{
  "type": "URL",
  "indicator": "https://leaseway.damstracking.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://leaseway.damstracking.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3831128635,
      "indicator": "https://leaseway.damstracking.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "69bf8e2663d5480917ddb699",
          "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
          "description": "",
          "modified": "2026-03-22T08:35:26.266000",
          "created": "2026-03-22T06:37:26.233000",
          "tags": [
            "united",
            "as393601 state",
            "a domains",
            "passive dns",
            "as397241",
            "certificate",
            "urls",
            "search",
            "showing",
            "entries",
            "algorithm",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "ca1 odigicert",
            "info",
            "record type",
            "ttl value",
            "all txt",
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "resolutions",
            "historical ssl",
            "communicating",
            "problems",
            "parent domain",
            "njrat",
            "ransomware",
            "startpage",
            "historical",
            "malware",
            "execution",
            "threat roundup",
            "april",
            "september",
            "remcos rat",
            "august",
            "june",
            "qakbot",
            "push",
            "service",
            "privateloader",
            "amadey",
            "powershell",
            "qbot",
            "cobalt strike",
            "core",
            "hacktool",
            "november",
            "october",
            "roundup",
            "threat network",
            "cellbrite",
            "february",
            "emotet",
            "maze",
            "metro",
            "dark",
            "malicious",
            "team",
            "critical",
            "copy",
            "awful",
            "parallax rat",
            "banker",
            "keylogger",
            "dns replication",
            "date",
            "csc corporate",
            "domains",
            "code",
            "server",
            "registrar abuse",
            "registrar iana",
            "registry domain",
            "registrar url",
            "registrar",
            "contact phone",
            "apple ios",
            "quasar",
            "remcos",
            "ursnif",
            "chaos",
            "ransomexx",
            "azorult",
            "agent tesla",
            "evilnum",
            "asyncrat",
            "win32 exe",
            "wininit",
            "beta version",
            "cmstp",
            "taskscheduler",
            "ieudinit",
            "nat32",
            "certsentry",
            "type name",
            "wc3 rpg",
            "pegasus",
            "unknown",
            "domain",
            "servers",
            "germany unknown",
            "name servers",
            "status",
            "next",
            "as29066 host",
            "as133618",
            "cname",
            "as47846",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "encrypt",
            "china unknown",
            "as38365 beijing",
            "as134175 unit",
            "707713",
            "hong kong",
            "virgin islands",
            "as6461 zayo",
            "ransom",
            "exploit",
            "ipv4",
            "pulse submit",
            "url analysis",
            "trojan",
            "body",
            "click",
            "creation date",
            "emails",
            "expiration date",
            "domain privacy",
            "hostname",
            "dynamicloader",
            "state",
            "medium",
            "msie",
            "windows nt",
            "wow64",
            "show",
            "slcc2",
            "media center",
            "error",
            "delphi",
            "guard",
            "write",
            "win32",
            "target",
            "redir",
            "facebook",
            "dcom",
            "local",
            "delete",
            "utf8",
            "unicode text",
            "crlf line",
            "rgba",
            "yara detections",
            "default",
            "asnone",
            "get na",
            "dns lookup",
            "probe ms17010",
            "eternalblue",
            "playgame",
            "high",
            "related pulses",
            "yara rule",
            "anomalous file",
            "dynamic",
            "malware infection",
            "cnc",
            "procmem_yara",
            "antivm_generic_disk",
            "modify_proxy infostealer_cookies",
            "network_http",
            "anomalous_deletefile",
            "antidebug_guardpages",
            "powershell_request",
            "powershell_download",
            "as63949 linode",
            "mtb feb",
            "open ports",
            "backdoor",
            "gmt content",
            "trojandropper",
            "simda",
            "lockbit",
            "win.trojan",
            "midia-4",
            "floxif",
            "cryptowall",
            "brontok",
            "check in",
            "record value",
            "files",
            "location united",
            "america asn",
            "as16509",
            "download",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls http",
            "samples",
            "tsara brashears",
            "2nd corintnthians 4:8-9",
            "injection_inter_process",
            "injection_create_remote_thread",
            "persistence_autorun",
            "bypass_firewall",
            "disables_windowsupdate",
            "dynamic_function_loading",
            "http_request",
            "query",
            "delete c",
            "activity dns",
            "components",
            "file execution",
            "observed dns",
            "as4837 china",
            "nxdomain",
            "a nxdomain",
            "wannacry",
            "missouri",
            "safebae",
            "hallrender",
            "house.mo.gov",
            "typosquatting",
            "tactics",
            "google",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "aes256gcm",
            "dalles",
            "cookie",
            "urls https",
            "xpcegvo2adsnq",
            "mhkz",
            "mvi2",
            "keepaliveyes",
            "fexp24007246",
            "nsyt",
            "eva reimer",
            "daisy coleman",
            "brian sabey",
            "https://lawlink.com/documents/10935/blackbag-technologies-announ"
          ],
          "references": [
            "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
            "dns.msftncsi.com",
            "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
            "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
            "23.216.147.64",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
            "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
            "alohatube.xyz [BotNetwork]",
            "facebooksunglassshop.com",
            "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
            "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
            "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
            "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
            "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
            "remote.utorrent.com [remote router logins]",
            "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
            "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
            "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
            "http://tvm77.fashiongup.in/tracking/track-open",
            "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
            "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
            "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
            "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
            "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
            "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
            "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
            "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
            "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
            "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
            "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
            "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
            "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
            "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
            "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
            "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
            "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [
            "United States of America",
            "China",
            "Australia",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Chaos",
              "display_name": "Chaos",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "EVILNUM",
              "display_name": "EVILNUM",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Keylogger",
              "display_name": "Keylogger",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "Parallax RAT",
              "display_name": "Parallax RAT",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Remcos RAT",
              "display_name": "Remcos RAT",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-336074",
              "display_name": "Win.Trojan.Agent-336074",
              "target": null
            },
            {
              "id": "Arid.Viper_CnC",
              "display_name": "Arid.Viper_CnC",
              "target": null
            },
            {
              "id": "WininiCrypt",
              "display_name": "WininiCrypt",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.CI",
              "display_name": "PWS:Win32/QQpass.CI",
              "target": "/malware/PWS:Win32/QQpass.CI"
            },
            {
              "id": "Win.Trojan.Midia-4",
              "display_name": "Win.Trojan.Midia-4",
              "target": null
            },
            {
              "id": "LockBit",
              "display_name": "LockBit",
              "target": null
            },
            {
              "id": "Win32/SocStealer!rfn",
              "display_name": "Win32/SocStealer!rfn",
              "target": null
            },
            {
              "id": "Backdoor.Win32.Shiz.ufj",
              "display_name": "Backdoor.Win32.Shiz.ufj",
              "target": null
            },
            {
              "id": "Email-Worm.Win32.Brontok.n",
              "display_name": "Email-Worm.Win32.Brontok.n",
              "target": null
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65c91f2b7c03b480379ae4d1",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2668,
            "FileHash-SHA1": 2469,
            "FileHash-SHA256": 8054,
            "URL": 6185,
            "domain": 2421,
            "hostname": 3042,
            "CVE": 5,
            "email": 15,
            "CIDR": 1,
            "IPv4": 18
          },
          "indicator_count": 24878,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "28 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "686ab98ff0cb9baa4e2b2000",
          "name": "https://house.mo.gov/ Palantir Technologies HARMFUL (copied  OctoseekPulse)  Attacks SA victims?",
          "description": "",
          "modified": "2025-08-05T21:02:46.419000",
          "created": "2025-07-06T17:59:43.440000",
          "tags": [
            "runtime process",
            "localappdata",
            "size",
            "sha256",
            "sha1",
            "temp",
            "prefetch8",
            "prefetch1",
            "unicode text",
            "type data",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "mitre",
            "writes a pe file header to disc",
            "show process",
            "date",
            "document file",
            "v2 document",
            "ascii text",
            "malicious",
            "local",
            "path",
            "found",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "contacted",
            "october",
            "resolutions",
            "apple ios",
            "referrer",
            "communicating",
            "execution",
            "june",
            "august",
            "emotet",
            "qakbot",
            "agent tesla",
            "azorult",
            "core",
            "maze",
            "metro",
            "dark",
            "team",
            "critical",
            "copy",
            "awful",
            "ursnif",
            "hacktool",
            "info",
            "qbot",
            "april",
            "njrat",
            "nokoyawa",
            "djvu",
            "flubot",
            "ransomware",
            "bandit stealer",
            "hallrender",
            "spyware",
            "safebae",
            "tsara brashears",
            "westlaw",
            "river.rocks",
            "brian sabey",
            "targeting",
            "dnspionage",
            "united",
            "unknown",
            "search",
            "aaaa",
            "showing",
            "domain",
            "creation date",
            "record value",
            "dnssec",
            "body",
            "passive dns",
            "encrypt",
            "as14061",
            "germany unknown",
            "as397240",
            "gmt server",
            "443 ma2592000",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "main",
            "installing",
            "as16276",
            "france unknown",
            "name servers",
            "as8075",
            "servers",
            "next",
            "as63949 linode",
            "as206834 team",
            "canada unknown",
            "status",
            "as61969 team",
            "msie",
            "chrome",
            "ransom",
            "gone",
            "title",
            "head body",
            "malware"
          ],
          "references": [
            "\u2193\u2192Found in: https://house.mo.gov/\u2193",
            "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
            "demo.auth.civicalg.com.sni.cloudflaressl.com",
            "happyrabbit.kr [Apple iOS threat]",
            "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
            "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
            "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
            "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
            "http://nudeteenporn.site"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Nokoyawa Ransomware",
              "display_name": "Nokoyawa Ransomware",
              "target": null
            },
            {
              "id": "Bandit Stealer",
              "display_name": "Bandit Stealer",
              "target": null
            },
            {
              "id": "FluBot",
              "display_name": "FluBot",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "QBot",
              "display_name": "QBot",
              "target": null
            },
            {
              "id": "QakBot",
              "display_name": "QakBot",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ursnif",
              "display_name": "Ursnif",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Djvu",
              "display_name": "Djvu",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Maze",
              "display_name": "Maze",
              "target": null
            },
            {
              "id": "Dark",
              "display_name": "Dark",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1065",
              "name": "Uncommonly Used Port",
              "display_name": "T1065 - Uncommonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65c96df8fe0657d56a206a49",
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 251,
            "FileHash-SHA1": 211,
            "FileHash-SHA256": 3226,
            "domain": 1867,
            "URL": 10030,
            "hostname": 2919,
            "CVE": 7,
            "email": 6
          },
          "indicator_count": 18517,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "256 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b5c5ebba25ca46fc5b36bc",
          "name": "NSO Group Pegasus spyware found attack a US citizen. Silencing",
          "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\n\u2022NSO Group develops best-in-class technology to help government agencies detect and prevent terrorism and crime.\n\u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. \nNon terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
          "modified": "2024-03-27T00:05:34.925000",
          "created": "2024-01-28T03:11:39.752000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "october",
            "august",
            "september",
            "november",
            "april",
            "march",
            "tsara brashears",
            "copy",
            "execution",
            "metro",
            "awful",
            "attack",
            "quasar",
            "malicious",
            "crypto",
            "contact",
            "contacted",
            "pe resource",
            "communicating",
            "pegasus",
            "bundled",
            "historical ssl",
            "cellbrite",
            "core",
            "startpage",
            "ursnif",
            "amadey",
            "probe",
            "targets sa",
            "survivor",
            "referrer",
            "whois whois",
            "whois ssl",
            "apple",
            "status",
            "creation date",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse submit",
            "date",
            "next",
            "et exploit",
            "probe ms17010",
            "smbds ipc",
            "show",
            "service",
            "entries",
            "msf style",
            "generic flags",
            "pe32",
            "exploit",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "eternalblue",
            "playgame",
            "bitcoin",
            "virgin islands",
            "as19905",
            "record value",
            "unknown",
            "body",
            "meta",
            "error",
            "united",
            "as7922 comcast",
            "x ua",
            "ipv4",
            "pulse pulses",
            "files",
            "moved",
            "title",
            "gmt content",
            "cookie",
            "as15169 google",
            "mtb jan",
            "otx telemetry",
            "query",
            "trojan",
            "msr jan",
            "as29580 a1",
            "domain",
            "showing",
            "as8866",
            "cellebrite",
            "aaaa",
            "russia unknown",
            "dnssec",
            "nxdomain",
            "a domains",
            "download",
            "accept",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ios",
            "ireland",
            "servers",
            "msie",
            "chrome",
            "certificate",
            "hostname",
            "url analysis",
            "http response",
            "final url",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers date",
            "connection",
            "date sat",
            "html info",
            "forbidden",
            "google tag",
            "utc aw741566034",
            "utc redirection",
            "asnone united",
            "as54113",
            "cname",
            "script urls",
            "as19527 google",
            "as35280 acorus",
            "encrypt",
            "reverse dns",
            "location dublin",
            "domain name",
            "emails",
            "as23724",
            "as4812 china",
            "china",
            "win32mydoom jan",
            "ransom",
            "worm",
            "as4808 china",
            "browse scan",
            "endpoints all",
            "login",
            "sign up",
            "tulach",
            "c-67-181-73-197.hsd1.ca.comcast.net",
            "social engineering",
            "contact made by mark brian sabey",
            "contact made by o'dea",
            "benjamin c"
          ],
          "references": [
            "enterprise.cellebrite.com [ digitalclues.com]",
            "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
            "https://tulach.cc/ [malware engineering | phishing]",
            "deviceinbox.com [malware hosting]",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://timersys.com/ [ phishing | deb opera.com]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
            "message.htm.com [ message stealer]",
            "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
            "https://www.nsogroup.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
            "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
            "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
            "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
            "training001.blackbagtech.com [opportunity?]",
            "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
            "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
            "Tracking: 8.8.4.4 [ NOT a false.positive]",
            "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
            "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Virgin Islands, British"
          ],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Mydoom",
              "display_name": "Backdoor:Win32/Mydoom",
              "target": "/malware/Backdoor:Win32/Mydoom"
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4655,
            "URL": 9981,
            "FileHash-MD5": 219,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 6722,
            "hostname": 4341,
            "CVE": 2,
            "email": 12,
            "BitcoinAddress": 3
          },
          "indicator_count": 26148,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "753 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b5cbadc21b9891c459b9d2",
          "name": "NSO Group Pegasus spyware used nefariously",
          "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\ngovernment agencies detect and prevent terrorism and crime. \u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. Non terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
          "modified": "2024-03-27T00:05:34.925000",
          "created": "2024-01-28T03:36:13.975000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "october",
            "august",
            "september",
            "november",
            "april",
            "march",
            "tsara brashears",
            "copy",
            "execution",
            "metro",
            "awful",
            "attack",
            "quasar",
            "malicious",
            "crypto",
            "contact",
            "contacted",
            "pe resource",
            "communicating",
            "pegasus",
            "bundled",
            "historical ssl",
            "cellbrite",
            "core",
            "startpage",
            "ursnif",
            "amadey",
            "probe",
            "targets sa",
            "survivor",
            "referrer",
            "whois whois",
            "whois ssl",
            "apple",
            "status",
            "creation date",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse submit",
            "date",
            "next",
            "et exploit",
            "probe ms17010",
            "smbds ipc",
            "show",
            "service",
            "entries",
            "msf style",
            "generic flags",
            "pe32",
            "exploit",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "eternalblue",
            "playgame",
            "bitcoin",
            "virgin islands",
            "as19905",
            "record value",
            "unknown",
            "body",
            "meta",
            "error",
            "united",
            "as7922 comcast",
            "x ua",
            "ipv4",
            "pulse pulses",
            "files",
            "moved",
            "title",
            "gmt content",
            "cookie",
            "as15169 google",
            "mtb jan",
            "otx telemetry",
            "query",
            "trojan",
            "msr jan",
            "as29580 a1",
            "domain",
            "showing",
            "as8866",
            "cellebrite",
            "aaaa",
            "russia unknown",
            "dnssec",
            "nxdomain",
            "a domains",
            "download",
            "accept",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ios",
            "ireland",
            "servers",
            "as4808 china",
            "china",
            "reverse dns",
            "asnone united",
            "as54113",
            "cname",
            "domain name",
            "emails",
            "as23724",
            "as4812 china",
            "win32mydoom jan",
            "ransom",
            "worm",
            "browse scan",
            "endpoints all",
            "login",
            "sign up",
            "cellebrite",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "server",
            "domain status",
            "registrar abuse",
            "whois lookup",
            "contact email",
            "contact phone",
            "popularity",
            "rank position",
            "ingestion time",
            "cisco umbrella",
            "record type",
            "ttl value",
            "sa victim",
            "assaulter",
            "privilege https",
            "tulach"
          ],
          "references": [
            "enterprise.cellebrite.com [ digitalclues.com]",
            "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
            "https://tulach.cc/ [malware engineering | phishing]",
            "deviceinbox.com [malware hosting]",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://timersys.com/ [ phishing | deb opera.com]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
            "message.htm.com [ message stealer]",
            "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
            "https://www.nsogroup.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
            "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
            "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
            "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
            "training001.blackbagtech.com [opportunity?]",
            "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
            "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
            "Tracking: 8.8.4.4 [ NOT a false.positive]",
            "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
            "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Virgin Islands, British"
          ],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Mydoom",
              "display_name": "Backdoor:Win32/Mydoom",
              "target": "/malware/Backdoor:Win32/Mydoom"
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [
            "Civil Society",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4226,
            "URL": 9995,
            "FileHash-MD5": 241,
            "FileHash-SHA1": 235,
            "FileHash-SHA256": 6882,
            "hostname": 4402,
            "CVE": 2,
            "email": 13,
            "BitcoinAddress": 3
          },
          "indicator_count": 25999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "753 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b5cbbbcb7a479db222f053",
          "name": "NSO Group Pegasus spyware used nefariously",
          "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\ngovernment agencies detect and prevent terrorism and crime. \u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. Non terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
          "modified": "2024-03-27T00:05:34.925000",
          "created": "2024-01-28T03:36:27.745000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "october",
            "august",
            "september",
            "november",
            "april",
            "march",
            "tsara brashears",
            "copy",
            "execution",
            "metro",
            "awful",
            "attack",
            "quasar",
            "malicious",
            "crypto",
            "contact",
            "contacted",
            "pe resource",
            "communicating",
            "pegasus",
            "bundled",
            "historical ssl",
            "cellbrite",
            "core",
            "startpage",
            "ursnif",
            "amadey",
            "probe",
            "targets sa",
            "survivor",
            "referrer",
            "whois whois",
            "whois ssl",
            "apple",
            "status",
            "creation date",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse submit",
            "date",
            "next",
            "et exploit",
            "probe ms17010",
            "smbds ipc",
            "show",
            "service",
            "entries",
            "msf style",
            "generic flags",
            "pe32",
            "exploit",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "eternalblue",
            "playgame",
            "bitcoin",
            "virgin islands",
            "as19905",
            "record value",
            "unknown",
            "body",
            "meta",
            "error",
            "united",
            "as7922 comcast",
            "x ua",
            "ipv4",
            "pulse pulses",
            "files",
            "moved",
            "title",
            "gmt content",
            "cookie",
            "as15169 google",
            "mtb jan",
            "otx telemetry",
            "query",
            "trojan",
            "msr jan",
            "as29580 a1",
            "domain",
            "showing",
            "as8866",
            "cellebrite",
            "aaaa",
            "russia unknown",
            "dnssec",
            "nxdomain",
            "a domains",
            "download",
            "accept",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ios",
            "ireland",
            "servers",
            "as4808 china",
            "china",
            "reverse dns",
            "asnone united",
            "as54113",
            "cname",
            "domain name",
            "emails",
            "as23724",
            "as4812 china",
            "win32mydoom jan",
            "ransom",
            "worm",
            "browse scan",
            "endpoints all",
            "login",
            "sign up",
            "cellebrite",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "server",
            "domain status",
            "registrar abuse",
            "whois lookup",
            "contact email",
            "contact phone",
            "popularity",
            "rank position",
            "ingestion time",
            "cisco umbrella",
            "record type",
            "ttl value",
            "sa victim",
            "assaulter",
            "privilege https",
            "tulach"
          ],
          "references": [
            "enterprise.cellebrite.com [ digitalclues.com]",
            "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
            "https://tulach.cc/ [malware engineering | phishing]",
            "deviceinbox.com [malware hosting]",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://timersys.com/ [ phishing | deb opera.com]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
            "message.htm.com [ message stealer]",
            "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
            "https://www.nsogroup.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
            "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
            "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
            "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
            "training001.blackbagtech.com [opportunity?]",
            "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
            "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
            "Tracking: 8.8.4.4 [ NOT a false.positive]",
            "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
            "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Virgin Islands, British"
          ],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Mydoom",
              "display_name": "Backdoor:Win32/Mydoom",
              "target": "/malware/Backdoor:Win32/Mydoom"
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [
            "Civil Society",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4226,
            "URL": 9996,
            "FileHash-MD5": 241,
            "FileHash-SHA1": 235,
            "FileHash-SHA256": 6882,
            "hostname": 4402,
            "CVE": 2,
            "email": 13,
            "BitcoinAddress": 3
          },
          "indicator_count": 26000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "753 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e3fe91a1aceb955e54f6",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:30.147000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e3fe934ae9d391614c0d",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:30.585000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e4017a14cda8d09c9bf8",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:33.270000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b7e406028ca6f363f41315",
          "name": "NSO Group Pegasus",
          "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T17:44:38.424000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b8071976a7e6dccaabbada",
          "name": "NSO Group Pegasus",
          "description": "",
          "modified": "2024-02-28T15:01:20.140000",
          "created": "2024-01-29T20:14:17.001000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois whois",
            "communicating",
            "cellbrite",
            "urls http",
            "referrer",
            "historical ssl",
            "nullmixer",
            "smokeloader",
            "redline stealer",
            "installer",
            "hiddentear",
            "probe",
            "nso group",
            "pegasus",
            "community",
            "xcitium verdict",
            "cloud",
            "bitdefender",
            "history",
            "utc http",
            "response final",
            "url final",
            "ip address",
            "status code",
            "compiler",
            "basic",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "pe32 compiler",
            "rticon russian",
            "info header",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "russian",
            "overlay",
            "urls",
            "domains",
            "gandi sas",
            "contacted",
            "markmonitor",
            "ip detections",
            "country",
            "pe resource",
            "children",
            "file type",
            "ico mainicon",
            "linkid252669",
            "win32 dll",
            "ms visual",
            "win32 dynamic",
            "win32 exe",
            "files",
            "afrefhttp",
            "execution",
            "highly targeted",
            "http",
            "agent tesla",
            "blackbag",
            "relations most",
            "core",
            "malware",
            "emotet",
            "critical",
            "copy",
            "qakbot",
            "trojan",
            "ransomexx",
            "ryuk",
            "ransomware",
            "matanbuchus",
            "cobalt strike",
            "bazarloader",
            "as15169 google",
            "united",
            "passive dns",
            "aaaa",
            "title",
            "a domains",
            "body html",
            "head meta",
            "moved title",
            "tsara brashears",
            "offender",
            "Robert neill",
            "jeffery scott reimer",
            "assaulted",
            "sci",
            "warning",
            "denver",
            "death threats",
            "porn malvertizing",
            "bomb",
            "bomb threats"
          ],
          "references": [
            "https://www.nsogroup.com/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "ww.google.com.uy",
            "321Survive.exe",
            "https://en.m.wikipedia.org \u203a wiki NSO Group"
          ],
          "public": 1,
          "adversary": "NSO Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "trojan.wanna/wannacry",
              "display_name": "trojan.wanna/wannacry",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b7e406028ca6f363f41315",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 570,
            "URL": 2908,
            "FileHash-MD5": 98,
            "FileHash-SHA1": 84,
            "FileHash-SHA256": 2241,
            "hostname": 1043,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 6948,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b80944a3d1c9e36346e0c1",
          "name": "NSO Group Pegasus spyware used nefariously",
          "description": "",
          "modified": "2024-02-27T03:01:21.421000",
          "created": "2024-01-29T20:23:32.737000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "october",
            "august",
            "september",
            "november",
            "april",
            "march",
            "tsara brashears",
            "copy",
            "execution",
            "metro",
            "awful",
            "attack",
            "quasar",
            "malicious",
            "crypto",
            "contact",
            "contacted",
            "pe resource",
            "communicating",
            "pegasus",
            "bundled",
            "historical ssl",
            "cellbrite",
            "core",
            "startpage",
            "ursnif",
            "amadey",
            "probe",
            "targets sa",
            "survivor",
            "referrer",
            "whois whois",
            "whois ssl",
            "apple",
            "status",
            "creation date",
            "passive dns",
            "urls",
            "search",
            "expiration date",
            "name servers",
            "scan endpoints",
            "all octoseek",
            "pulse submit",
            "date",
            "next",
            "et exploit",
            "probe ms17010",
            "smbds ipc",
            "show",
            "service",
            "entries",
            "msf style",
            "generic flags",
            "pe32",
            "exploit",
            "malware",
            "dock",
            "push",
            "write",
            "win32",
            "eternalblue",
            "playgame",
            "bitcoin",
            "virgin islands",
            "as19905",
            "record value",
            "unknown",
            "body",
            "meta",
            "error",
            "united",
            "as7922 comcast",
            "x ua",
            "ipv4",
            "pulse pulses",
            "files",
            "moved",
            "title",
            "gmt content",
            "cookie",
            "as15169 google",
            "mtb jan",
            "otx telemetry",
            "query",
            "trojan",
            "msr jan",
            "as29580 a1",
            "domain",
            "showing",
            "as8866",
            "cellebrite",
            "aaaa",
            "russia unknown",
            "dnssec",
            "nxdomain",
            "a domains",
            "download",
            "accept",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ios",
            "ireland",
            "servers",
            "as4808 china",
            "china",
            "reverse dns",
            "asnone united",
            "as54113",
            "cname",
            "domain name",
            "emails",
            "as23724",
            "as4812 china",
            "win32mydoom jan",
            "ransom",
            "worm",
            "browse scan",
            "endpoints all",
            "login",
            "sign up",
            "cellebrite",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "server",
            "domain status",
            "registrar abuse",
            "whois lookup",
            "contact email",
            "contact phone",
            "popularity",
            "rank position",
            "ingestion time",
            "cisco umbrella",
            "record type",
            "ttl value",
            "sa victim",
            "assaulter",
            "privilege https",
            "tulach"
          ],
          "references": [
            "enterprise.cellebrite.com [ digitalclues.com]",
            "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
            "https://tulach.cc/ [malware engineering | phishing]",
            "deviceinbox.com [malware hosting]",
            "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
            "https://timersys.com/ [ phishing | deb opera.com]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
            "message.htm.com [ message stealer]",
            "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
            "https://www.nsogroup.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
            "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
            "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
            "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
            "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
            "training001.blackbagtech.com [opportunity?]",
            "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
            "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
            "Tracking: 8.8.4.4 [ NOT a false.positive]",
            "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
            "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Virgin Islands, British"
          ],
          "malware_families": [
            {
              "id": "Amadey",
              "display_name": "Amadey",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Mydoom",
              "display_name": "Backdoor:Win32/Mydoom",
              "target": "/malware/Backdoor:Win32/Mydoom"
            },
            {
              "id": "ETERNALBLUE",
              "display_name": "ETERNALBLUE",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [
            "Civil Society",
            "Healthcare"
          ],
          "TLP": "green",
          "cloned_from": "65b5cbbbcb7a479db222f053",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4174,
            "URL": 9617,
            "FileHash-MD5": 241,
            "FileHash-SHA1": 235,
            "FileHash-SHA256": 6801,
            "hostname": 4314,
            "CVE": 2,
            "email": 13,
            "BitcoinAddress": 3
          },
          "indicator_count": 25400,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "782 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "dns.msftncsi.com",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "alohatube.xyz [BotNetwork]",
        "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
        "https://www.nsogroup.com",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "http://nudeteenporn.site",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
        "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "321Survive.exe",
        "remote.utorrent.com [remote router logins]",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "enterprise.cellebrite.com [ digitalclues.com]",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "https://tulach.cc/ [malware engineering | phishing]",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "training001.blackbagtech.com [opportunity?]",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "demo.auth.civicalg.com.sni.cloudflaressl.com",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "23.216.147.64",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net",
        "facebooksunglassshop.com",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "\u2193\u2192Found in: https://house.mo.gov/\u2193",
        "ww.google.com.uy",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://en.m.wikipedia.org \u203a wiki NSO Group",
        "message.htm.com [ message stealer]",
        "https://www.nsogroup.com/",
        "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "deviceinbox.com [malware hosting]",
        "happyrabbit.kr [Apple iOS threat]",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO Group"
          ],
          "malware_families": [
            "Amadey",
            "Remcos rat",
            "Ursnif",
            "Bandit stealer",
            "Cobalt strike",
            "Win.trojan.midia-4",
            "Quasar rat",
            "Hallrender",
            "Maze",
            "Arid.viper_cnc",
            "Lockbit",
            "Agent tesla",
            "Qakbot",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Pegasus",
            "Backdoor:win32/mydoom",
            "Backdoor.win32.shiz.ufj",
            "Evilnum",
            "Qbot",
            "Nokoyawa ransomware",
            "Ransomware",
            "Asyncrat",
            "Azorult",
            "Wininicrypt",
            "Pws:win32/qqpass.ci",
            "Win32/socstealer!rfn",
            "Wannacry",
            "Email-worm.win32.brontok.n",
            "Tulach",
            "Hacktool",
            "Trojan.wanna/wannacry",
            "Chaos",
            "Njrat",
            "Keylogger",
            "Emotet",
            "Dark",
            "Ransomexx",
            "Flubot",
            "Djvu",
            "Eternalblue",
            "Win.trojan.agent-336074",
            "Parallax rat"
          ],
          "industries": [
            "Healthcare",
            "Civil society"
          ],
          "unique_indicators": 62149
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/damstracking.com",
    "whois": "http://whois.domaintools.com/damstracking.com",
    "domain": "damstracking.com",
    "hostname": "leaseway.damstracking.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "69bf8e2663d5480917ddb699",
      "name": "Pegasus - https://house.mo.gov/ | Brian Sabey HallRender [i cloned OctoSeek] T8",
      "description": "",
      "modified": "2026-03-22T08:35:26.266000",
      "created": "2026-03-22T06:37:26.233000",
      "tags": [
        "united",
        "as393601 state",
        "a domains",
        "passive dns",
        "as397241",
        "certificate",
        "urls",
        "search",
        "showing",
        "entries",
        "algorithm",
        "full name",
        "data",
        "v3 serial",
        "number",
        "cus cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "ca1 odigicert",
        "info",
        "record type",
        "ttl value",
        "all txt",
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "resolutions",
        "historical ssl",
        "communicating",
        "problems",
        "parent domain",
        "njrat",
        "ransomware",
        "startpage",
        "historical",
        "malware",
        "execution",
        "threat roundup",
        "april",
        "september",
        "remcos rat",
        "august",
        "june",
        "qakbot",
        "push",
        "service",
        "privateloader",
        "amadey",
        "powershell",
        "qbot",
        "cobalt strike",
        "core",
        "hacktool",
        "november",
        "october",
        "roundup",
        "threat network",
        "cellbrite",
        "february",
        "emotet",
        "maze",
        "metro",
        "dark",
        "malicious",
        "team",
        "critical",
        "copy",
        "awful",
        "parallax rat",
        "banker",
        "keylogger",
        "dns replication",
        "date",
        "csc corporate",
        "domains",
        "code",
        "server",
        "registrar abuse",
        "registrar iana",
        "registry domain",
        "registrar url",
        "registrar",
        "contact phone",
        "apple ios",
        "quasar",
        "remcos",
        "ursnif",
        "chaos",
        "ransomexx",
        "azorult",
        "agent tesla",
        "evilnum",
        "asyncrat",
        "win32 exe",
        "wininit",
        "beta version",
        "cmstp",
        "taskscheduler",
        "ieudinit",
        "nat32",
        "certsentry",
        "type name",
        "wc3 rpg",
        "pegasus",
        "unknown",
        "domain",
        "servers",
        "germany unknown",
        "name servers",
        "status",
        "next",
        "as29066 host",
        "as133618",
        "cname",
        "as47846",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "encrypt",
        "china unknown",
        "as38365 beijing",
        "as134175 unit",
        "707713",
        "hong kong",
        "virgin islands",
        "as6461 zayo",
        "ransom",
        "exploit",
        "ipv4",
        "pulse submit",
        "url analysis",
        "trojan",
        "body",
        "click",
        "creation date",
        "emails",
        "expiration date",
        "domain privacy",
        "hostname",
        "dynamicloader",
        "state",
        "medium",
        "msie",
        "windows nt",
        "wow64",
        "show",
        "slcc2",
        "media center",
        "error",
        "delphi",
        "guard",
        "write",
        "win32",
        "target",
        "redir",
        "facebook",
        "dcom",
        "local",
        "delete",
        "utf8",
        "unicode text",
        "crlf line",
        "rgba",
        "yara detections",
        "default",
        "asnone",
        "get na",
        "dns lookup",
        "probe ms17010",
        "eternalblue",
        "playgame",
        "high",
        "related pulses",
        "yara rule",
        "anomalous file",
        "dynamic",
        "malware infection",
        "cnc",
        "procmem_yara",
        "antivm_generic_disk",
        "modify_proxy infostealer_cookies",
        "network_http",
        "anomalous_deletefile",
        "antidebug_guardpages",
        "powershell_request",
        "powershell_download",
        "as63949 linode",
        "mtb feb",
        "open ports",
        "backdoor",
        "gmt content",
        "trojandropper",
        "simda",
        "lockbit",
        "win.trojan",
        "midia-4",
        "floxif",
        "cryptowall",
        "brontok",
        "check in",
        "record value",
        "files",
        "location united",
        "america asn",
        "as16509",
        "download",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls http",
        "samples",
        "tsara brashears",
        "2nd corintnthians 4:8-9",
        "injection_inter_process",
        "injection_create_remote_thread",
        "persistence_autorun",
        "bypass_firewall",
        "disables_windowsupdate",
        "dynamic_function_loading",
        "http_request",
        "query",
        "delete c",
        "activity dns",
        "components",
        "file execution",
        "observed dns",
        "as4837 china",
        "nxdomain",
        "a nxdomain",
        "wannacry",
        "missouri",
        "safebae",
        "hallrender",
        "house.mo.gov",
        "typosquatting",
        "tactics",
        "google",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "aes256gcm",
        "dalles",
        "cookie",
        "urls https",
        "xpcegvo2adsnq",
        "mhkz",
        "mvi2",
        "keepaliveyes",
        "fexp24007246",
        "nsyt",
        "eva reimer",
        "daisy coleman",
        "brian sabey",
        "https://lawlink.com/documents/10935/blackbag-technologies-announ"
      ],
      "references": [
        "https://house.mo.gov/ \u2022 house.mo.gov \u2022 mo.gov",
        "dns.msftncsi.com",
        "NSO Group - Pegasus: enterprise.cellebrite.com \u2022 cellebrite.com \u2022 erp002.blackbagtech.com \u2022 140.108.21.184",
        "Target\u2193\u2192 Tsara Brashears:  https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing",
        "23.216.147.64",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [Apple/ iOS unlocker password decryption]",
        "http://alohatube.xyz/search/tsara-brashears [Telecom \u2022 Brashears Telecom services modified (malicious)]",
        "alohatube.xyz [BotNetwork]",
        "facebooksunglassshop.com",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com - Lockbit Black 3.0, Observed AridViper CnC Domain, Win.Trojan.Midia-4",
        "oooooooooo.ga \u2022 rallypoint.com \u2022 pornhub.dev \u2022 chats.pornhub.dev \u2022 https://twitter.com/PORNO_SEXYBABES \u2022 https://matrix.pornhub.dev \u2022 https://git.pornhub.dev",
        "http://dobkinfamily.com/__media__/js/netsoltrademark.php?d=www.fap18pgals.eu/cum-on-ass-porn/",
        "government.westlaw.com \u2022 hero9780.duckdns.org \u2022 hallrender.com \u2022 miles-andmore.duckdns.org",
        "https://otx.alienvault.com/indicator/url/https://miles-andmore.duckdns.org/ihFKGyel4wizIPNVvHHQQIuHfl4hEb2F6gWEXupmNDuiMJgJtshSlLFmilf3zCT2EF/index.html",
        "remote.utorrent.com [remote router logins]",
        "Tracking: http://www.trackip.net/ip \u2022 gfx.ms \u2022 dssruletracker.mo.gov [network] \u2022 earlyconnections.mo.gov \u2022 www77.trackerspy.com \u2022 ww38.track.updatevideos.com",
        "http://tracking.studyportalsmail.com/about/privacy/?cdmtw=BAAAIAEAIGmGCaIK4E8-IsDv \u2022 tracking.studyportalsmail.com \u2022 plugtrack.online",
        "http://images.startappservice.com/image/fetch/f_auto \u2022 track.smtpsendemail.com \u2022 nr-data.net [apple] \u2022 lg.as35280.net \u2022 leaseway.damstracking.com",
        "http://tvm77.fashiongup.in/tracking/track-open",
        "https://www.house.mo.gov:80/messageboard/ \u2022 extranet16.mo.gov \u2022 login.mo.gov \u2022 witness.house.mo.gov \u2022 dps.mo.gov \u2022 dev-publicdefender.mo.gov",
        "https://www.hallrender.com/wp-content/uploads/2016/02/Denver-150x150.jpg",
        "http://hallrender.com/attorney/brian-sabey \u2022 https://hallrender.com/attorney/brian-sabey \u2022 https://www.hallrender.com/attorney/brian-sabey/Accept",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-150x150.png",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-266x266.png",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https://www.hallrender.com/attorney/brian-sabey/&",
        "https://www.hallrender.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.hallrender.com%2Fattorney%2Fbrian-sabey%2F&",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-48x48.png \u2022 http://2fwww.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-406x406.png \u2022 https://vcards.hallrender.com/",
        "https://www.hallrender.com/wp-content/uploads/2017/10/Sabey_Brian_web-300x300.png \u2022 http://mail2.hallrender.com/",
        "hallrender.com \u2022 government.westlaw.com \u2022 http://dev.hallrender.com/ \u2022 https://mercy.hallrender.com/ \u2022 autodiscover.hallrender.com",
        "http://web2.westlaw.com/find/default.wl?tf=-1&rs=WLW9.10&referencepositiontype=S&serialnum=1987042953&fn=_top&sv=Split&referenceposition=1555&pbc=D5845283&tc=-1&ordoc=1989026578&findtype=Y&db=708&vr=2.0&rp=/find/default.wl&mt=208",
        "https://otx.alienvault.com/indicator/ip/45.56.79.23 \u2022 batchcourtexpressservices.westlaw.com \u2022 courtexpress.westlaw.com",
        "safebae.org \u2022 rp.dudaran2.com \u2022 www.safebae.org \u2022 https://safebae.org/%20%5B \u2022 https://safebae.org/about/ \u2022 https://safebae.org/",
        "https://safebae.org/wp-content/plugins/addons-for-visual-composer/assets/js/slick.min.js?ver=2.9.2 \u2022 https://api.w.org/ \u2022 247.0.198.104.bc.googleusercontent.com",
        "https://safebae.org/wp-json/ \u2022 https://safebae.org/wp-content/plugins/embed-any-document/css/embed-public.min.css?ver=2.7.4",
        "Malware Hosting: http://81.5.88.13/dbreader.exe \u2022 http://utasoft.ru/catalog/view/javascript/jquery/ui/jquery-ui-1.8.16.custom.min.js",
        "Apple Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [ Apple unlocker, decryption via media]",
        "Malware Hosting: deviceinbox.com \u2022 http://www.hakoonportal.net/240714d/240714_t2.exe \u2022103.246.145.111 \u2022 Spyware: stream.ntpserver.store",
        "https://nl.toyota.be/tme [vehicle spyware, camera, data, speakers]",
        "http://link.mcsa.org/api/LinkHandler/getaction?redirectParam2=K09weU5vMDBKWW90Wk1hcHl4SmF4NGtHbnBGbjJaVElud2tpMlBaUGhseXZNM0JLaHRaUnJZOVh1bmMvSVhYWDZhb0UwY2hPaGVuSGNDRUFYeHNzWWFQL0dBNVlRVmlTSGpXa016bUQzWUZ6cVZRcktRTmRyZHJPYlBrY1NpSyt6ZzBrS0FjWk9EYSs4WmdOc2RBU09CR1RjWVNiTUZpYkhNV1lvNzkwbzhLMUxDUzQzS0FaVU5LYTZWSUZoS1Vt",
        "sexuallybroken.info \u2022 sinful-bordello.top-sex.us \u2022 crackedtool.com \u2022 kddi-cloud.com \u2022 http://tuksex.duckdns.org/bb/login.php",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [
        "United States of America",
        "China",
        "Australia",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Chaos",
          "display_name": "Chaos",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "EVILNUM",
          "display_name": "EVILNUM",
          "target": null
        },
        {
          "id": "Dark",
          "display_name": "Dark",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Keylogger",
          "display_name": "Keylogger",
          "target": null
        },
        {
          "id": "Maze",
          "display_name": "Maze",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "Parallax RAT",
          "display_name": "Parallax RAT",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Remcos RAT",
          "display_name": "Remcos RAT",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-336074",
          "display_name": "Win.Trojan.Agent-336074",
          "target": null
        },
        {
          "id": "Arid.Viper_CnC",
          "display_name": "Arid.Viper_CnC",
          "target": null
        },
        {
          "id": "WininiCrypt",
          "display_name": "WininiCrypt",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.CI",
          "display_name": "PWS:Win32/QQpass.CI",
          "target": "/malware/PWS:Win32/QQpass.CI"
        },
        {
          "id": "Win.Trojan.Midia-4",
          "display_name": "Win.Trojan.Midia-4",
          "target": null
        },
        {
          "id": "LockBit",
          "display_name": "LockBit",
          "target": null
        },
        {
          "id": "Win32/SocStealer!rfn",
          "display_name": "Win32/SocStealer!rfn",
          "target": null
        },
        {
          "id": "Backdoor.Win32.Shiz.ufj",
          "display_name": "Backdoor.Win32.Shiz.ufj",
          "target": null
        },
        {
          "id": "Email-Worm.Win32.Brontok.n",
          "display_name": "Email-Worm.Win32.Brontok.n",
          "target": null
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "WannaCry",
          "display_name": "WannaCry",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65c91f2b7c03b480379ae4d1",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2668,
        "FileHash-SHA1": 2469,
        "FileHash-SHA256": 8054,
        "URL": 6185,
        "domain": 2421,
        "hostname": 3042,
        "CVE": 5,
        "email": 15,
        "CIDR": 1,
        "IPv4": 18
      },
      "indicator_count": 24878,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "28 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "686ab98ff0cb9baa4e2b2000",
      "name": "https://house.mo.gov/ Palantir Technologies HARMFUL (copied  OctoseekPulse)  Attacks SA victims?",
      "description": "",
      "modified": "2025-08-05T21:02:46.419000",
      "created": "2025-07-06T17:59:43.440000",
      "tags": [
        "runtime process",
        "localappdata",
        "size",
        "sha256",
        "sha1",
        "temp",
        "prefetch8",
        "prefetch1",
        "unicode text",
        "type data",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "mitre",
        "writes a pe file header to disc",
        "show process",
        "date",
        "document file",
        "v2 document",
        "ascii text",
        "malicious",
        "local",
        "path",
        "found",
        "ssl certificate",
        "whois record",
        "threat roundup",
        "contacted",
        "october",
        "resolutions",
        "apple ios",
        "referrer",
        "communicating",
        "execution",
        "june",
        "august",
        "emotet",
        "qakbot",
        "agent tesla",
        "azorult",
        "core",
        "maze",
        "metro",
        "dark",
        "team",
        "critical",
        "copy",
        "awful",
        "ursnif",
        "hacktool",
        "info",
        "qbot",
        "april",
        "njrat",
        "nokoyawa",
        "djvu",
        "flubot",
        "ransomware",
        "bandit stealer",
        "hallrender",
        "spyware",
        "safebae",
        "tsara brashears",
        "westlaw",
        "river.rocks",
        "brian sabey",
        "targeting",
        "dnspionage",
        "united",
        "unknown",
        "search",
        "aaaa",
        "showing",
        "domain",
        "creation date",
        "record value",
        "dnssec",
        "body",
        "passive dns",
        "encrypt",
        "as14061",
        "germany unknown",
        "as397240",
        "gmt server",
        "443 ma2592000",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "main",
        "installing",
        "as16276",
        "france unknown",
        "name servers",
        "as8075",
        "servers",
        "next",
        "as63949 linode",
        "as206834 team",
        "canada unknown",
        "status",
        "as61969 team",
        "msie",
        "chrome",
        "ransom",
        "gone",
        "title",
        "head body",
        "malware"
      ],
      "references": [
        "\u2193\u2192Found in: https://house.mo.gov/\u2193",
        "dns.msftncsi.com \u2022 https://dns.msftncsi.com/ \u2022 http://dns.msftncsi.com/",
        "demo.auth.civicalg.com.sni.cloudflaressl.com",
        "happyrabbit.kr [Apple iOS threat]",
        "https://appletoncdn.xyz/l/26422915e0d4f6f88646?sub=5eafeec1af7c0a0001960f44&source=81 \u2022 appletoncdn.xyz",
        "https://tracking.s-unlock.com \u2022 https://ignaciob.com/track/click/v2-318692303 \u2022 adepttracker.com \u2022",
        "https://your-sugar-girls.com/cams/default/adult/5277/index.html?p1=https://bongacams10.com/track?c=621661&subid=1a1d33f51a7179480c6d4aeb40d3a5a1&subid2=16969639",
        "https://click.stecloud.us/campaign/track-email/384458660__3339__6837152__393",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://enter.private.com/track/MTIxODEuNjEuMi41MjEuMTAxMC4wLjAuMC4w/join",
        "http://nudeteenporn.site"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Nokoyawa Ransomware",
          "display_name": "Nokoyawa Ransomware",
          "target": null
        },
        {
          "id": "Bandit Stealer",
          "display_name": "Bandit Stealer",
          "target": null
        },
        {
          "id": "FluBot",
          "display_name": "FluBot",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "QBot",
          "display_name": "QBot",
          "target": null
        },
        {
          "id": "QakBot",
          "display_name": "QakBot",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Ursnif",
          "display_name": "Ursnif",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Djvu",
          "display_name": "Djvu",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Maze",
          "display_name": "Maze",
          "target": null
        },
        {
          "id": "Dark",
          "display_name": "Dark",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1065",
          "name": "Uncommonly Used Port",
          "display_name": "T1065 - Uncommonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65c96df8fe0657d56a206a49",
      "export_count": 42,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 251,
        "FileHash-SHA1": 211,
        "FileHash-SHA256": 3226,
        "domain": 1867,
        "URL": 10030,
        "hostname": 2919,
        "CVE": 7,
        "email": 6
      },
      "indicator_count": 18517,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "256 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b5c5ebba25ca46fc5b36bc",
      "name": "NSO Group Pegasus spyware found attack a US citizen. Silencing",
      "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\n\u2022NSO Group develops best-in-class technology to help government agencies detect and prevent terrorism and crime.\n\u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. \nNon terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
      "modified": "2024-03-27T00:05:34.925000",
      "created": "2024-01-28T03:11:39.752000",
      "tags": [
        "whois record",
        "ssl certificate",
        "threat roundup",
        "october",
        "august",
        "september",
        "november",
        "april",
        "march",
        "tsara brashears",
        "copy",
        "execution",
        "metro",
        "awful",
        "attack",
        "quasar",
        "malicious",
        "crypto",
        "contact",
        "contacted",
        "pe resource",
        "communicating",
        "pegasus",
        "bundled",
        "historical ssl",
        "cellbrite",
        "core",
        "startpage",
        "ursnif",
        "amadey",
        "probe",
        "targets sa",
        "survivor",
        "referrer",
        "whois whois",
        "whois ssl",
        "apple",
        "status",
        "creation date",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse submit",
        "date",
        "next",
        "et exploit",
        "probe ms17010",
        "smbds ipc",
        "show",
        "service",
        "entries",
        "msf style",
        "generic flags",
        "pe32",
        "exploit",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "eternalblue",
        "playgame",
        "bitcoin",
        "virgin islands",
        "as19905",
        "record value",
        "unknown",
        "body",
        "meta",
        "error",
        "united",
        "as7922 comcast",
        "x ua",
        "ipv4",
        "pulse pulses",
        "files",
        "moved",
        "title",
        "gmt content",
        "cookie",
        "as15169 google",
        "mtb jan",
        "otx telemetry",
        "query",
        "trojan",
        "msr jan",
        "as29580 a1",
        "domain",
        "showing",
        "as8866",
        "cellebrite",
        "aaaa",
        "russia unknown",
        "dnssec",
        "nxdomain",
        "a domains",
        "download",
        "accept",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ios",
        "ireland",
        "servers",
        "msie",
        "chrome",
        "certificate",
        "hostname",
        "url analysis",
        "http response",
        "final url",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers date",
        "connection",
        "date sat",
        "html info",
        "forbidden",
        "google tag",
        "utc aw741566034",
        "utc redirection",
        "asnone united",
        "as54113",
        "cname",
        "script urls",
        "as19527 google",
        "as35280 acorus",
        "encrypt",
        "reverse dns",
        "location dublin",
        "domain name",
        "emails",
        "as23724",
        "as4812 china",
        "china",
        "win32mydoom jan",
        "ransom",
        "worm",
        "as4808 china",
        "browse scan",
        "endpoints all",
        "login",
        "sign up",
        "tulach",
        "c-67-181-73-197.hsd1.ca.comcast.net",
        "social engineering",
        "contact made by mark brian sabey",
        "contact made by o'dea",
        "benjamin c"
      ],
      "references": [
        "enterprise.cellebrite.com [ digitalclues.com]",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "https://tulach.cc/ [malware engineering | phishing]",
        "deviceinbox.com [malware hosting]",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "message.htm.com [ message stealer]",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "https://www.nsogroup.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
        "training001.blackbagtech.com [opportunity?]",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "Germany",
        "Virgin Islands, British"
      ],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Mydoom",
          "display_name": "Backdoor:Win32/Mydoom",
          "target": "/malware/Backdoor:Win32/Mydoom"
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 4655,
        "URL": 9981,
        "FileHash-MD5": 219,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 6722,
        "hostname": 4341,
        "CVE": 2,
        "email": 12,
        "BitcoinAddress": 3
      },
      "indicator_count": 26148,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "753 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b5cbadc21b9891c459b9d2",
      "name": "NSO Group Pegasus spyware used nefariously",
      "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\ngovernment agencies detect and prevent terrorism and crime. \u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. Non terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
      "modified": "2024-03-27T00:05:34.925000",
      "created": "2024-01-28T03:36:13.975000",
      "tags": [
        "whois record",
        "ssl certificate",
        "threat roundup",
        "october",
        "august",
        "september",
        "november",
        "april",
        "march",
        "tsara brashears",
        "copy",
        "execution",
        "metro",
        "awful",
        "attack",
        "quasar",
        "malicious",
        "crypto",
        "contact",
        "contacted",
        "pe resource",
        "communicating",
        "pegasus",
        "bundled",
        "historical ssl",
        "cellbrite",
        "core",
        "startpage",
        "ursnif",
        "amadey",
        "probe",
        "targets sa",
        "survivor",
        "referrer",
        "whois whois",
        "whois ssl",
        "apple",
        "status",
        "creation date",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse submit",
        "date",
        "next",
        "et exploit",
        "probe ms17010",
        "smbds ipc",
        "show",
        "service",
        "entries",
        "msf style",
        "generic flags",
        "pe32",
        "exploit",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "eternalblue",
        "playgame",
        "bitcoin",
        "virgin islands",
        "as19905",
        "record value",
        "unknown",
        "body",
        "meta",
        "error",
        "united",
        "as7922 comcast",
        "x ua",
        "ipv4",
        "pulse pulses",
        "files",
        "moved",
        "title",
        "gmt content",
        "cookie",
        "as15169 google",
        "mtb jan",
        "otx telemetry",
        "query",
        "trojan",
        "msr jan",
        "as29580 a1",
        "domain",
        "showing",
        "as8866",
        "cellebrite",
        "aaaa",
        "russia unknown",
        "dnssec",
        "nxdomain",
        "a domains",
        "download",
        "accept",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ios",
        "ireland",
        "servers",
        "as4808 china",
        "china",
        "reverse dns",
        "asnone united",
        "as54113",
        "cname",
        "domain name",
        "emails",
        "as23724",
        "as4812 china",
        "win32mydoom jan",
        "ransom",
        "worm",
        "browse scan",
        "endpoints all",
        "login",
        "sign up",
        "cellebrite",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "server",
        "domain status",
        "registrar abuse",
        "whois lookup",
        "contact email",
        "contact phone",
        "popularity",
        "rank position",
        "ingestion time",
        "cisco umbrella",
        "record type",
        "ttl value",
        "sa victim",
        "assaulter",
        "privilege https",
        "tulach"
      ],
      "references": [
        "enterprise.cellebrite.com [ digitalclues.com]",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "https://tulach.cc/ [malware engineering | phishing]",
        "deviceinbox.com [malware hosting]",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "message.htm.com [ message stealer]",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "https://www.nsogroup.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
        "training001.blackbagtech.com [opportunity?]",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "Germany",
        "Virgin Islands, British"
      ],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Mydoom",
          "display_name": "Backdoor:Win32/Mydoom",
          "target": "/malware/Backdoor:Win32/Mydoom"
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [
        "Civil Society",
        "Healthcare"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 4226,
        "URL": 9995,
        "FileHash-MD5": 241,
        "FileHash-SHA1": 235,
        "FileHash-SHA256": 6882,
        "hostname": 4402,
        "CVE": 2,
        "email": 13,
        "BitcoinAddress": 3
      },
      "indicator_count": 25999,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "753 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b5cbbbcb7a479db222f053",
      "name": "NSO Group Pegasus spyware used nefariously",
      "description": "\u2022 Cellebrite Empowers Law Enforcement Agencies with The Leading Digital Forensic Solutions\ngovernment agencies detect and prevent terrorism and crime. \u2022Pegasus reveals all to the NSO customers who control it \u2014 text messages, photos, emails, videos, contact lists \u2014 and can record phone calls. Non terrorist. Assaulted in physical therapy. Critically injurer. Immediate cyber attacks including NSO Group. Very dangerous. Unsuspected interaction with bad actors is a thing.",
      "modified": "2024-03-27T00:05:34.925000",
      "created": "2024-01-28T03:36:27.745000",
      "tags": [
        "whois record",
        "ssl certificate",
        "threat roundup",
        "october",
        "august",
        "september",
        "november",
        "april",
        "march",
        "tsara brashears",
        "copy",
        "execution",
        "metro",
        "awful",
        "attack",
        "quasar",
        "malicious",
        "crypto",
        "contact",
        "contacted",
        "pe resource",
        "communicating",
        "pegasus",
        "bundled",
        "historical ssl",
        "cellbrite",
        "core",
        "startpage",
        "ursnif",
        "amadey",
        "probe",
        "targets sa",
        "survivor",
        "referrer",
        "whois whois",
        "whois ssl",
        "apple",
        "status",
        "creation date",
        "passive dns",
        "urls",
        "search",
        "expiration date",
        "name servers",
        "scan endpoints",
        "all octoseek",
        "pulse submit",
        "date",
        "next",
        "et exploit",
        "probe ms17010",
        "smbds ipc",
        "show",
        "service",
        "entries",
        "msf style",
        "generic flags",
        "pe32",
        "exploit",
        "malware",
        "dock",
        "push",
        "write",
        "win32",
        "eternalblue",
        "playgame",
        "bitcoin",
        "virgin islands",
        "as19905",
        "record value",
        "unknown",
        "body",
        "meta",
        "error",
        "united",
        "as7922 comcast",
        "x ua",
        "ipv4",
        "pulse pulses",
        "files",
        "moved",
        "title",
        "gmt content",
        "cookie",
        "as15169 google",
        "mtb jan",
        "otx telemetry",
        "query",
        "trojan",
        "msr jan",
        "as29580 a1",
        "domain",
        "showing",
        "as8866",
        "cellebrite",
        "aaaa",
        "russia unknown",
        "dnssec",
        "nxdomain",
        "a domains",
        "download",
        "accept",
        "url https",
        "http",
        "ip address",
        "related nids",
        "files location",
        "ios",
        "ireland",
        "servers",
        "as4808 china",
        "china",
        "reverse dns",
        "asnone united",
        "as54113",
        "cname",
        "domain name",
        "emails",
        "as23724",
        "as4812 china",
        "win32mydoom jan",
        "ransom",
        "worm",
        "browse scan",
        "endpoints all",
        "login",
        "sign up",
        "cellebrite",
        "algorithm",
        "data",
        "v3 serial",
        "number",
        "cus cnr3",
        "olet",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "server",
        "domain status",
        "registrar abuse",
        "whois lookup",
        "contact email",
        "contact phone",
        "popularity",
        "rank position",
        "ingestion time",
        "cisco umbrella",
        "record type",
        "ttl value",
        "sa victim",
        "assaulter",
        "privilege https",
        "tulach"
      ],
      "references": [
        "enterprise.cellebrite.com [ digitalclues.com]",
        "http://www.pegasustech.net/Pegasustechnology/ProductDetails.aspx?pid=Pegasus RIMS",
        "https://tulach.cc/ [malware engineering | phishing]",
        "deviceinbox.com [malware hosting]",
        "http://auditrage.top/Rossmaansywh/tb.php?wmtvjltu",
        "https://timersys.com/ [ phishing | deb opera.com]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/ [malware | evader]",
        "message.htm.com [ message stealer]",
        "https://www.nsogroup.com/governance/whistleblower-policies/ [ Attacking whistle blower. PT documentedly assaulted and injured patient. PMD blew whistle warning PT]",
        "https://www.nsogroup.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [ Tracking BotNetwork malvertizing SA victims name. His name was Jeffrey Scott Reimer DPT, changed after causing SCI]",
        "https://pin.it/ [ Pegasus Pinterest. Collecting everything Tsara does ]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [ Enters through apple music app.]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Password cracker ios unlocker | made you look tactics]",
        "Libel. Brashears confirms straight status. Has never been with a female. Advocates humane rights for all. Matthew Shepard Lives on.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Data collection]",
        "https://www.blackbagtech.com/wp-content/uploads/2020/04/BlackLight-QuickStart-Guide-v2020R1.pdf",
        "https://lawlink.com/documents/10935/blackbag-technologies-announces-new-release-of-blacklight-forensic-software [wildly abused by Mark Brian Sabey \u2022 HallRender.com & others]",
        "training001.blackbagtech.com [opportunity?]",
        "https://otx.alienvault.com/indicator/hostname/apptree.comcast.net",
        "nr-data.net [Apple Private Data Collection] data.net points to aps.net",
        "Tracking: 8.8.4.4 [ NOT a false.positive]",
        "https://api.hireez.com/webhooks/tracking-v2/click/46ecdc52-c791-4f1f-8167-c0cfd752727b",
        "Found in malicious DGA domain of Law Firm | c-67-181-73-197.hsd1.ca.comcast.net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Netherlands",
        "Germany",
        "Virgin Islands, British"
      ],
      "malware_families": [
        {
          "id": "Amadey",
          "display_name": "Amadey",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Mydoom",
          "display_name": "Backdoor:Win32/Mydoom",
          "target": "/malware/Backdoor:Win32/Mydoom"
        },
        {
          "id": "ETERNALBLUE",
          "display_name": "ETERNALBLUE",
          "target": null
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [
        "Civil Society",
        "Healthcare"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 4226,
        "URL": 9996,
        "FileHash-MD5": 241,
        "FileHash-SHA1": 235,
        "FileHash-SHA256": 6882,
        "hostname": 4402,
        "CVE": 2,
        "email": 13,
        "BitcoinAddress": 3
      },
      "indicator_count": 26000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "753 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e3fe91a1aceb955e54f6",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:30.147000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e3fe934ae9d391614c0d",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:30.585000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e4017a14cda8d09c9bf8",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:33.270000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b7e406028ca6f363f41315",
      "name": "NSO Group Pegasus",
      "description": "NSO Group\nNSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click.\n\nHeavily targeting Tsara Brashears\nSet in motion when  Brashears  was attacked and critically injured by Jeffrey Scott Reimer DPT in Denver Colorado at  Concentra AMS whilst bit knowing she was in the American Workers compensation system. Brashears was not represented by an attorney at the time. She was threatened by Mark Montano MD who wanted wife to be elected coroner. Denied care for a spinal cord injury. All records stolen or falsified. Death threats and other cyber or physical attacks, contact with this strange group is common. Recent, injurious attempt on life dismissed by alleged detective by phone. Found, confirmed, let another offender walk. Ghost car. Ghost offender. Frightened attorneys?  I am her only advocate.",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T17:44:38.424000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b8071976a7e6dccaabbada",
      "name": "NSO Group Pegasus",
      "description": "",
      "modified": "2024-02-28T15:01:20.140000",
      "created": "2024-01-29T20:14:17.001000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois whois",
        "communicating",
        "cellbrite",
        "urls http",
        "referrer",
        "historical ssl",
        "nullmixer",
        "smokeloader",
        "redline stealer",
        "installer",
        "hiddentear",
        "probe",
        "nso group",
        "pegasus",
        "community",
        "xcitium verdict",
        "cloud",
        "bitdefender",
        "history",
        "utc http",
        "response final",
        "url final",
        "ip address",
        "status code",
        "compiler",
        "basic",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "pe32 compiler",
        "rticon russian",
        "info header",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "russian",
        "overlay",
        "urls",
        "domains",
        "gandi sas",
        "contacted",
        "markmonitor",
        "ip detections",
        "country",
        "pe resource",
        "children",
        "file type",
        "ico mainicon",
        "linkid252669",
        "win32 dll",
        "ms visual",
        "win32 dynamic",
        "win32 exe",
        "files",
        "afrefhttp",
        "execution",
        "highly targeted",
        "http",
        "agent tesla",
        "blackbag",
        "relations most",
        "core",
        "malware",
        "emotet",
        "critical",
        "copy",
        "qakbot",
        "trojan",
        "ransomexx",
        "ryuk",
        "ransomware",
        "matanbuchus",
        "cobalt strike",
        "bazarloader",
        "as15169 google",
        "united",
        "passive dns",
        "aaaa",
        "title",
        "a domains",
        "body html",
        "head meta",
        "moved title",
        "tsara brashears",
        "offender",
        "Robert neill",
        "jeffery scott reimer",
        "assaulted",
        "sci",
        "warning",
        "denver",
        "death threats",
        "porn malvertizing",
        "bomb",
        "bomb threats"
      ],
      "references": [
        "https://www.nsogroup.com/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "ww.google.com.uy",
        "321Survive.exe",
        "https://en.m.wikipedia.org \u203a wiki NSO Group"
      ],
      "public": 1,
      "adversary": "NSO Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "trojan.wanna/wannacry",
          "display_name": "trojan.wanna/wannacry",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65b7e406028ca6f363f41315",
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 570,
        "URL": 2908,
        "FileHash-MD5": 98,
        "FileHash-SHA1": 84,
        "FileHash-SHA256": 2241,
        "hostname": 1043,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 6948,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "781 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://leaseway.damstracking.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://leaseway.damstracking.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631464.4108508
}