",
        "critical",
        "copy",
        "awful",
        "parallax rat",
        "banker",
        "keylogger",
        "dns replication",
        "date",
        "csc corporate",
        "domains",
        "code",
        "server",
        "registrar abuse",
        "registrar iana",
        "registry domain",
        "registrar url",
        "registrar",
        "contact phone",
        "apple ios",
        "quasar",
        "remcos",
        "ursnif",
        "chaos",
        "ransomexx",
        "azorult",
        "agent tesla",
        "evilnum",
        "asyncrat",
        "win32 exe",
        "wininit",
        "beta version",
        "cmstp",
        "taskscheduler",
        "ieudinit",
        "nat32",
        "certsentry",
        "type name",
        "wc3 rpg",
        "pegasus",
        "unknown",
        "domain",
        "servers",
        "germany unknown",
        "name servers",
        "status",
        "next",
        "as29066 host",
        "as133618",
        "cname",
        "as47846",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "encrypt",
        "china unknown",
        "as38365 beijing",
        "as134175 unit",
        "707713",
        "hong kong",
        "virgin islands",
        "as6461 zayo",
        "ransom",
        "exploit",
        "ipv4",
        "pulse submit",
        "url analysis",
        "trojan",
        "body",
        "click",
        "creation date",
        "emails",
        "expiration date",
        "domain privacy",
        "hostname",
        "dynamicloader",
        "state",
        "medium",
        "msie",
        "windows nt",
        "wow64",
        "show",
        "slcc2",
        "media center",
        "error",
        "delphi",
        "guard",
        "write",
        "win32",
        "target",
        "redir",
        "facebook",
        "dcom",
        "local",
        "delete",
        "utf8",
        "unicode text",
        "crlf line",
        "rgba",
        "yara detections",
        "default",
        "asnone",
        "get na",
        "dns lookup",
        "probe ms17010",
        "eternalblue",
        "playgame",
        "high",
        "related pulses",
        "yara rule",
        "anomalous file",
        "dynamic",
        "malware infection",
        "cnc",
        "procmem_yara",
        "antivm_generic_disk",
        "modify_proxy infostealer_cookies",
        "network_http",
        "anomalous_deletefile",
        "antidebug_guardpages",
        "powershell_request",
        "powershell_download",
        "as63949 linode",
        "mtb feb",
        "open ports",
        "backdoor",
        "gmt content",
        "trojandropper",
        "simda",
        "lockbit",
        "win.trojan",
        "midia-4",
        "floxif",
        "cryptowall",
        "brontok",
        "check in",
        "record value",
        "files",
        "location united",
        "america asn",
        "as16509",
        "download",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls http",
        "samples",
        "tsara brashears",
        "2nd corintnthians 4:8-9",
        "injection_inter_process",
        "injection_create_remote_thread",
        "persistence_autorun",
        "bypass_firewall",
        "disables_windowsupdate",
        "dynamic_function_loading",
        "http_request",
        "query",
        "delete c",
        "activity dns",
        "components",
        "file execution",
        "observed dns",
        "as4837 china",
        "nxdomain",
        "a nxdomain",
        "wannacry",
        "missouri",
        "safebae",
        "hallrender",
        "house.mo.gov",
        "typosquatting",
        "tactics",
        "google",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "dalles",
        "cookie",
        "urls https",
        "xpcegvo2adsnq",
        "mhkz",
        "mvi2",
        "keepaliveyes",
        "fexp24007246",
        "nsyt",
        "eva reimer",
        "daisy coleman",
        "brian sabey",
        "https://lawlink.com/documents/10935/blackbag-technologies-announ"
      ],
      "references": [
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "dns.msftncsi.com",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "23.216.147.64",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "alohatube.xyz [BotNetwork]",
        "facebooksunglassshop.com",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "remote.utorrent.com [remote router logins]",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [
        "United States of America",
        "China",
        "Australia",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "EVILNUM",
          "display_name": "EVILNUM",
          "target": null
        },
        {
          "id": "Dark",
          "display_name": "Dark",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        },
        {
          "id": "Maze",
          "display_name": "Maze",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "Parallax RAT",
          "display_name": "Parallax RAT",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Remcos RAT",
          "display_name": "Remcos RAT",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-336074",
          "display_name": "Win.Trojan.Agent-336074",
          "target": null
        },
        {
          "id": "Arid.Viper_CnC",
          "display_name": "Arid.Viper_CnC",
          "target": null
        },
        {
          "id": "WininiCrypt",
          "display_name": "WininiCrypt",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.CI",
          "display_name": "PWS:Win32/QQpass.CI",
          "target": "/malware/PWS:Win32/QQpass.CI"
        },
        {
          "id": "Win.Trojan.Midia-4",
          "display_name": "Win.Trojan.Midia-4",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Win32/SocStealer!rfn",
          "display_name": "Win32/SocStealer!rfn",
          "target": null
        },
        {
          "id": "Backdoor.Win32.Shiz.ufj",
          "display_name": "Backdoor.Win32.Shiz.ufj",
          "target": null
        },
        {
          "id": "Email-Worm.Win32.Brontok.n",
          "display_name": "Email-Worm.Win32.Brontok.n",
          "target": null
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65c91f2b7c03b480379ae4d1",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2668,
        "FileHash-SHA1": 2469,
        "FileHash-SHA256": 8054,
        "URL": 6185,
        "domain": 2421,
        "hostname": 3042,
        "CVE": 5,
        "email": 15,
        "CIDR": 1,
        "IPv4": 18
      },
      "indicator_count": 24878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "28 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "686ab98ff0cb9baa4e2b2000",
      "name": "https://house.mo.gov/ Palantir Technologies HARMFUL (copied  OctoseekPulse)  Attacks SA victims?",
      "description": "",
      "modified": "2025-08-05T21:02:46.419000",
      "created": "2025-07-06T17:59:43.440000",
      "tags": [
        "runtime process",
        "localappdata",
        "size",
        "sha256",
        "sha1",
        "temp",
        "prefetch8",
        "prefetch1",
        "unicode text",
        "type data",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "mitre",
        "writes a pe file header to disc",
        "show process",
        "date",
        "document file",
        "v2 document",
        "ascii text",
        "malicious",
        "local",
        "path",
        "found",
        "ssl certificate",
        "whois record",
        "threat roundup",
        "contacted",
        "october",
        "resolutions",
        "apple ios",
        "referrer",
        "communicating",
        "execution",
        "june",
        "august",
        "emotet",
        "qakbot",
        "agent tesla",
        "azorult",
        "core",
        "maze",
        "metro",
        "dark",
        "team",
        "critical",
        "copy",
        "awful",
        "ursnif",
        "hacktool",
        "info",
        "qbot",
        "april",
        "njrat",
        "nokoyawa",
        "djvu",
        "flubot",
        "ransomware",
        "bandit stealer",
        "hallrender",
        "spyware",
        "safebae",
        "tsara brashears",
        "westlaw",
        "river.rocks",
        "brian sabey",
        "targeting",
        "dnspionage",
        "united",
        "unknown",
        "search",
        "aaaa",
        "showing",
        "domain",
        "creation date",
        "record value",
        "dnssec",
        "body",
        "passive dns",
        "encrypt",
        "as14061",
        "germany unknown",
        "as397240",
        "gmt server",
        "443 ma2592000",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "main",
        "installing",
        "as16276",
        "france unknown",
        "name servers",
        "as8075",
        "servers",
        "next",
        "as63949 linode",
        "as206834 team",
        "canada unknown",
        "status",
        "as61969 team",
        "msie",
        "chrome",
        "ransom",
        "gone",
        "title",
        "head body",
        "malware"
      ],
      "references": [
        "\u2193\u2192Found in: https://house.mo.gov/\u2193",
        "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
        "demo.auth.civicalg.com.sni.cloudflaressl.com",
        "happyrabbit.kr [Apple iOS threat]",
        "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
        "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
        "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
        "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
        "http://nudeteenporn.site"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Nokoyawa Ransomware",
          "display_name": "Nokoyawa Ransomware",
          "target": null
        },
        {
          "id": "Bandit Stealer",
          "display_name": "Bandit Stealer",
          "target": null
        },
        {
          "id": "FluBot",
          "display_name": "FluBot",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Djvu",
          "display_name": "Djvu",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Maze",
          "display_name": "Maze",
          "target": null
        },
        {
          "id": "Dark",
          "display_name": "Dark",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1065",
          "name": "Uncommonly Used Port",
          "display_name": "T1065 - Uncommonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65c96df8fe0657d56a206a49",
      "export_count": 42,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 251,
        "FileHash-SHA1": 211,
        "FileHash-SHA256": 3226,
        "domain": 1867,
        "URL": 10030,
        "hostname": 2919,
        "CVE": 7,
        "email": 6
      },
      "indicator_count": 18517,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "257 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e3fe91a1aceb955e54f6",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:30.147000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e3fe934ae9d391614c0d",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:30.585000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e4017a14cda8d09c9bf8",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:33.270000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e406028ca6f363f41315",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:38.424000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b8071976a7e6dccaabbada",
      "name": "NSO Group Pegasus",
      "description": "",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T20:14:17.001000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65b7e406028ca6f363f41315",
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://l03-fs.damstracking.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://l03-fs.damstracking.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776637772.3198524
}