{
  "type": "URL",
  "indicator": "https://local.hayatouki.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://local.hayatouki.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2944035005,
      "indicator": "https://local.hayatouki.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "68e2b9fd811ffc6684ba25f7",
          "name": "Isolated DoD now DoW nodes - emotional commentary",
          "description": "*https://www.sentient.industries/\n*trk.b.jackrogersusa.com\n*http://trk.southerntide.com/\nOTX is auto populating this pulse. Let\u2019s see\u2026",
          "modified": "2025-11-04T18:01:18.650000",
          "created": "2025-10-05T18:33:33.277000",
          "tags": [
            "united",
            "present feb",
            "present may",
            "aaaa",
            "present jul",
            "passive dns",
            "ip address",
            "present dec",
            "present sep",
            "present jun",
            "url https",
            "url http",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "germany",
            "taiwan",
            "netherlands",
            "china",
            "search",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "null",
            "refresh",
            "body",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "title",
            "look",
            "verify",
            "restart",
            "filehashmd5",
            "hostname",
            "filehashsha256",
            "types of",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "ruby",
            "jeffrey reimer",
            "target",
            "tsara",
            "information",
            "capture",
            "gather victim",
            "report spam",
            "kill targets",
            "created",
            "starfield",
            "show technique",
            "date"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1180",
              "name": "Screensaver",
              "display_name": "T1180 - Screensaver"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1333,
            "domain": 355,
            "URL": 5874,
            "hostname": 1066,
            "FileHash-SHA1": 101,
            "FileHash-MD5": 88,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8819,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "166 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658dd276d03bca9b7a93b724",
          "name": "Makop | Lazarus | Spyware",
          "description": "Privilege abuse. Spyware and miscellaneous cyber attacks leveraged against various individuals using escalated privileges. Pegasus was found, not thoroughly explored.",
          "modified": "2024-01-27T18:02:23.517000",
          "created": "2023-12-28T19:54:30.287000",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "iocs",
            "ipv4",
            "filehashmd5",
            "next",
            "scan endpoints",
            "all octoseek",
            "url http",
            "url https",
            "create new",
            "deptid24124",
            "deptid23922",
            "deptid23936",
            "sid339",
            "filehashsha256",
            "navmode3",
            "ommidsf3558",
            "usbuy no",
            "type33554433",
            "guid",
            "smauthreason0",
            "methodhead",
            "targetsmhttps",
            "exact",
            "a9 no",
            "langid1",
            "actmsgs1",
            "christmas",
            "pinlbtn",
            "pinl2",
            "uidtokenhttps",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "filehashsha1",
            "email",
            "contact",
            "contacted",
            "pegasus",
            "T1622 - Debugger Evasion",
            "wmi string",
            "windows nt",
            "request email",
            "apple",
            "search",
            "server",
            "resolutions",
            "san francisco",
            "route",
            "server ca",
            "sha2 secure",
            "show technique",
            "sign",
            "sprint personal",
            "status",
            "ssl certificate",
            "stateprovince",
            "text",
            "test",
            "subdomains",
            "surry hills",
            "teams api",
            "uknown",
            "threat analyzer",
            "threat",
            "target",
            "tsara brashears",
            "united",
            "urls",
            "win64",
            "windir",
            "urls http",
            "v3 serial",
            "validity",
            "referrer",
            "registrar abuse",
            "report",
            "report registrar abuse",
            "ransomware",
            "record value",
            "programfiles",
            "priority",
            "port scan",
            "pe32",
            "pegasus",
            "pe resource",
            "path",
            "paste",
            "passive dns",
            "password",
            "orgtechhandle",
            "orgtechphone",
            "orgtechref",
            "open",
            "orgabusehandle",
            "orgabuseref",
            "asn asn",
            "asn database",
            "bernhardplein",
            "big tech",
            "body xml",
            "body",
            "xml",
            "ck id",
            "cloudflare",
            "as8100",
            "akamai as36786",
            "as16625",
            "arin",
            "analyze",
            "api ip",
            "amazons3",
            "akamaias",
            "akamai",
            "aibv hostmaster",
            "access type",
            "abuse contact",
            "audiologist inc",
            "nothing number",
            "united",
            "brashears",
            "verdict",
            "net10464001",
            "new ioc",
            "next noc",
            "bv",
            "bv  orgid cambridge",
            "cambridge",
            "certificate",
            "certificate city",
            "ck id",
            "city",
            "brute force",
            "communicating",
            "copy core",
            "copy",
            "core",
            "cus",
            "cndigicert",
            "date",
            "detections",
            "detection type",
            "dhs discover",
            "dns",
            "discover",
            "hallrender",
            "briansabey",
            "brian sabey",
            "hall render",
            "dhs",
            "domain name",
            "download",
            "download sample",
            "email",
            "europeberlin",
            "execution",
            "falcon",
            "falcon sandbox",
            "false",
            "feeds",
            "feeds ioc",
            "first",
            "form",
            "frankfurt",
            "full name",
            "gameskinny",
            "gecko",
            "germany",
            "getprocaddress",
            "hacktool",
            "historical ssl",
            "hostnames",
            "hybrid",
            "ibm",
            "ibm business",
            "installer",
            "installer internet",
            "ioc search",
            "iocs",
            "ip address",
            "ip geolocation",
            "stealer",
            "ipinfo",
            "issuer",
            "javascript",
            "jb",
            "jb country",
            "khtml",
            "lazarus",
            "little",
            "lolkek",
            "main",
            "makop",
            "markmonitor",
            "microsoft",
            "mitre att",
            "ms windows",
            "name name"
          ],
          "references": [
            "uat.identityssl.newscdn.com.au",
            "gameskinny.com",
            "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
            "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "Makop Ransomware",
              "display_name": "Makop Ransomware",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Lazarus",
              "display_name": "Lazarus",
              "target": null
            },
            {
              "id": "Little",
              "display_name": "Little",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1559",
              "name": "Inter-Process Communication",
              "display_name": "T1559 - Inter-Process Communication"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2108,
            "FileHash-SHA1": 1248,
            "domain": 668,
            "hostname": 1340,
            "URL": 2652,
            "FileHash-SHA256": 1070,
            "email": 25,
            "CIDR": 4
          },
          "indicator_count": 9115,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "813 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ef84e3324dfdb9d16bd73",
          "name": "Makop | Lazarus | Spyware (if it looks like a Pegasus...)",
          "description": "",
          "modified": "2024-01-27T18:02:23.517000",
          "created": "2023-12-29T16:48:15",
          "tags": [
            "no expiration",
            "domain",
            "hostname",
            "expiration",
            "iocs",
            "ipv4",
            "filehashmd5",
            "next",
            "scan endpoints",
            "all octoseek",
            "url http",
            "url https",
            "create new",
            "deptid24124",
            "deptid23922",
            "deptid23936",
            "sid339",
            "filehashsha256",
            "navmode3",
            "ommidsf3558",
            "usbuy no",
            "type33554433",
            "guid",
            "smauthreason0",
            "methodhead",
            "targetsmhttps",
            "exact",
            "a9 no",
            "langid1",
            "actmsgs1",
            "christmas",
            "pinlbtn",
            "pinl2",
            "uidtokenhttps",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "filehashsha1",
            "email",
            "contact",
            "contacted",
            "pegasus",
            "T1622 - Debugger Evasion",
            "wmi string",
            "windows nt",
            "request email",
            "apple",
            "search",
            "server",
            "resolutions",
            "san francisco",
            "route",
            "server ca",
            "sha2 secure",
            "show technique",
            "sign",
            "sprint personal",
            "status",
            "ssl certificate",
            "stateprovince",
            "text",
            "test",
            "subdomains",
            "surry hills",
            "teams api",
            "uknown",
            "threat analyzer",
            "threat",
            "target",
            "tsara brashears",
            "united",
            "urls",
            "win64",
            "windir",
            "urls http",
            "v3 serial",
            "validity",
            "referrer",
            "registrar abuse",
            "report",
            "report registrar abuse",
            "ransomware",
            "record value",
            "programfiles",
            "priority",
            "port scan",
            "pe32",
            "pegasus",
            "pe resource",
            "path",
            "paste",
            "passive dns",
            "password",
            "orgtechhandle",
            "orgtechphone",
            "orgtechref",
            "open",
            "orgabusehandle",
            "orgabuseref",
            "asn asn",
            "asn database",
            "bernhardplein",
            "big tech",
            "body xml",
            "body",
            "xml",
            "ck id",
            "cloudflare",
            "as8100",
            "akamai as36786",
            "as16625",
            "arin",
            "analyze",
            "api ip",
            "amazons3",
            "akamaias",
            "akamai",
            "aibv hostmaster",
            "access type",
            "abuse contact",
            "audiologist inc",
            "nothing number",
            "united",
            "brashears",
            "verdict",
            "net10464001",
            "new ioc",
            "next noc",
            "bv",
            "bv  orgid cambridge",
            "cambridge",
            "certificate",
            "certificate city",
            "ck id",
            "city",
            "brute force",
            "communicating",
            "copy core",
            "copy",
            "core",
            "cus",
            "cndigicert",
            "date",
            "detections",
            "detection type",
            "dhs discover",
            "dns",
            "discover",
            "hallrender",
            "briansabey",
            "brian sabey",
            "hall render",
            "dhs",
            "domain name",
            "download",
            "download sample",
            "email",
            "europeberlin",
            "execution",
            "falcon",
            "falcon sandbox",
            "false",
            "feeds",
            "feeds ioc",
            "first",
            "form",
            "frankfurt",
            "full name",
            "gameskinny",
            "gecko",
            "germany",
            "getprocaddress",
            "hacktool",
            "historical ssl",
            "hostnames",
            "hybrid",
            "ibm",
            "ibm business",
            "installer",
            "installer internet",
            "ioc search",
            "iocs",
            "ip address",
            "ip geolocation",
            "stealer",
            "ipinfo",
            "issuer",
            "javascript",
            "jb",
            "jb country",
            "khtml",
            "lazarus",
            "little",
            "lolkek",
            "main",
            "makop",
            "markmonitor",
            "microsoft",
            "mitre att",
            "ms windows",
            "name name"
          ],
          "references": [
            "uat.identityssl.newscdn.com.au",
            "gameskinny.com",
            "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
            "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "Makop Ransomware",
              "display_name": "Makop Ransomware",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Lazarus",
              "display_name": "Lazarus",
              "target": null
            },
            {
              "id": "Little",
              "display_name": "Little",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1559",
              "name": "Inter-Process Communication",
              "display_name": "T1559 - Inter-Process Communication"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1074",
              "name": "Data Staged",
              "display_name": "T1074 - Data Staged"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658dd276d03bca9b7a93b724",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2108,
            "FileHash-SHA1": 1248,
            "domain": 668,
            "hostname": 1340,
            "URL": 2652,
            "FileHash-SHA256": 1070,
            "email": 25,
            "CIDR": 4
          },
          "indicator_count": 9115,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "813 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "uat.identityssl.newscdn.com.au",
        "gameskinny.com",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Lazarus",
            "Ransomware",
            "Makop ransomware",
            "Lolkek",
            "Brashears",
            "Sabey",
            "Hacktool",
            "Hallrender",
            "Little"
          ],
          "industries": [],
          "unique_indicators": 18194
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/hayatouki.com",
    "whois": "http://whois.domaintools.com/hayatouki.com",
    "domain": "hayatouki.com",
    "hostname": "local.hayatouki.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "68e2b9fd811ffc6684ba25f7",
      "name": "Isolated DoD now DoW nodes - emotional commentary",
      "description": "*https://www.sentient.industries/\n*trk.b.jackrogersusa.com\n*http://trk.southerntide.com/\nOTX is auto populating this pulse. Let\u2019s see\u2026",
      "modified": "2025-11-04T18:01:18.650000",
      "created": "2025-10-05T18:33:33.277000",
      "tags": [
        "united",
        "present feb",
        "present may",
        "aaaa",
        "present jul",
        "passive dns",
        "ip address",
        "present dec",
        "present sep",
        "present jun",
        "url https",
        "url http",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "germany",
        "taiwan",
        "netherlands",
        "china",
        "search",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "sha1",
        "ascii text",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "null",
        "refresh",
        "body",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "title",
        "look",
        "verify",
        "restart",
        "filehashmd5",
        "hostname",
        "filehashsha256",
        "types of",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "ruby",
        "jeffrey reimer",
        "target",
        "tsara",
        "information",
        "capture",
        "gather victim",
        "report spam",
        "kill targets",
        "created",
        "starfield",
        "show technique",
        "date"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1180",
          "name": "Screensaver",
          "display_name": "T1180 - Screensaver"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1333,
        "domain": 355,
        "URL": 5874,
        "hostname": 1066,
        "FileHash-SHA1": 101,
        "FileHash-MD5": 88,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 8819,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "166 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658dd276d03bca9b7a93b724",
      "name": "Makop | Lazarus | Spyware",
      "description": "Privilege abuse. Spyware and miscellaneous cyber attacks leveraged against various individuals using escalated privileges. Pegasus was found, not thoroughly explored.",
      "modified": "2024-01-27T18:02:23.517000",
      "created": "2023-12-28T19:54:30.287000",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "iocs",
        "ipv4",
        "filehashmd5",
        "next",
        "scan endpoints",
        "all octoseek",
        "url http",
        "url https",
        "create new",
        "deptid24124",
        "deptid23922",
        "deptid23936",
        "sid339",
        "filehashsha256",
        "navmode3",
        "ommidsf3558",
        "usbuy no",
        "type33554433",
        "guid",
        "smauthreason0",
        "methodhead",
        "targetsmhttps",
        "exact",
        "a9 no",
        "langid1",
        "actmsgs1",
        "christmas",
        "pinlbtn",
        "pinl2",
        "uidtokenhttps",
        "pulse use",
        "pdf report",
        "pcap",
        "stix",
        "filehashsha1",
        "email",
        "contact",
        "contacted",
        "pegasus",
        "T1622 - Debugger Evasion",
        "wmi string",
        "windows nt",
        "request email",
        "apple",
        "search",
        "server",
        "resolutions",
        "san francisco",
        "route",
        "server ca",
        "sha2 secure",
        "show technique",
        "sign",
        "sprint personal",
        "status",
        "ssl certificate",
        "stateprovince",
        "text",
        "test",
        "subdomains",
        "surry hills",
        "teams api",
        "uknown",
        "threat analyzer",
        "threat",
        "target",
        "tsara brashears",
        "united",
        "urls",
        "win64",
        "windir",
        "urls http",
        "v3 serial",
        "validity",
        "referrer",
        "registrar abuse",
        "report",
        "report registrar abuse",
        "ransomware",
        "record value",
        "programfiles",
        "priority",
        "port scan",
        "pe32",
        "pegasus",
        "pe resource",
        "path",
        "paste",
        "passive dns",
        "password",
        "orgtechhandle",
        "orgtechphone",
        "orgtechref",
        "open",
        "orgabusehandle",
        "orgabuseref",
        "asn asn",
        "asn database",
        "bernhardplein",
        "big tech",
        "body xml",
        "body",
        "xml",
        "ck id",
        "cloudflare",
        "as8100",
        "akamai as36786",
        "as16625",
        "arin",
        "analyze",
        "api ip",
        "amazons3",
        "akamaias",
        "akamai",
        "aibv hostmaster",
        "access type",
        "abuse contact",
        "audiologist inc",
        "nothing number",
        "united",
        "brashears",
        "verdict",
        "net10464001",
        "new ioc",
        "next noc",
        "bv",
        "bv  orgid cambridge",
        "cambridge",
        "certificate",
        "certificate city",
        "ck id",
        "city",
        "brute force",
        "communicating",
        "copy core",
        "copy",
        "core",
        "cus",
        "cndigicert",
        "date",
        "detections",
        "detection type",
        "dhs discover",
        "dns",
        "discover",
        "hallrender",
        "briansabey",
        "brian sabey",
        "hall render",
        "dhs",
        "domain name",
        "download",
        "download sample",
        "email",
        "europeberlin",
        "execution",
        "falcon",
        "falcon sandbox",
        "false",
        "feeds",
        "feeds ioc",
        "first",
        "form",
        "frankfurt",
        "full name",
        "gameskinny",
        "gecko",
        "germany",
        "getprocaddress",
        "hacktool",
        "historical ssl",
        "hostnames",
        "hybrid",
        "ibm",
        "ibm business",
        "installer",
        "installer internet",
        "ioc search",
        "iocs",
        "ip address",
        "ip geolocation",
        "stealer",
        "ipinfo",
        "issuer",
        "javascript",
        "jb",
        "jb country",
        "khtml",
        "lazarus",
        "little",
        "lolkek",
        "main",
        "makop",
        "markmonitor",
        "microsoft",
        "mitre att",
        "ms windows",
        "name name"
      ],
      "references": [
        "uat.identityssl.newscdn.com.au",
        "gameskinny.com",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "Makop Ransomware",
          "display_name": "Makop Ransomware",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Lazarus",
          "display_name": "Lazarus",
          "target": null
        },
        {
          "id": "Little",
          "display_name": "Little",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1559",
          "name": "Inter-Process Communication",
          "display_name": "T1559 - Inter-Process Communication"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 32,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2108,
        "FileHash-SHA1": 1248,
        "domain": 668,
        "hostname": 1340,
        "URL": 2652,
        "FileHash-SHA256": 1070,
        "email": 25,
        "CIDR": 4
      },
      "indicator_count": 9115,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "813 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658ef84e3324dfdb9d16bd73",
      "name": "Makop | Lazarus | Spyware (if it looks like a Pegasus...)",
      "description": "",
      "modified": "2024-01-27T18:02:23.517000",
      "created": "2023-12-29T16:48:15",
      "tags": [
        "no expiration",
        "domain",
        "hostname",
        "expiration",
        "iocs",
        "ipv4",
        "filehashmd5",
        "next",
        "scan endpoints",
        "all octoseek",
        "url http",
        "url https",
        "create new",
        "deptid24124",
        "deptid23922",
        "deptid23936",
        "sid339",
        "filehashsha256",
        "navmode3",
        "ommidsf3558",
        "usbuy no",
        "type33554433",
        "guid",
        "smauthreason0",
        "methodhead",
        "targetsmhttps",
        "exact",
        "a9 no",
        "langid1",
        "actmsgs1",
        "christmas",
        "pinlbtn",
        "pinl2",
        "uidtokenhttps",
        "pulse use",
        "pdf report",
        "pcap",
        "stix",
        "filehashsha1",
        "email",
        "contact",
        "contacted",
        "pegasus",
        "T1622 - Debugger Evasion",
        "wmi string",
        "windows nt",
        "request email",
        "apple",
        "search",
        "server",
        "resolutions",
        "san francisco",
        "route",
        "server ca",
        "sha2 secure",
        "show technique",
        "sign",
        "sprint personal",
        "status",
        "ssl certificate",
        "stateprovince",
        "text",
        "test",
        "subdomains",
        "surry hills",
        "teams api",
        "uknown",
        "threat analyzer",
        "threat",
        "target",
        "tsara brashears",
        "united",
        "urls",
        "win64",
        "windir",
        "urls http",
        "v3 serial",
        "validity",
        "referrer",
        "registrar abuse",
        "report",
        "report registrar abuse",
        "ransomware",
        "record value",
        "programfiles",
        "priority",
        "port scan",
        "pe32",
        "pegasus",
        "pe resource",
        "path",
        "paste",
        "passive dns",
        "password",
        "orgtechhandle",
        "orgtechphone",
        "orgtechref",
        "open",
        "orgabusehandle",
        "orgabuseref",
        "asn asn",
        "asn database",
        "bernhardplein",
        "big tech",
        "body xml",
        "body",
        "xml",
        "ck id",
        "cloudflare",
        "as8100",
        "akamai as36786",
        "as16625",
        "arin",
        "analyze",
        "api ip",
        "amazons3",
        "akamaias",
        "akamai",
        "aibv hostmaster",
        "access type",
        "abuse contact",
        "audiologist inc",
        "nothing number",
        "united",
        "brashears",
        "verdict",
        "net10464001",
        "new ioc",
        "next noc",
        "bv",
        "bv  orgid cambridge",
        "cambridge",
        "certificate",
        "certificate city",
        "ck id",
        "city",
        "brute force",
        "communicating",
        "copy core",
        "copy",
        "core",
        "cus",
        "cndigicert",
        "date",
        "detections",
        "detection type",
        "dhs discover",
        "dns",
        "discover",
        "hallrender",
        "briansabey",
        "brian sabey",
        "hall render",
        "dhs",
        "domain name",
        "download",
        "download sample",
        "email",
        "europeberlin",
        "execution",
        "falcon",
        "falcon sandbox",
        "false",
        "feeds",
        "feeds ioc",
        "first",
        "form",
        "frankfurt",
        "full name",
        "gameskinny",
        "gecko",
        "germany",
        "getprocaddress",
        "hacktool",
        "historical ssl",
        "hostnames",
        "hybrid",
        "ibm",
        "ibm business",
        "installer",
        "installer internet",
        "ioc search",
        "iocs",
        "ip address",
        "ip geolocation",
        "stealer",
        "ipinfo",
        "issuer",
        "javascript",
        "jb",
        "jb country",
        "khtml",
        "lazarus",
        "little",
        "lolkek",
        "main",
        "makop",
        "markmonitor",
        "microsoft",
        "mitre att",
        "ms windows",
        "name name"
      ],
      "references": [
        "uat.identityssl.newscdn.com.au",
        "gameskinny.com",
        "https://hybrid-analysis.com/sample/7ba985d328ac4d9be47826ae3f98b513ca00b1609d82fe1d4aa365e7cfb54f48",
        "https://hybrid-analysis.com/sample/55af17e7ea6e0884ed102bb2cb21844ab2bf3330dd46aace4c736be5c55b0257/658d97df7e57b7b66c00b342"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "Makop Ransomware",
          "display_name": "Makop Ransomware",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sabey",
          "display_name": "Sabey",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Lazarus",
          "display_name": "Lazarus",
          "target": null
        },
        {
          "id": "Little",
          "display_name": "Little",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1559",
          "name": "Inter-Process Communication",
          "display_name": "T1559 - Inter-Process Communication"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1074",
          "name": "Data Staged",
          "display_name": "T1074 - Data Staged"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "658dd276d03bca9b7a93b724",
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2108,
        "FileHash-SHA1": 1248,
        "domain": 668,
        "hostname": 1340,
        "URL": 2652,
        "FileHash-SHA256": 1070,
        "email": 25,
        "CIDR": 4
      },
      "indicator_count": 9115,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "813 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://local.hayatouki.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://local.hayatouki.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776649476.5524368
}