{
  "type": "URL",
  "indicator": "https://m.youtube.com.mx",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://m.youtube.com.mx",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2918652181,
      "indicator": "https://m.youtube.com.mx",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 18,
      "pulses": [
        {
          "id": "68e2bb5d9ee8577ab5519f2c",
          "name": "Meritshealth with DoD links? ",
          "description": "",
          "modified": "2026-01-13T00:05:56.401000",
          "created": "2025-10-05T18:39:25.286000",
          "tags": [
            "gtmk5nxqc6",
            "utc amazon",
            "utc na",
            "acceptencoding",
            "gmt contenttype",
            "connection",
            "true pragma",
            "gmt setcookie",
            "httponly",
            "gmt vary",
            "nc000000 up",
            "html document",
            "unicode text",
            "utf8 text",
            "oc0006 http",
            "http traffic",
            "https http",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "match info",
            "t1573 severity",
            "info",
            "number",
            "ja3s",
            "algorithm",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "cnmicrosoft ecc",
            "update secure",
            "server ca",
            "omicrosoft cus",
            "get http",
            "dns resolutions",
            "registrar",
            "markmonitor inc",
            "country",
            "resolver domain",
            "type name",
            "html",
            "apnic",
            "apnic whois",
            "please",
            "rirs",
            "cidr",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "development att",
            "name tactics",
            "binary file",
            "ck matrix",
            "wheelchair",
            "iamrobert",
            "pattern match",
            "ascii text",
            "href",
            "united",
            "general",
            "local",
            "path",
            "encrypt",
            "click",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "netherlands",
            "present aug",
            "a domains",
            "moved",
            "first pqc",
            "ip address",
            "unknown ns",
            "unknown aaaa",
            "title",
            "body",
            "meta",
            "window",
            "accept",
            "body doctype",
            "welcome",
            "ok server",
            "gmt content",
            "present jul",
            "present sep",
            "aaaa",
            "hostname",
            "error",
            "defense evasion",
            "windows nt",
            "response",
            "vary",
            "strings",
            "core",
            "t1027.013 encrypted/encoded",
            "michelin lazy k",
            "prefetch8",
            "flag",
            "date",
            "starfield",
            "hybrid",
            "mobility cr",
            "extraction",
            "data upload",
            "include",
            "o url",
            "url url",
            "included i0",
            "review ioc",
            "excluded ic",
            "suggested",
            "find sugi",
            "failed",
            "cre pul",
            "enter",
            "enter sc",
            "type",
            "enric",
            "extra",
            "type opaste",
            "data u",
            "included",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "null",
            "refresh",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "expiration",
            "url https",
            "no expiration",
            "iocs",
            "ipv4",
            "text drag",
            "drop or",
            "browse to",
            "select file",
            "redacted for",
            "server",
            "privacy tech",
            "privacy admin",
            "postal code",
            "stateprovince",
            "organization",
            "email",
            "code",
            "quantum rooms",
            "sam somalia",
            "emp",
            "porn",
            "media defense",
            "gov porn",
            "suck my nips",
            "reimer suspect",
            "jeffrey reimer",
            "dod",
            "department of defense",
            "show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results may",
            "entries http",
            "scans record",
            "value status",
            "sabey type",
            "merits fake",
            "y.a.s.",
            "pornography",
            "ramsom"
          ],
          "references": [
            "https://www.meritshealth.com/ Defense.Gov Mobility Co?  <https://iamwithrobert.com/>",
            "zeroeyes.host \u2022 media.defense.gov \u2022 defense.gov \u2022 23.222.155.67",
            "https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf",
            "https://media.defense.gov/2020/jun/09/2002313081/-1/-1/0/csi-detect-and-prevent-web-shell-malware-20200422.pdf",
            "https://rto.bappam.eu/ai-n2cdl/mirai-2025-ven5k-telugu-movie-watch-online.html",
            "https://pornokind.vgt.pl \u2022  https://cdn2.video.itsyourporn.com",
            "https://webcams.itsyourporn.com/ \u2022 https://members.itsyourporn.com/",
            "https://pics-storage-1.pornhat.com/contents/albums/main/1920x1080/135000/135855/9537375.jp",
            "https://static.pornhat.com/contents/videos_screenshots/642000/642793/640x360/1.jpg",
            "https://d1rozh26tys225.cloudfront.net/robot-suspicion.svg (mobility company no one has heard of)",
            "https://www2.itsyourporn.com/license.php \u2022  https://www.lovephoto.tw/members",
            "https://members.engine.com/login \u2022  https://members.engine.com/payment-details/220210",
            "https://www-pornocarioca-com.sexogratis.page/videos/bbb/ex",
            "https://media.defense.gov/2024/sep/18/2003547016/-1/-1/0/csa-prc-linked-actors-botnet.pdf",
            "https://maisexo-com.putaria.info/casting \u2022  https://contosadultos-club.sexogratis.page/tudo",
            "https://meumundogay-com.sexogratis.page/locker",
            "https://es.pornhat.com/models/the-sex-creator/",
            "Dear US Government, the man who assaulted targets name is Jeffrey Scott Reimer of Chester Springs, PA",
            "Can the DoD no questions asked target a SA victim",
            "Red Team Abuse? Starfield ? DoD? You need a real criminal Jeffrey Reimer.",
            "There\u2019s a problem with terrorizing victims, relatives of, associates of and stealing their property intellectual or otherwise",
            "socialmedia \u2022 socialmedia.defense.gov \u2022 static.defense.gov",
            "There is fear in silence or speaking out",
            "Target left unattended by anyone in a hospital except a security guard. Hospital refused care. Ignored rare brain incident from high cervical & brain assault injuries aggravated by car accident.",
            "3-4 Police presence. 25 + hospital employees prepped radiology room. No one left room so was it for her?",
            "If someone is believed to be a threat they have right to due process.",
            "Infectious Disease UC Health denied target medication they said she needed as questionable liquid seeped into her brain.",
            "She was a researcher not a hacker. A mother not a criminal. Most talented and least impressed person I have ever known.",
            "Remarks online \u2018 T\u2019*#^^ is not a runner\u2019 a size 00 broke two track records at a major universities.",
            "Honestly, you\u2019ve never seen or met her no many how many people you\u2019ve sent out. That\u2019s why you quiz.",
            "ftp.iamrobert.com ? \u2022 https://www.meritshealth.com/templates/iamrobert/fonts/Graphik-Regular.eot",
            "iamrobert.com Y.A.S.",
            "1.2016 M.Brian Sabey filed a complaint about?  Jeffrey Reimer refused Lie detector test and False memory exam",
            "Target agreed and complied with all lie detector measures.",
            "Is the family allowed to have a funeral for Tsara or print an obituary",
            "No, they put Tsara in her mom\u2019s obituary, she couldn\u2019t grieve, she had to take it down.",
            "I am very upset. Whoever is doing this is sick."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "TA0042",
              "name": "Resource Development",
              "display_name": "TA0042 - Resource Development"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1562.004",
              "name": "Disable or Modify System Firewall",
              "display_name": "T1562.004 - Disable or Modify System Firewall"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1562.008",
              "name": "Disable Cloud Logs",
              "display_name": "T1562.008 - Disable Cloud Logs"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1056.003",
              "name": "Web Portal Capture",
              "display_name": "T1056.003 - Web Portal Capture"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1180",
              "name": "Screensaver",
              "display_name": "T1180 - Screensaver"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68e2b14d83bb63502feac65e",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1365,
            "URL": 11172,
            "hostname": 2780,
            "FileHash-MD5": 381,
            "FileHash-SHA256": 4420,
            "FileHash-SHA1": 338,
            "CIDR": 4,
            "SSLCertFingerprint": 24,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 20486,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "96 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68e2b14d83bb63502feac65e",
          "name": "Did the \u2018real\u2019 DoD kill Targets wheelchair as promised? It\u2019s alive again.",
          "description": "I\u2019d never think the DoD would be found when researching a wheelchair company NO ONE has ever heard of in this region. \n\nA wheelchair was ordered for target early spring, it was received in early summer. \n\nSettings became a crazy mess. Suspicion was immediate as a toothless tech tried to identify if dealing w/target by birth year , quizzing, fear tactics (doomsday wheelchair) , familiar Then warns about EMP attacks against wheelchair? His son is a hacker (gamer) + software engineer. He left not knowing if target status after quizzing tech knowledge? I intentionally verbalized the truth , target was a very early adopter of Ruby & Ruby on Rails & everything tech, he dropped his tools & left breaking the arm of wheelchair. New tech  needed. Later denies ever being a mobility technician. They killed  a new wheelchair. Why?. You\u2019re allowed to donate your equipment Vets & uninsured NEED mobility equipment. Stop the craziness. Is it possible gamer hackers are riding the DoD w/o their knowledge?",
          "modified": "2026-01-07T00:00:30.717000",
          "created": "2025-10-05T17:56:29.109000",
          "tags": [
            "gtmk5nxqc6",
            "utc amazon",
            "utc na",
            "acceptencoding",
            "gmt contenttype",
            "connection",
            "true pragma",
            "gmt setcookie",
            "httponly",
            "gmt vary",
            "nc000000 up",
            "html document",
            "unicode text",
            "utf8 text",
            "oc0006 http",
            "http traffic",
            "https http",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "match info",
            "t1573 severity",
            "info",
            "number",
            "ja3s",
            "algorithm",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "cnmicrosoft ecc",
            "update secure",
            "server ca",
            "omicrosoft cus",
            "get http",
            "dns resolutions",
            "registrar",
            "markmonitor inc",
            "country",
            "resolver domain",
            "type name",
            "html",
            "apnic",
            "apnic whois",
            "please",
            "rirs",
            "cidr",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "development att",
            "name tactics",
            "binary file",
            "ck matrix",
            "wheelchair",
            "iamrobert",
            "pattern match",
            "ascii text",
            "href",
            "united",
            "general",
            "local",
            "path",
            "encrypt",
            "click",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "netherlands",
            "present aug",
            "a domains",
            "moved",
            "first pqc",
            "ip address",
            "unknown ns",
            "unknown aaaa",
            "title",
            "body",
            "meta",
            "window",
            "accept",
            "body doctype",
            "welcome",
            "ok server",
            "gmt content",
            "present jul",
            "present sep",
            "aaaa",
            "hostname",
            "error",
            "defense evasion",
            "windows nt",
            "response",
            "vary",
            "strings",
            "core",
            "t1027.013 encrypted/encoded",
            "michelin lazy k",
            "prefetch8",
            "flag",
            "date",
            "starfield",
            "hybrid",
            "mobility cr",
            "extraction",
            "data upload",
            "include",
            "o url",
            "url url",
            "included i0",
            "review ioc",
            "excluded ic",
            "suggested",
            "find sugi",
            "failed",
            "cre pul",
            "enter",
            "enter sc",
            "type",
            "enric",
            "extra",
            "type opaste",
            "data u",
            "included",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "null",
            "refresh",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "expiration",
            "url https",
            "no expiration",
            "iocs",
            "ipv4",
            "text drag",
            "drop or",
            "browse to",
            "select file",
            "redacted for",
            "server",
            "privacy tech",
            "privacy admin",
            "postal code",
            "stateprovince",
            "organization",
            "email",
            "code",
            "quantum rooms",
            "sam somalia",
            "emp",
            "porn",
            "media defense",
            "gov porn",
            "suck my nips",
            "reimer suspect",
            "jeffrey reimer",
            "dod",
            "department of defense",
            "show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results may",
            "entries http",
            "scans record",
            "value status",
            "sabey type",
            "merits fake",
            "y.a.s.",
            "pornography",
            "ramsom"
          ],
          "references": [
            "https://www.meritshealth.com/ Defense.Gov Mobility Co?  <https://iamwithrobert.com/>",
            "zeroeyes.host \u2022 media.defense.gov \u2022 defense.gov \u2022 23.222.155.67",
            "https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf",
            "https://media.defense.gov/2020/jun/09/2002313081/-1/-1/0/csi-detect-and-prevent-web-shell-malware-20200422.pdf",
            "https://rto.bappam.eu/ai-n2cdl/mirai-2025-ven5k-telugu-movie-watch-online.html",
            "https://pornokind.vgt.pl \u2022  https://cdn2.video.itsyourporn.com",
            "https://webcams.itsyourporn.com/ \u2022 https://members.itsyourporn.com/",
            "https://pics-storage-1.pornhat.com/contents/albums/main/1920x1080/135000/135855/9537375.jp",
            "https://static.pornhat.com/contents/videos_screenshots/642000/642793/640x360/1.jpg",
            "https://d1rozh26tys225.cloudfront.net/robot-suspicion.svg (mobility company no one has heard of)",
            "https://www2.itsyourporn.com/license.php \u2022  https://www.lovephoto.tw/members",
            "https://members.engine.com/login \u2022  https://members.engine.com/payment-details/220210",
            "https://www-pornocarioca-com.sexogratis.page/videos/bbb/ex",
            "https://media.defense.gov/2024/sep/18/2003547016/-1/-1/0/csa-prc-linked-actors-botnet.pdf",
            "https://maisexo-com.putaria.info/casting \u2022  https://contosadultos-club.sexogratis.page/tudo",
            "https://meumundogay-com.sexogratis.page/locker",
            "https://es.pornhat.com/models/the-sex-creator/",
            "Dear US Government, the man who assaulted targets name is Jeffrey Scott Reimer of Chester Springs, PA",
            "Can the DoD no questions asked target a SA victim",
            "Red Team Abuse? Starfield ? DoD? You need a real criminal Jeffrey Reimer.",
            "There\u2019s a problem with terrorizing victims, relatives of, associates of and stealing their property intellectual or otherwise",
            "socialmedia \u2022 socialmedia.defense.gov \u2022 static.defense.gov",
            "There is fear in silence or speaking out",
            "Target left unattended by anyone in a hospital except a security guard. Hospital refused care. Ignored rare brain incident from high cervical & brain assault injuries aggravated by car accident.",
            "3-4 Police presence. 25 + hospital employees prepped radiology room. No one left room so was it for her?",
            "If someone is believed to be a threat they have right to due process.",
            "Infectious Disease UC Health denied target medication they said she needed as questionable liquid seeped into her brain.",
            "She was a researcher not a hacker. A mother not a criminal. Most talented and least impressed person I have ever known.",
            "Remarks online \u2018 T\u2019*#^^ is not a runner\u2019 a size 00 broke two track records at a major universities.",
            "Honestly, you\u2019ve never seen or met her no many how many people you\u2019ve sent out. That\u2019s why you quiz.",
            "ftp.iamrobert.com ? \u2022 https://www.meritshealth.com/templates/iamrobert/fonts/Graphik-Regular.eot",
            "iamrobert.com Y.A.S.",
            "1.2016 M.Brian Sabey filed a complaint about?  Jeffrey Reimer refused Lie detector test and False memory exam",
            "Target agreed and complied with all lie detector measures.",
            "Is the family allowed to have a funeral for Tsara or print an obituary",
            "No, they put Tsara in her mom\u2019s obituary, she couldn\u2019t grieve, she had to take it down.",
            "I am very upset. Whoever is doing this is sick."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "TA0042",
              "name": "Resource Development",
              "display_name": "TA0042 - Resource Development"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1562.004",
              "name": "Disable or Modify System Firewall",
              "display_name": "T1562.004 - Disable or Modify System Firewall"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1562.008",
              "name": "Disable Cloud Logs",
              "display_name": "T1562.008 - Disable Cloud Logs"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1056.003",
              "name": "Web Portal Capture",
              "display_name": "T1056.003 - Web Portal Capture"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1180",
              "name": "Screensaver",
              "display_name": "T1180 - Screensaver"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1328,
            "URL": 9931,
            "hostname": 2621,
            "FileHash-MD5": 381,
            "FileHash-SHA256": 4360,
            "FileHash-SHA1": 338,
            "CIDR": 4,
            "SSLCertFingerprint": 24,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 18989,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "102 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68db395368d6c4042517f3f3",
          "name": "Target Saver M1 Agent TSA Spy \u2022 Mastadon - Hit Tip! Thanks!",
          "description": "Hot Tip! I would love to give a shout out to the person who provided this information, I\u2019m not sure if they want to remain anonymous or not. Thank SO Much!\n\nSpyware and a source for distributing malicious media. Complete foothold\non networks, browsers, phones, search history and everything, massive streaming pornography distributed, members and contributors. \n\nVery important tip.  I will analyze and break down into digestible pulse sizes.",
          "modified": "2025-12-27T15:01:22.545000",
          "created": "2025-09-30T01:58:43.592000",
          "tags": [
            "http traffic",
            "match info",
            "http get",
            "info performs",
            "dns query",
            "https http",
            "mitre att",
            "evasion ta0005",
            "creates",
            "info",
            "oc0006 http",
            "wininet c0005",
            "resolved ips",
            "get http",
            "html document",
            "unicode text",
            "dynamicloader",
            "fe ff",
            "medium",
            "x00bx00",
            "uswv",
            "k uswv",
            "search",
            "high",
            "delete c",
            "yara detections",
            "redline",
            "guard",
            "write",
            "united",
            "present sep",
            "aaaa",
            "passive dns",
            "urls",
            "next associated",
            "found",
            "x content",
            "hacktool",
            "trojan",
            "error",
            "lowfi",
            "win32",
            "worm",
            "ip address",
            "mtb apr",
            "ransom",
            "virtool",
            "ain add",
            "directui",
            "element",
            "classinfobase",
            "ccbase",
            "hwndhost",
            "yara rule",
            "hpavvalue",
            "qaejh",
            "name servers",
            "cryp",
            "emails",
            "next related",
            "domain related",
            "no expiration",
            "url http",
            "url https",
            "indicator role",
            "hostname",
            "email",
            "present jun",
            "present aug",
            "present jul",
            "servers",
            "title",
            "encrypt",
            "altsvc h3",
            "date tue",
            "acceptranges",
            "reportto",
            "server",
            "gmt expires",
            "gmt contenttype",
            "script",
            "expiresthu",
            "maxage63072000",
            "pragma",
            "google safe",
            "unknown ns",
            "files",
            "location united",
            "asn as15169",
            "trojandropper",
            "susp",
            "creation date",
            "asn as133618",
            "tags",
            "related tags",
            "indicator facts",
            "backdoor",
            "ipv4 add",
            "click",
            "artro",
            "target saver",
            "trojanspy",
            "reverse dns",
            "america flag",
            "443 ma2592000",
            "hostname add",
            "verdict",
            "present mar",
            "present jan",
            "present dec",
            "present apr",
            "ipv4",
            "type indicator",
            "role title",
            "related pulses",
            "iocs",
            "moved",
            "downloads",
            "apple",
            "microsoft",
            "hexagonsystem",
            "mastadon",
            "status",
            "twitter",
            "gmt content",
            "easyredir cache",
            "v4 add",
            "redacted for",
            "privacy tech",
            "privacy admin",
            "registrar abuse",
            "available from",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "entity",
            "code",
            "date",
            "dnssec",
            "showing",
            "unknown aaaa",
            "sha256",
            "sha1",
            "ascii text",
            "ck id",
            "show technique",
            "ck matrix",
            "meta",
            "hybrid",
            "general",
            "local",
            "path",
            "strings",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "certificate"
          ],
          "references": [
            "FileHash-SHA256 025ca2c59c26197f3c1cd746469a5b9fe219a748716abd90daee792f34037d63",
            "mastodon.social",
            "https://families.google/intl/pt-PT_ALL/familylink/",
            "http://service.adultprovide.com/docs/records.htm?site=bigtitsboss",
            "slscr.update.microsoft.com \u2022client.wns.windows.com \u2022  c.pki.goog \u2022 login.live.com",
            "https://discuss.ai.google.dev/c/gemma/10",
            "https://uj140.keap-link003.com/v2/render/acc9c3f6b0340c8e01d0d3d0e1662c9e/eJxtjjsLwjAUhf_LnTP0hdRspYQSWkXEwU1Ce4XUmob0Riil_90o0snxPD7OWYDQKEOyAw6-j7MIGDhstdVoqBwNqfYbprs4T3IGgzaPyo3eAl_-sVv-cbM0yfYRA5otho44FLKBddOXc1HW8ljdTvIqmgDjU5N4heEJODmPDJS1aLrfjxpn4Hc1TLi-ARRkO0Y=/pixel.png",
            "https://m.bigwetbutts.com/ tmi",
            "Spyware: FileHash-SHA256 035e393630953b89c602e7cfa3409da790e99309c2d916336147cf9c59ee1b89",
            "Mirai: simswap.in",
            "66.254.114.41 \u2022 brazzersnetwork.com \u2022 brazzers.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 www.pornhub.com",
            "https://buildings.hexagongeosystems.com \u2022 https://connect.hexagongeosystems.com",
            "https://load.ss.hexagongeosystems.com \u2022 https://rail.hexagongeosystems.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:VirTool:Win32/GenDecnryptAlgo.S02",
              "display_name": "#Lowfi:HSTR:VirTool:Win32/GenDecnryptAlgo.S02",
              "target": null
            },
            {
              "id": "Win.Ransomware.Bitman-9862733-0",
              "display_name": "Win.Ransomware.Bitman-9862733-0",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Target Saver",
              "display_name": "Target Saver",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Hacktool",
              "display_name": "Hacktool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [
            "Media",
            "Legal",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2964,
            "hostname": 1164,
            "URL": 4334,
            "domain": 956,
            "FileHash-MD5": 476,
            "FileHash-SHA1": 451,
            "CVE": 1,
            "email": 20,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 10368,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "113 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68eff833ed84ceaf611521d2",
          "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
          "description": "",
          "modified": "2025-10-15T19:38:27.739000",
          "created": "2025-10-15T19:38:27.739000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": "68c73fbd85dfbb4d41006ad1",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "185 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c73fbd85dfbb4d41006ad1",
          "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
          "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
          "modified": "2025-10-14T22:26:18.109000",
          "created": "2025-09-14T22:20:45.617000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "186 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c6026160a826c170a8ce93",
          "name": "Mira - Targeted attacks that demolished victim/s Media Platforms",
          "description": "Targeted attacks that demolished victim/s Media Platforms. \nDangerous crowd, bullied till the end, murder attempted hit by a vehicle many times on a one way. 22 year old who walked after attempting to drive her off I-25 Denver. Suffered more life threatening injuries. \nMonitored target. Crime: unwilling female trapped under nasty physical therapists crotch. No charges, no questions. No treatments except one SCI surgery that was 5 years too late. \nDenver is nuts. Denver law enforcement , quasi government , CBI  & attorneys are corrupted. There\u2019s something to the wicked DIA theories.  I wonder how many others have been silenced to death behind corporate greed. The PT who caused all\nof this is thoroughly treated as a victim. Family moved to safety? She was never the threat. TLB will always rest assured sheltered in the arms of God like she believed.\n#theft #rip #paypal #drive-by_compromise #mira #spotify #youtube #trulymissed",
          "modified": "2025-10-13T22:27:44.477000",
          "created": "2025-09-13T23:46:41.355000",
          "tags": [
            "http traffic",
            "iframe src",
            "https http",
            "re att",
            "access ta0001",
            "t1189 severity",
            "info found",
            "command",
            "control ta0011",
            "protocol t1071",
            "info",
            "resolved ips",
            "ip traffic",
            "pattern domains",
            "pattern urls",
            "tls sni",
            "get http",
            "dns resolutions",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "user",
            "rules not",
            "registry keys",
            "detections not",
            "found mitre",
            "info ids",
            "sandbox",
            "number",
            "algorithm",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "cnmicrosoft ecc",
            "update secure",
            "server ca",
            "omicrosoft cus",
            "ip address",
            "port",
            "http",
            "url data",
            "accept",
            "gmt ifnonematch",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "manager",
            "shutdown",
            "udp connections",
            "http requests",
            "cname",
            "nxdomain",
            "involved direct",
            "country name",
            "parent pid",
            "full path",
            "command line",
            "t1055 process",
            "layer protocol",
            "access t1189",
            "defense evasion",
            "discovery t1082",
            "control t1573",
            "youtube",
            "spotify",
            "spotify",
            "colorado blows"
          ],
          "references": [
            "https://forward.ro/",
            "https://vtbehaviour.commondatastorage.googleapis.com/db4e2e018a3e7f1227d7ee73590290cbd2c5f85083d7d2cd2bfbfce2d86bc85b_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1757802136&Signature=ZMB94nTTqlBqbckg%2Bto3APyffn72wQ8c%2BtAJCCTNE3HE7lF3WYAXyjdMPB0xKY6TVdQIXYiGj6C8cK925JJttjjW91Be%2BG5oJQ2Tkmou66cPgSgOdOAQEKXq2RNXSvvZUTKgJSbxJritEPsUDcE%2FOZrDG1fY%2FtVq7cxQdLdhKacpB%2FiFLNzlcCWDCLJtwGhyRwoESchlxvvy%2Bazy40CNs35Eiw1rci3tBqQS97F7mBV1GnSrz%2FFZKh",
            "http://clients2.google.com/time/1/current?cup2key=8:ZnsjfqkCHZe8ziQKNl-PZVHX2EXyFv9m6Q0Dnd_a_t8&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
            "Colorado corruption will be exposed one day.",
            "Discovery of targets pirated music led to her website down the next day! After 9 years?",
            "These greedy people & government grifters steal  money from victims, including life insurance policies",
            "Stop following targets relatives everywhere , associates. Stop circling former residence..",
            "Targets mother passed in 2014. So much malicious activity obituary had to be taken down when hackers put target in obituary",
            "Targets mother died in her bed in Castke Rock, Douglasc County, Colorado",
            "Moms body moved by Douglas County to Jefferson County after cause of death ruled natural causes.",
            "Jefferson County, Coroner  falsely states Mom died in car accident in Lakewood on death certificate .",
            "This information was brought to target by concerned entities who handled body.",
            "Off subject: Don\u2019t try to kill Tucker Carlson for asking valid questions about an apparent murder Sam.",
            "First they discredit you, wear you down mentally , hunt you down , then\u2026.They  have to deal with God.",
            "Sorry! I can\u2019t help being upset about the unfairness of this constant cruel harassment.",
            "Jeffrey Scott Reiner was considered a skilled predator by Bryan Counts MD. He later attacked target."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "All",
              "display_name": "All",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Government",
            "Financial",
            "Media",
            "Targets"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 781,
            "hostname": 339,
            "FileHash-SHA256": 697,
            "FileHash-MD5": 112,
            "domain": 152,
            "FileHash-SHA1": 2
          },
          "indicator_count": 2083,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6694bb9be1b61bf820500004",
          "name": "YouTube Creator Cyber Attacks | Jays Youtube Bot.exe | YT Botnet",
          "description": "YouTube Creator account attacks. Critical alerts, botnets, YT bots. I cannot adequately describe  attack right now.  Retaliation for targets YT channel Song Culture stems from retaliation shortly after a crime against target. Id be interested to learn more. An ITC Intercepter records traffic passed through Song Culture YouTube channel m redirects to other channels. Not reflected in the 1.5 million followers or the 3.2 million views. They just stopped. Then managing director was notified as all of Song Cultures social media Twitter, Instagram, Pinterest succumbed to Emotet attack. Social engineering did occur. Several parties. Alleged eBay , health insurance representatives, an attorney, alleged PI's music managers contacted by phone. A man from Great Britain also began an SE campaign, The strange part is following, confrontations, dangerous attacks, MIB, and other curious in person encounter, critical injuries, financial devastation has caused target to remain isolated.",
          "modified": "2024-08-14T05:03:59.815000",
          "created": "2024-07-15T06:03:07.423000",
          "tags": [
            "historical ssl",
            "referrer",
            "december",
            "sneaky server",
            "replacement",
            "unauthorized",
            "high level",
            "hackers",
            "highly targeted",
            "cyber attack",
            "emotet",
            "critical",
            "copy",
            "united",
            "command decode",
            "suricata ipv4",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "name server",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "song culture",
            "tsara lynn",
            "culture",
            "chime sa",
            "mediawarning",
            "youtube twitter",
            "secchuabitness",
            "secchuamodel",
            "secchuawow64",
            "secchuaplatform",
            "pragma",
            "form",
            "hope",
            "karma",
            "learn",
            "suspicious",
            "flag",
            "pe resource",
            "synaptics",
            "apeaksoft ios",
            "hiddentear",
            "urls",
            "domains",
            "contacted",
            "markmonitor",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "youtube bot",
            "rar jays",
            "mozilla firefox",
            "twitch",
            "samplename",
            "rar youtube",
            "zip youtube",
            "social bots",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "get https",
            "msie",
            "windows nt",
            "win64",
            "slcc2",
            "media center",
            "request",
            "gmt server",
            "referer https",
            "amd64 accept",
            "accept",
            "code",
            "rwx memory",
            "managed code",
            "calls unmanaged",
            "native",
            "often seen",
            "base64 encrypt",
            "trojan",
            "tsara brashears",
            "red team hacking",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "high",
            "medium",
            "objects",
            "regbinary",
            "module load",
            "t1129",
            "t1060",
            "crash",
            "dock",
            "persistence",
            "execution",
            "okhfjrtblzo",
            "ip check",
            "windows",
            "http host",
            "controlservice",
            "domain",
            "registry",
            "tools",
            "service",
            "worm",
            "malware",
            "win32",
            "bits",
            "read c",
            "intel",
            "ms windows",
            "pe32",
            "search",
            "type read",
            "show",
            "wow64",
            "stop",
            "write",
            "unknown",
            "waiting",
            "push",
            "next",
            "asnone united",
            "aaaa",
            "united kingdom",
            "as20738 host",
            "moved",
            "passive dns",
            "default",
            "delete c",
            "pe32 executable",
            "document file",
            "v2 document",
            "floodfix",
            "floxif",
            "name servers",
            "susp",
            "showing",
            "as55286",
            "scan endpoints",
            "all scoreblue",
            "ransom",
            "amadey",
            "songculture",
            "spreader",
            "tracey richter",
            "roberts",
            "michael roberts",
            "jays",
            "sabey",
            "rexxfield",
            "darklivity"
          ],
          "references": [
            "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
            "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
            "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
            "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
            "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
            "Ransom: message.htm.com",
            "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
            "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
            "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
            "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
            "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
            "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
            "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
            "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
            "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
            "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
            "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
            "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
            "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
            "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
            "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
            "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
            "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
            "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
            "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
            "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
            "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
            "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
            "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
            "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
            "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor.Xtreme",
              "display_name": "Backdoor.Xtreme",
              "target": null
            },
            {
              "id": "W32.AIDetectMalware.CS",
              "display_name": "W32.AIDetectMalware.CS",
              "target": null
            },
            {
              "id": "Win.Virus.Pioneer-9111434-0",
              "display_name": "Win.Virus.Pioneer-9111434-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Floxif.H",
              "display_name": "Virus:Win32/Floxif.H",
              "target": "/malware/Virus:Win32/Floxif.H"
            },
            {
              "id": "Win32:Renos-KY\\ [Trj]",
              "display_name": "Win32:Renos-KY\\ [Trj]",
              "target": null
            },
            {
              "id": ",  Win.Worm.Pykspa-6057105-0",
              "display_name": ",  Win.Worm.Pykspa-6057105-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Pykspa.C",
              "display_name": "Worm:Win32/Pykspa.C",
              "target": "/malware/Worm:Win32/Pykspa.C"
            },
            {
              "id": "PUP/Hacktool",
              "display_name": "PUP/Hacktool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 439,
            "FileHash-SHA1": 386,
            "FileHash-SHA256": 2320,
            "URL": 1873,
            "domain": 478,
            "hostname": 839,
            "SSLCertFingerprint": 9,
            "email": 7
          },
          "indicator_count": 6351,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "613 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "665182d791bfc08412ec2c0a",
          "name": "Shadow Pad | Appears as investigation of an infirmed non criminal",
          "description": "ShadowPad is a modular backdoor attack platform that uses an ecosystem of plugins. It stealthily infiltrates target systems and provides attackers with capabilities to gather data execute commands, interacts with the file system and registry, and deploys new modules to extend functionality controlling the compromised systems remotely.\n\nElderly ill target cannot summon help.\n*Forced Updates for Google Chrome\n*Browser bar plug-in. \nRedirects calls to OOS phone message who;e call is still dialing\n*Emergency calls are always answered by 'police communication' at every given time of the day there are no police , ambulance, or any help available. They have already left for the day. \n*Nefarious user has on UTC time.\n Merits further investigation.",
          "modified": "2024-06-24T05:01:31.025000",
          "created": "2024-05-25T06:19:03.896000",
          "tags": [
            "threat roundup",
            "historical ssl",
            "referrer",
            "socs",
            "water dybbuk",
            "a bec",
            "actor using",
            "service",
            "privateloader",
            "blacknet rat",
            "shadowpad",
            "algorithm",
            "v3 serial",
            "number",
            "cus ogoogle",
            "trust",
            "llc cngts",
            "validity",
            "subject public",
            "key info",
            "aaaa",
            "record type",
            "ttl value",
            "cname",
            "server",
            "domain status",
            "google llc",
            "registrar abuse",
            "registrar",
            "admin country",
            "ca creation",
            "dnssec",
            "subdomains",
            "key algorithm",
            "ec oid",
            "key identifier",
            "subject key",
            "identifier",
            "first",
            "name verdict",
            "falcon sandbox",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "sha1",
            "sha256",
            "severity",
            "ascii text",
            "hybrid",
            "local",
            "click",
            "strings",
            "contact",
            "isoscope",
            "malicious",
            "Trojan:PDF/Owaphish.A",
            "android",
            "cisco",
            "show",
            "create c",
            "related pulses",
            "copy",
            "search",
            "peter pdf",
            "modifydate",
            "hacker playbook",
            "practical guide",
            "write",
            "trojan",
            "format",
            "core",
            "united",
            "unknown",
            "passive dns",
            "scan endpoints",
            "all scoreblue",
            "urls",
            "files",
            "none related",
            "miles",
            "all search",
            "otx scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "abuse",
            "pentest",
            "127.0.0.1"
          ],
          "references": [
            "Trojan:PDF/Owaphish.A: https://otx.alienvault.com/indicator/file/b3735b6a91f612fdb28832408fe53ee286d0d618802db2e35f0c9e1f266f8918",
            "https://www.hybrid-analysis.com/sample/1843e6de2e062031e54642a10f4582884a2a9e5d97092f7221c35e9fa9b92cc7/665173a88bb19689e2005033"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "RCE CVE-2023-3519",
              "display_name": "RCE CVE-2023-3519",
              "target": null
            },
            {
              "id": "Trojan:PDF/Owaphish.A",
              "display_name": "Trojan:PDF/Owaphish.A",
              "target": "/malware/Trojan:PDF/Owaphish.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1453",
              "name": "Abuse Accessibility Features",
              "display_name": "T1453 - Abuse Accessibility Features"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-MD5": 97,
            "FileHash-SHA1": 93,
            "FileHash-SHA256": 822,
            "domain": 166,
            "URL": 571,
            "hostname": 252,
            "email": 6,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 2012,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "664 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eadaae65b9123721198d08",
          "name": "Nivdort | Affected OTX accounts | Yotta Network (Cloned OTX user)",
          "description": "",
          "modified": "2024-04-06T23:03:19.046000",
          "created": "2024-03-08T09:30:22.295000",
          "tags": [
            "methodpost",
            "threat",
            "iocs",
            "urls http",
            "samples",
            "cnc",
            "phishing",
            "ransom",
            "emotet",
            "fraud services",
            "command _and_control",
            "trojan",
            "scanning host",
            "active threat",
            "malicious",
            "date hash",
            "avast avg",
            "susp",
            "win32",
            "paste",
            "hostnames",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "headers date",
            "connection",
            "first",
            "utc submissions",
            "submitters",
            "computer",
            "company limited",
            "gandi sas",
            "ovh sas",
            "export",
            "summary iocs",
            "graph community",
            "limited",
            "yotta network",
            "gvb gelimed",
            "kb microsoft",
            "indonesia",
            "kyriazhs1975",
            "vj79",
            "bc https",
            "rexxfield",
            "brian sabey",
            "as21342",
            "united",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "msie",
            "chrome",
            "creation date",
            "search",
            "dnssec",
            "entries",
            "body",
            "date",
            "as63949 linode",
            "mtb feb",
            "checkin m1",
            "gmt content",
            "type",
            "encrypt",
            "trojan",
            "artro",
            "moved",
            "pulse pulses",
            "yotta data",
            "yotta",
            "private limited",
            "india",
            "limited yotta",
            "number",
            "as140641",
            "network",
            "facebook",
            "info",
            "cisco umbrella",
            "site",
            "alexa top",
            "site top",
            "million",
            "safe site",
            "million alexa",
            "site safe",
            "cobalt strike",
            "malicious url",
            "blacknet rat",
            "union",
            "vidar",
            "malware",
            "stealer",
            "bank",
            "alexa",
            "deepscan",
            "phishing",
            "team",
            "super",
            "blacknet",
            "babar",
            "detection list",
            "blacklist http",
            "sample",
            "submission",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "kb body",
            "path",
            "as396982 google",
            "bq mar",
            "win32cve mar",
            "exploit",
            "virtool",
            "status",
            "name servers",
            "emails",
            "servers",
            "next",
            "files",
            "as44273 host",
            "germany unknown",
            "expiration date",
            "showing",
            "win32upatre mar",
            "milehighmedia",
            "ids detections",
            "possible fake",
            "av checkin",
            "initial checkin",
            "checkin",
            "utah data",
            "center",
            "june",
            "data center",
            "responsible",
            "nsa utah",
            "march",
            "closeup view",
            "july",
            "view",
            "february",
            "prism",
            "cascade",
            "darpa",
            "twitter",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "nxdomain",
            "whitelisted",
            "domain",
            "as54113",
            "msil",
            "cryp",
            "files show",
            "entries related",
            "domains",
            "as15169 google",
            "gmt cache",
            "sameorigin",
            "trojandropper",
            "asnone united",
            "title error",
            "porkbun",
            "mtb mar",
            "trojanspy",
            "installer",
            "loader",
            "hijacker",
            "targeting",
            "as30456",
            "sec ch",
            "for privacy",
            "ch ua",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "lowfi",
            "dns replication",
            "ip detections",
            "country",
            "contacted",
            "graph",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid file",
            "file size",
            "open threat",
            "learn",
            "html info",
            "exchange meta",
            "tags twitter",
            "alienvault",
            "script tags",
            "iframe tags",
            "google tag",
            "manager anchor",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "google",
            "amazon ec2",
            "email",
            "city",
            "server",
            "amazon data",
            "amazon",
            "code",
            "form",
            "po box",
            "tech",
            "show",
            "description ype",
            "collections",
            "partru",
            "execution",
            "fake host"
          ],
          "references": [
            "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
            "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
            "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
            "https://www.milehighmedia.com/legal/2257",
            "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
            "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
            "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
            "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
            "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
            "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
            "https://nsa.gov1.info/utah-data-center",
            "https://softwaremill.com/grpc-vs-rest/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Arab Emirates"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "target": null
            },
            {
              "id": "Crypt3.BWVY",
              "display_name": "Crypt3.BWVY",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "Dropper.Generic_r.EC",
              "display_name": "Dropper.Generic_r.EC",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Zbot",
              "display_name": "ALF:Trojan:Win32/Zbot",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1605",
              "name": "Command-Line Interface",
              "display_name": "T1605 - Command-Line Interface"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology",
            "Financial"
          ],
          "TLP": "white",
          "cloned_from": "65ea56ae1992b02a25aa5c51",
          "export_count": 63,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6765,
            "FileHash-MD5": 688,
            "FileHash-SHA1": 422,
            "FileHash-SHA256": 3169,
            "domain": 2171,
            "hostname": 1714,
            "email": 11,
            "CVE": 2,
            "CIDR": 2
          },
          "indicator_count": 14944,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "742 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea56ae1992b02a25aa5c51",
          "name": "TrojanSpy:Win32/Nivdort | Affected OTX accounts | Yotta  Network",
          "description": "Part II -Some users OTX accounts connected to the following | Unexpected revelation | A group of hackers masquerading as attorneys, government officials, advocates, fake nsa, security professional, help desk, etc. I don't know the association with otx.alienvault. Unauthorized logins OTX users. accounts. Deleted and modified pulses, etc. Needs further research for me to fully understand.",
          "modified": "2024-04-06T23:03:19.046000",
          "created": "2024-03-08T00:07:10.521000",
          "tags": [
            "methodpost",
            "threat",
            "iocs",
            "urls http",
            "samples",
            "cnc",
            "phishing",
            "ransom",
            "emotet",
            "fraud services",
            "command _and_control",
            "trojan",
            "scanning host",
            "active threat",
            "malicious",
            "date hash",
            "avast avg",
            "susp",
            "win32",
            "paste",
            "hostnames",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "headers date",
            "connection",
            "first",
            "utc submissions",
            "submitters",
            "computer",
            "company limited",
            "gandi sas",
            "ovh sas",
            "export",
            "summary iocs",
            "graph community",
            "limited",
            "yotta network",
            "gvb gelimed",
            "kb microsoft",
            "indonesia",
            "kyriazhs1975",
            "vj79",
            "bc https",
            "rexxfield",
            "brian sabey",
            "as21342",
            "united",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "msie",
            "chrome",
            "creation date",
            "search",
            "dnssec",
            "entries",
            "body",
            "date",
            "as63949 linode",
            "mtb feb",
            "checkin m1",
            "gmt content",
            "type",
            "encrypt",
            "trojan",
            "artro",
            "moved",
            "pulse pulses",
            "yotta data",
            "yotta",
            "private limited",
            "india",
            "limited yotta",
            "number",
            "as140641",
            "network",
            "facebook",
            "info",
            "cisco umbrella",
            "site",
            "alexa top",
            "site top",
            "million",
            "safe site",
            "million alexa",
            "site safe",
            "cobalt strike",
            "malicious url",
            "blacknet rat",
            "union",
            "vidar",
            "malware",
            "stealer",
            "bank",
            "alexa",
            "deepscan",
            "phishing",
            "team",
            "super",
            "blacknet",
            "babar",
            "detection list",
            "blacklist http",
            "sample",
            "submission",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http",
            "kb body",
            "path",
            "as396982 google",
            "bq mar",
            "win32cve mar",
            "exploit",
            "virtool",
            "status",
            "name servers",
            "emails",
            "servers",
            "next",
            "files",
            "as44273 host",
            "germany unknown",
            "expiration date",
            "showing",
            "win32upatre mar",
            "milehighmedia",
            "ids detections",
            "possible fake",
            "av checkin",
            "initial checkin",
            "checkin",
            "utah data",
            "center",
            "june",
            "data center",
            "responsible",
            "nsa utah",
            "march",
            "closeup view",
            "july",
            "view",
            "february",
            "prism",
            "cascade",
            "darpa",
            "twitter",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "nxdomain",
            "whitelisted",
            "domain",
            "as54113",
            "msil",
            "cryp",
            "files show",
            "entries related",
            "domains",
            "as15169 google",
            "gmt cache",
            "sameorigin",
            "trojandropper",
            "asnone united",
            "title error",
            "porkbun",
            "mtb mar",
            "trojanspy",
            "installer",
            "loader",
            "hijacker",
            "targeting",
            "as30456",
            "sec ch",
            "for privacy",
            "ch ua",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "lowfi",
            "dns replication",
            "ip detections",
            "country",
            "contacted",
            "graph",
            "ssdeep",
            "file type",
            "html internet",
            "magic html",
            "ascii text",
            "trid file",
            "file size",
            "open threat",
            "learn",
            "html info",
            "exchange meta",
            "tags twitter",
            "alienvault",
            "script tags",
            "iframe tags",
            "google tag",
            "manager anchor",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "google",
            "amazon ec2",
            "email",
            "city",
            "server",
            "amazon data",
            "amazon",
            "code",
            "form",
            "po box",
            "tech",
            "show",
            "description ype",
            "collections",
            "partru",
            "execution",
            "fake host"
          ],
          "references": [
            "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
            "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
            "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
            "https://www.milehighmedia.com/legal/2257",
            "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
            "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
            "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
            "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
            "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
            "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
            "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
            "https://nsa.gov1.info/utah-data-center",
            "https://softwaremill.com/grpc-vs-rest/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Arab Emirates"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            },
            {
              "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
              "target": null
            },
            {
              "id": "Crypt3.BWVY",
              "display_name": "Crypt3.BWVY",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "Babar",
              "display_name": "Babar",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "#VirTool:Win32/Obfuscator.ADB",
              "display_name": "#VirTool:Win32/Obfuscator.ADB",
              "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
            },
            {
              "id": "Dropper.Generic_r.EC",
              "display_name": "Dropper.Generic_r.EC",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/Zbot",
              "display_name": "ALF:Trojan:Win32/Zbot",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1605",
              "name": "Command-Line Interface",
              "display_name": "T1605 - Command-Line Interface"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1583.004",
              "name": "Server",
              "display_name": "T1583.004 - Server"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology",
            "Financial"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6765,
            "FileHash-MD5": 688,
            "FileHash-SHA1": 422,
            "FileHash-SHA256": 3169,
            "domain": 2171,
            "hostname": 1714,
            "email": 11,
            "CVE": 2,
            "CIDR": 2
          },
          "indicator_count": 14944,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "742 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea6410c1e1b1185951ef98",
          "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack executed (Copy)",
          "description": "",
          "modified": "2024-04-05T12:00:46.637000",
          "created": "2024-03-08T01:04:16.906000",
          "tags": [
            "referrer",
            "tsara brashears",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "pe resource",
            "execution",
            "sneaky server",
            "emotet",
            "android",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "formbook",
            "urls",
            "contacted",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "pe32 executable",
            "ms windows",
            "intel",
            "generic cil",
            "executable",
            "mono",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "samplename",
            "samplepath",
            "jays youtube",
            "rticon neutral",
            "details",
            "header intel",
            "name md5",
            "type",
            "language",
            "contained",
            "ico rtgroupicon",
            "neutral",
            "net technology",
            "corporation",
            "domains",
            "markmonitor inc",
            "malicious",
            "cnc",
            "network",
            "bypass password",
            "network probe",
            "dns query",
            "as20940",
            "united",
            "aaaa",
            "search",
            "showing",
            "date",
            "passive dns",
            "registrar",
            "unknown",
            "encrypt",
            "next",
            "domain",
            "emails",
            "name servers",
            "as199524",
            "record value",
            "rst seen",
            "last seen",
            "asn country",
            "cname",
            "as15169 google",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files ip",
            "as4788",
            "address",
            "pulses",
            "win32",
            "entries",
            "dadjoke",
            "ms defender",
            "united kingdom",
            "germany unknown",
            "as46606",
            "as14061",
            "servers",
            "as12576 ee",
            "russia unknown",
            "as3320 deutsche",
            "gamaredon",
            "armageddon",
            "as8068",
            "script urls",
            "for privacy",
            "script domains",
            "certificate",
            "meta",
            "creation date",
            "as14627",
            "ipv4",
            "onthewifi",
            "as54113",
            "trojan",
            "flywheel",
            "sea x",
            "accept",
            "ransom",
            "post http",
            "langserbian",
            "sublangdefault",
            "rticon",
            "process32nextw",
            "medium",
            "t1055",
            "high",
            "ip address",
            "generic",
            "body",
            "markus",
            "june",
            "copy",
            "bitcoin"
          ],
          "references": [
            "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
            "FormBook: 45.159.189.105",
            "FormBook: http://45.159.189.105/bot/regex",
            "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
            "Relic: bam.nr-data.net [Apple Private Data Collection]",
            "capitana.onthewifi.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "SLF:Trojan:Win32/Grandoreiro.A",
              "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.KM!MTB",
              "display_name": "Trojan:Win32/Glupteba.KM!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1188",
              "name": "Multi-hop Proxy",
              "display_name": "T1188 - Multi-hop Proxy"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65e863bebbf95e0dc5a4169a",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 309,
            "FileHash-SHA1": 307,
            "FileHash-SHA256": 3084,
            "URL": 3066,
            "domain": 1085,
            "hostname": 1709,
            "CVE": 1,
            "email": 7
          },
          "indicator_count": 9568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e863bebbf95e0dc5a4169a",
          "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack expected",
          "description": "Network compromised updated Apple device was directed (303) to a server. This is one of several botnets found. onthewifi \u2206 {Win32:BotX-gen\\ [Trj]} \u2022 Injection process | Password bypass. Studies targets behavior | Checks for other devices | Glupteba: \n Glupteba is a trojan-type program, malicious software that installs other programs of this type. Cyber criminals can perform a number of actions of a malicious hacker's choice on your device.",
          "modified": "2024-04-05T12:00:46.637000",
          "created": "2024-03-06T12:38:22.052000",
          "tags": [
            "referrer",
            "tsara brashears",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "pe resource",
            "execution",
            "sneaky server",
            "emotet",
            "android",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "formbook",
            "urls",
            "contacted",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "pe32 executable",
            "ms windows",
            "intel",
            "generic cil",
            "executable",
            "mono",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "samplename",
            "samplepath",
            "jays youtube",
            "rticon neutral",
            "details",
            "header intel",
            "name md5",
            "type",
            "language",
            "contained",
            "ico rtgroupicon",
            "neutral",
            "net technology",
            "corporation",
            "domains",
            "markmonitor inc",
            "malicious",
            "cnc",
            "network",
            "bypass password",
            "network probe",
            "dns query",
            "as20940",
            "united",
            "aaaa",
            "search",
            "showing",
            "date",
            "passive dns",
            "registrar",
            "unknown",
            "encrypt",
            "next",
            "domain",
            "emails",
            "name servers",
            "as199524",
            "record value",
            "rst seen",
            "last seen",
            "asn country",
            "cname",
            "as15169 google",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files ip",
            "as4788",
            "address",
            "pulses",
            "win32",
            "entries",
            "dadjoke",
            "ms defender",
            "united kingdom",
            "germany unknown",
            "as46606",
            "as14061",
            "servers",
            "as12576 ee",
            "russia unknown",
            "as3320 deutsche",
            "gamaredon",
            "armageddon",
            "as8068",
            "script urls",
            "for privacy",
            "script domains",
            "certificate",
            "meta",
            "creation date",
            "as14627",
            "ipv4",
            "onthewifi",
            "as54113",
            "trojan",
            "flywheel",
            "sea x",
            "accept",
            "ransom",
            "post http",
            "langserbian",
            "sublangdefault",
            "rticon",
            "process32nextw",
            "medium",
            "t1055",
            "high",
            "ip address",
            "generic",
            "body",
            "markus",
            "june",
            "copy",
            "bitcoin"
          ],
          "references": [
            "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
            "FormBook: 45.159.189.105",
            "FormBook: http://45.159.189.105/bot/regex",
            "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
            "Relic: bam.nr-data.net [Apple Private Data Collection]",
            "capitana.onthewifi.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "SLF:Trojan:Win32/Grandoreiro.A",
              "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.KM!MTB",
              "display_name": "Trojan:Win32/Glupteba.KM!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1188",
              "name": "Multi-hop Proxy",
              "display_name": "T1188 - Multi-hop Proxy"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 309,
            "FileHash-SHA1": 307,
            "FileHash-SHA256": 3084,
            "URL": 3066,
            "domain": 1085,
            "hostname": 1709,
            "CVE": 1,
            "email": 7
          },
          "indicator_count": 9568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a0e8c20860fea88779a",
          "name": "https://surveyheart.com/form/619fb5dc68ff1721fc915f81",
          "description": "",
          "modified": "2023-12-06T15:58:06.293000",
          "created": "2023-12-06T15:58:06.293000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3624,
            "FileHash-SHA256": 1584,
            "domain": 871,
            "hostname": 1290,
            "FileHash-MD5": 20,
            "FileHash-SHA1": 20
          },
          "indicator_count": 7409,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708f0647d0fcade949cf5d",
          "name": "Samantha Borrego search using unknown extra twitter account id   Samantha Borrego ID: 18ce54vevpn",
          "description": "",
          "modified": "2023-12-06T15:11:02.240000",
          "created": "2023-12-06T15:11:02.240000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 502,
            "hostname": 172,
            "URL": 694,
            "domain": 111,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 165
          },
          "indicator_count": 1889,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ea87933eb5baaf70cf4",
          "name": "jetbrains - corba - gerrit - dev osx - RU op's find windows update workaround via google ink",
          "description": "",
          "modified": "2023-12-06T15:09:28.666000",
          "created": "2023-12-06T15:09:28.666000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-SHA256": 475,
            "FileHash-SHA1": 1,
            "hostname": 149,
            "URL": 212,
            "domain": 87,
            "URI": 1
          },
          "indicator_count": 927,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6451ac22105fabd34fbdf476",
          "name": "https://surveyheart.com/form/619fb5dc68ff1721fc915f81",
          "description": "Albert Hill fake profile has 1 follower and 1 follow. the one follow has this url in the p rofile",
          "modified": "2023-05-03T00:34:42.633000",
          "created": "2023-05-03T00:34:42.633000",
          "tags": [
            "entity"
          ],
          "references": [
            "https://www.virustotal.com/graph/g5cc372545fb241bdab97ceedfdc72d87d6ec1e42c9a545ae9f824ed1e99521d9",
            "g5cc372545fb241bdab97ceedfdc72d87d6ec1e42c9a545ae9f824ed1e99521d9.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3624,
            "FileHash-SHA256": 1584,
            "hostname": 1290,
            "domain": 871,
            "IPv4": 95,
            "FileHash-MD5": 20,
            "FileHash-SHA1": 20
          },
          "indicator_count": 7504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1082 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628fb2595df81daed7c2591f",
          "name": "Samantha Borrego search using unknown extra twitter account id   Samantha Borrego ID: 18ce54vevpn",
          "description": "Seriously fucked up clever shit.... this  is what those wankers ruin your life for",
          "modified": "2022-06-25T00:02:42.269000",
          "created": "2022-05-26T17:01:13.683000",
          "tags": [
            "Samantha Borrego ID: 18ce54vevpn",
            "https://www.virustotal.com/graph/ge1933ce84783477284db3bd89196fb"
          ],
          "references": [
            "ge1933ce84783477284db3bd89196fb410e09c51ca3ac4ca986cc943ccbece636.json",
            "Samantha Borrego ID: 18ce54vevpn",
            "VT graph creation with download of MISP upload to otx",
            "https://www.virustotal.com/graph/ge1933ce84783477284db3bd89196fb410e09c51ca3ac4ca986cc943ccbece636"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 694,
            "domain": 111,
            "FileHash-SHA256": 502,
            "hostname": 172,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 165
          },
          "indicator_count": 1889,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1394 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "628b8a3e48a18ecebb33e047",
          "name": "jetbrains - corba - gerrit - dev osx - RU op's find windows update workaround via google ink",
          "description": "jetbrains/jdk8u_corba/+/studio-master-dev-osx/src/share/classes/com/sun/corba/se\n\nWhen there were question over Jetbrains being breached as a result if Solarwind they concluded NO. I disagreed then and still disagree now",
          "modified": "2022-06-22T00:00:54.452000",
          "created": "2022-05-23T13:21:02.617000",
          "tags": [
            "https://android.googlesource.com/platform/external/jetbrains/jdk",
            "Solarwinds",
            "Jetbrains",
            "Cobra",
            "SE",
            "https://www.virustotal.com/graph/g085b73660cb5491089812cd6a9a178",
            "CVE-2017-8977",
            "CVR-2017-11882"
          ],
          "references": [
            "https://android.googlesource.com/platform/external/jetbrains/jdk8u_corba/+/studio-master-dev-osx/src/share/classes/com/sun/corba/se",
            "https://www.virustotal.com/graph/g085b73660cb5491089812cd6a9a178c809d1e24641084394bb0c458803f5d597"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 212,
            "URI": 1,
            "hostname": 149,
            "domain": 87,
            "FileHash-SHA256": 475,
            "CVE": 2,
            "FileHash-SHA1": 1
          },
          "indicator_count": 927,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 395,
          "modified_text": "1397 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/db4e2e018a3e7f1227d7ee73590290cbd2c5f85083d7d2cd2bfbfce2d86bc85b_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1757802136&Signature=ZMB94nTTqlBqbckg%2Bto3APyffn72wQ8c%2BtAJCCTNE3HE7lF3WYAXyjdMPB0xKY6TVdQIXYiGj6C8cK925JJttjjW91Be%2BG5oJQ2Tkmou66cPgSgOdOAQEKXq2RNXSvvZUTKgJSbxJritEPsUDcE%2FOZrDG1fY%2FtVq7cxQdLdhKacpB%2FiFLNzlcCWDCLJtwGhyRwoESchlxvvy%2Bazy40CNs35Eiw1rci3tBqQS97F7mBV1GnSrz%2FFZKh",
        "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
        "https://maisexo-com.putaria.info/casting \u2022  https://contosadultos-club.sexogratis.page/tudo",
        "https://www.virustotal.com/graph/g085b73660cb5491089812cd6a9a178c809d1e24641084394bb0c458803f5d597",
        "Ransom: message.htm.com",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "g5cc372545fb241bdab97ceedfdc72d87d6ec1e42c9a545ae9f824ed1e99521d9.json",
        "Spyware: FileHash-SHA256 035e393630953b89c602e7cfa3409da790e99309c2d916336147cf9c59ee1b89",
        "Infectious Disease UC Health denied target medication they said she needed as questionable liquid seeped into her brain.",
        "Stop following targets relatives everywhere , associates. Stop circling former residence..",
        "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
        "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
        "Targets mother passed in 2014. So much malicious activity obituary had to be taken down when hackers put target in obituary",
        "There is fear in silence or speaking out",
        "https://www2.itsyourporn.com/license.php \u2022  https://www.lovephoto.tw/members",
        "https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf",
        "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "https://discuss.ai.google.dev/c/gemma/10",
        "Honestly, you\u2019ve never seen or met her no many how many people you\u2019ve sent out. That\u2019s why you quiz.",
        "If someone is believed to be a threat they have right to due process.",
        "https://static.pornhat.com/contents/videos_screenshots/642000/642793/640x360/1.jpg",
        "https://families.google/intl/pt-PT_ALL/familylink/",
        "ge1933ce84783477284db3bd89196fb410e09c51ca3ac4ca986cc943ccbece636.json",
        "https://www.milehighmedia.com/legal/2257",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
        "https://m.bigwetbutts.com/ tmi",
        "I am very upset. Whoever is doing this is sick.",
        "https://meumundogay-com.sexogratis.page/locker",
        "First they discredit you, wear you down mentally , hunt you down , then\u2026.They  have to deal with God.",
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
        "Red Team Abuse? Starfield ? DoD? You need a real criminal Jeffrey Reimer.",
        "Colorado corruption will be exposed one day.",
        "FormBook: 45.159.189.105",
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "ftp.iamrobert.com ? \u2022 https://www.meritshealth.com/templates/iamrobert/fonts/Graphik-Regular.eot",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
        "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
        "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "Samantha Borrego ID: 18ce54vevpn",
        "https://www.virustotal.com/graph/ge1933ce84783477284db3bd89196fb410e09c51ca3ac4ca986cc943ccbece636",
        "https://www.meritshealth.com/ Defense.Gov Mobility Co?  <https://iamwithrobert.com/>",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "1.2016 M.Brian Sabey filed a complaint about?  Jeffrey Reimer refused Lie detector test and False memory exam",
        "Dear US Government, the man who assaulted targets name is Jeffrey Scott Reimer of Chester Springs, PA",
        "https://webcams.itsyourporn.com/ \u2022 https://members.itsyourporn.com/",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "Discovery of targets pirated music led to her website down the next day! After 9 years?",
        "Can the DoD no questions asked target a SA victim",
        "https://www.virustotal.com/graph/g5cc372545fb241bdab97ceedfdc72d87d6ec1e42c9a545ae9f824ed1e99521d9",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
        "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
        "https://es.pornhat.com/models/the-sex-creator/",
        "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
        "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
        "https://load.ss.hexagongeosystems.com \u2022 https://rail.hexagongeosystems.com",
        "https://uj140.keap-link003.com/v2/render/acc9c3f6b0340c8e01d0d3d0e1662c9e/eJxtjjsLwjAUhf_LnTP0hdRspYQSWkXEwU1Ce4XUmob0Riil_90o0snxPD7OWYDQKEOyAw6-j7MIGDhstdVoqBwNqfYbprs4T3IGgzaPyo3eAl_-sVv-cbM0yfYRA5otho44FLKBddOXc1HW8ljdTvIqmgDjU5N4heEJODmPDJS1aLrfjxpn4Hc1TLi-ARRkO0Y=/pixel.png",
        "Trojan:PDF/Owaphish.A: https://otx.alienvault.com/indicator/file/b3735b6a91f612fdb28832408fe53ee286d0d618802db2e35f0c9e1f266f8918",
        "Relic: bam.nr-data.net [Apple Private Data Collection]",
        "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
        "This information was brought to target by concerned entities who handled body.",
        "socialmedia \u2022 socialmedia.defense.gov \u2022 static.defense.gov",
        "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
        "https://forward.ro/",
        "http://service.adultprovide.com/docs/records.htm?site=bigtitsboss",
        "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
        "These greedy people & government grifters steal  money from victims, including life insurance policies",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "https://softwaremill.com/grpc-vs-rest/",
        "66.254.114.41 \u2022 brazzersnetwork.com \u2022 brazzers.com",
        "https://members.engine.com/login \u2022  https://members.engine.com/payment-details/220210",
        "Jefferson County, Coroner  falsely states Mom died in car accident in Lakewood on death certificate .",
        "slscr.update.microsoft.com \u2022client.wns.windows.com \u2022  c.pki.goog \u2022 login.live.com",
        "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "https://pics-storage-1.pornhat.com/contents/albums/main/1920x1080/135000/135855/9537375.jp",
        "https://android.googlesource.com/platform/external/jetbrains/jdk8u_corba/+/studio-master-dev-osx/src/share/classes/com/sun/corba/se",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27",
        "http://clients2.google.com/time/1/current?cup2key=8:ZnsjfqkCHZe8ziQKNl-PZVHX2EXyFv9m6Q0Dnd_a_t8&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "Moms body moved by Douglas County to Jefferson County after cause of death ruled natural causes.",
        "There\u2019s a problem with terrorizing victims, relatives of, associates of and stealing their property intellectual or otherwise",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
        "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
        "Sorry! I can\u2019t help being upset about the unfairness of this constant cruel harassment.",
        "No, they put Tsara in her mom\u2019s obituary, she couldn\u2019t grieve, she had to take it down.",
        "capitana.onthewifi.com",
        "She was a researcher not a hacker. A mother not a criminal. Most talented and least impressed person I have ever known.",
        "https://nsa.gov1.info/utah-data-center",
        "https://rto.bappam.eu/ai-n2cdl/mirai-2025-ven5k-telugu-movie-watch-online.html",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "https://media.defense.gov/2024/sep/18/2003547016/-1/-1/0/csa-prc-linked-actors-botnet.pdf",
        "VT graph creation with download of MISP upload to otx",
        "FileHash-SHA256 025ca2c59c26197f3c1cd746469a5b9fe219a748716abd90daee792f34037d63",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "FormBook: http://45.159.189.105/bot/regex",
        "zeroeyes.host \u2022 media.defense.gov \u2022 defense.gov \u2022 23.222.155.67",
        "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "Target agreed and complied with all lie detector measures.",
        "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
        "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 www.pornhub.com",
        "https://d1rozh26tys225.cloudfront.net/robot-suspicion.svg (mobility company no one has heard of)",
        "Off subject: Don\u2019t try to kill Tucker Carlson for asking valid questions about an apparent murder Sam.",
        "Target left unattended by anyone in a hospital except a security guard. Hospital refused care. Ignored rare brain incident from high cervical & brain assault injuries aggravated by car accident.",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]",
        "Targets mother died in her bed in Castke Rock, Douglasc County, Colorado",
        "Mirai: simswap.in",
        "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
        "https://buildings.hexagongeosystems.com \u2022 https://connect.hexagongeosystems.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
        "iamrobert.com Y.A.S.",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
        "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
        "https://media.defense.gov/2020/jun/09/2002313081/-1/-1/0/csi-detect-and-prevent-web-shell-malware-20200422.pdf",
        "3-4 Police presence. 25 + hospital employees prepped radiology room. No one left room so was it for her?",
        "Jeffrey Scott Reiner was considered a skilled predator by Bryan Counts MD. He later attacked target.",
        "https://www.hybrid-analysis.com/sample/1843e6de2e062031e54642a10f4582884a2a9e5d97092f7221c35e9fa9b92cc7/665173a88bb19689e2005033",
        "https://pornokind.vgt.pl \u2022  https://cdn2.video.itsyourporn.com",
        "mastodon.social",
        "Is the family allowed to have a funeral for Tsara or print an obituary",
        "https://www-pornocarioca-com.sexogratis.page/videos/bbb/ex",
        "Remarks online \u2018 T\u2019*#^^ is not a runner\u2019 a size 00 broke two track records at a major universities.",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win.ransomware.bitman-9862733-0",
            "Babar",
            "Trojandownloader:win32/upatre.a",
            "Rce cve-2023-3519",
            "Asacky",
            "Ymacco",
            "Upatre",
            "Hematite",
            "Win32:dropper",
            "#lowfi:hstr:virtool:win32/gendecnryptalgo.s02",
            "Trojan:win32/floxif.e",
            "Dropper.generic_r.ec",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Malware",
            "Win32:malwarex",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Win32:trojanx-gen\\ [trj]",
            "Hacktool",
            "Win32:cryptor",
            "Emotet",
            "#virtool:win32/obfuscator.adb",
            "All",
            "Trojan:win32/vflooder!rfn",
            "Win32:botx-gen\\ [trj]",
            "Trojandropper:win32/bcryptinject.b!msr",
            "W32.aidetectmalware.cs",
            "Trojan:bat/musecador",
            "Trojan:win32/qbot.r!mtb",
            "Malware + code overlap",
            "Backdoor:win32/plugx.n!dha",
            "Virus:win32/floxif.h",
            "Worm:win32/pykspa.c",
            "Trojan:win32/glupteba.km!mtb",
            "Bancos",
            "Backdoor.xtreme",
            "Apnic",
            "Trojan:pdf/owaphish.a",
            "Win32:malware-gen",
            "Pup/hacktool",
            "Virtool:win32/ceeinject.akz!bit",
            "Androidoverlaymalware - mob-s0012",
            "Win.malware.jaik-9968280-0",
            "Win.virus.pioneer-9111434-0",
            "Artro",
            "Blacknet",
            "Trojanspy:win32/banker.ly",
            "Trojanspy:win32/nivdort.cw",
            "Win.virus.polyransom-5704625-0",
            "Win32:evo",
            "Slf:trojan:win32/grandoreiro.a",
            "Crypt3.bwvy",
            ",  win.worm.pykspa-6057105-0",
            "Worm:win32/mofksys.rnd!mtb",
            "Win32:trojan",
            "#lowfi:lua:autoitv3craftedoverlay",
            "Win32:cleaman-k\\ [trj]",
            "Alf:trojan:win32/zbot",
            "Trojandownloader:win32/upatre",
            "Malwarex",
            "Target saver",
            "Virtool:win32/injector.gen!bq",
            "Win32:renos-ky\\ [trj]",
            "Trojanspy",
            "Win32:trojan-gen"
          ],
          "industries": [
            "Financial",
            "Technology",
            "Telecommunications",
            "Legal",
            "Civil society",
            "Government",
            "Media",
            "Targets"
          ],
          "unique_indicators": 78750
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/youtube.com.mx",
    "whois": "http://whois.domaintools.com/youtube.com.mx",
    "domain": "youtube.com.mx",
    "hostname": "m.youtube.com.mx"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 18,
  "pulses": [
    {
      "id": "68e2bb5d9ee8577ab5519f2c",
      "name": "Meritshealth with DoD links? ",
      "description": "",
      "modified": "2026-01-13T00:05:56.401000",
      "created": "2025-10-05T18:39:25.286000",
      "tags": [
        "gtmk5nxqc6",
        "utc amazon",
        "utc na",
        "acceptencoding",
        "gmt contenttype",
        "connection",
        "true pragma",
        "gmt setcookie",
        "httponly",
        "gmt vary",
        "nc000000 up",
        "html document",
        "unicode text",
        "utf8 text",
        "oc0006 http",
        "http traffic",
        "https http",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "match info",
        "t1573 severity",
        "info",
        "number",
        "ja3s",
        "algorithm",
        "azure rsa",
        "tls issuing",
        "cus subject",
        "stwa lredmond",
        "cnmicrosoft ecc",
        "update secure",
        "server ca",
        "omicrosoft cus",
        "get http",
        "dns resolutions",
        "registrar",
        "markmonitor inc",
        "country",
        "resolver domain",
        "type name",
        "html",
        "apnic",
        "apnic whois",
        "please",
        "rirs",
        "cidr",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "development att",
        "name tactics",
        "binary file",
        "ck matrix",
        "wheelchair",
        "iamrobert",
        "pattern match",
        "ascii text",
        "href",
        "united",
        "general",
        "local",
        "path",
        "encrypt",
        "click",
        "passive dns",
        "urls",
        "files",
        "reverse dns",
        "netherlands",
        "present aug",
        "a domains",
        "moved",
        "first pqc",
        "ip address",
        "unknown ns",
        "unknown aaaa",
        "title",
        "body",
        "meta",
        "window",
        "accept",
        "body doctype",
        "welcome",
        "ok server",
        "gmt content",
        "present jul",
        "present sep",
        "aaaa",
        "hostname",
        "error",
        "defense evasion",
        "windows nt",
        "response",
        "vary",
        "strings",
        "core",
        "t1027.013 encrypted/encoded",
        "michelin lazy k",
        "prefetch8",
        "flag",
        "date",
        "starfield",
        "hybrid",
        "mobility cr",
        "extraction",
        "data upload",
        "include",
        "o url",
        "url url",
        "included i0",
        "review ioc",
        "excluded ic",
        "suggested",
        "find sugi",
        "failed",
        "cre pul",
        "enter",
        "enter sc",
        "type",
        "enric",
        "extra",
        "type opaste",
        "data u",
        "included",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "null",
        "refresh",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "expiration",
        "url https",
        "no expiration",
        "iocs",
        "ipv4",
        "text drag",
        "drop or",
        "browse to",
        "select file",
        "redacted for",
        "server",
        "privacy tech",
        "privacy admin",
        "postal code",
        "stateprovince",
        "organization",
        "email",
        "code",
        "quantum rooms",
        "sam somalia",
        "emp",
        "porn",
        "media defense",
        "gov porn",
        "suck my nips",
        "reimer suspect",
        "jeffrey reimer",
        "dod",
        "department of defense",
        "show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results may",
        "entries http",
        "scans record",
        "value status",
        "sabey type",
        "merits fake",
        "y.a.s.",
        "pornography",
        "ramsom"
      ],
      "references": [
        "https://www.meritshealth.com/ Defense.Gov Mobility Co?  <https://iamwithrobert.com/>",
        "zeroeyes.host \u2022 media.defense.gov \u2022 defense.gov \u2022 23.222.155.67",
        "https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf",
        "https://media.defense.gov/2020/jun/09/2002313081/-1/-1/0/csi-detect-and-prevent-web-shell-malware-20200422.pdf",
        "https://rto.bappam.eu/ai-n2cdl/mirai-2025-ven5k-telugu-movie-watch-online.html",
        "https://pornokind.vgt.pl \u2022  https://cdn2.video.itsyourporn.com",
        "https://webcams.itsyourporn.com/ \u2022 https://members.itsyourporn.com/",
        "https://pics-storage-1.pornhat.com/contents/albums/main/1920x1080/135000/135855/9537375.jp",
        "https://static.pornhat.com/contents/videos_screenshots/642000/642793/640x360/1.jpg",
        "https://d1rozh26tys225.cloudfront.net/robot-suspicion.svg (mobility company no one has heard of)",
        "https://www2.itsyourporn.com/license.php \u2022  https://www.lovephoto.tw/members",
        "https://members.engine.com/login \u2022  https://members.engine.com/payment-details/220210",
        "https://www-pornocarioca-com.sexogratis.page/videos/bbb/ex",
        "https://media.defense.gov/2024/sep/18/2003547016/-1/-1/0/csa-prc-linked-actors-botnet.pdf",
        "https://maisexo-com.putaria.info/casting \u2022  https://contosadultos-club.sexogratis.page/tudo",
        "https://meumundogay-com.sexogratis.page/locker",
        "https://es.pornhat.com/models/the-sex-creator/",
        "Dear US Government, the man who assaulted targets name is Jeffrey Scott Reimer of Chester Springs, PA",
        "Can the DoD no questions asked target a SA victim",
        "Red Team Abuse? Starfield ? DoD? You need a real criminal Jeffrey Reimer.",
        "There\u2019s a problem with terrorizing victims, relatives of, associates of and stealing their property intellectual or otherwise",
        "socialmedia \u2022 socialmedia.defense.gov \u2022 static.defense.gov",
        "There is fear in silence or speaking out",
        "Target left unattended by anyone in a hospital except a security guard. Hospital refused care. Ignored rare brain incident from high cervical & brain assault injuries aggravated by car accident.",
        "3-4 Police presence. 25 + hospital employees prepped radiology room. No one left room so was it for her?",
        "If someone is believed to be a threat they have right to due process.",
        "Infectious Disease UC Health denied target medication they said she needed as questionable liquid seeped into her brain.",
        "She was a researcher not a hacker. A mother not a criminal. Most talented and least impressed person I have ever known.",
        "Remarks online \u2018 T\u2019*#^^ is not a runner\u2019 a size 00 broke two track records at a major universities.",
        "Honestly, you\u2019ve never seen or met her no many how many people you\u2019ve sent out. That\u2019s why you quiz.",
        "ftp.iamrobert.com ? \u2022 https://www.meritshealth.com/templates/iamrobert/fonts/Graphik-Regular.eot",
        "iamrobert.com Y.A.S.",
        "1.2016 M.Brian Sabey filed a complaint about?  Jeffrey Reimer refused Lie detector test and False memory exam",
        "Target agreed and complied with all lie detector measures.",
        "Is the family allowed to have a funeral for Tsara or print an obituary",
        "No, they put Tsara in her mom\u2019s obituary, she couldn\u2019t grieve, she had to take it down.",
        "I am very upset. Whoever is doing this is sick."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "TA0042",
          "name": "Resource Development",
          "display_name": "TA0042 - Resource Development"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1562.004",
          "name": "Disable or Modify System Firewall",
          "display_name": "T1562.004 - Disable or Modify System Firewall"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1562.008",
          "name": "Disable Cloud Logs",
          "display_name": "T1562.008 - Disable Cloud Logs"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1056.003",
          "name": "Web Portal Capture",
          "display_name": "T1056.003 - Web Portal Capture"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1180",
          "name": "Screensaver",
          "display_name": "T1180 - Screensaver"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68e2b14d83bb63502feac65e",
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1365,
        "URL": 11172,
        "hostname": 2780,
        "FileHash-MD5": 381,
        "FileHash-SHA256": 4420,
        "FileHash-SHA1": 338,
        "CIDR": 4,
        "SSLCertFingerprint": 24,
        "CVE": 1,
        "email": 1
      },
      "indicator_count": 20486,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "96 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68e2b14d83bb63502feac65e",
      "name": "Did the \u2018real\u2019 DoD kill Targets wheelchair as promised? It\u2019s alive again.",
      "description": "I\u2019d never think the DoD would be found when researching a wheelchair company NO ONE has ever heard of in this region. \n\nA wheelchair was ordered for target early spring, it was received in early summer. \n\nSettings became a crazy mess. Suspicion was immediate as a toothless tech tried to identify if dealing w/target by birth year , quizzing, fear tactics (doomsday wheelchair) , familiar Then warns about EMP attacks against wheelchair? His son is a hacker (gamer) + software engineer. He left not knowing if target status after quizzing tech knowledge? I intentionally verbalized the truth , target was a very early adopter of Ruby & Ruby on Rails & everything tech, he dropped his tools & left breaking the arm of wheelchair. New tech  needed. Later denies ever being a mobility technician. They killed  a new wheelchair. Why?. You\u2019re allowed to donate your equipment Vets & uninsured NEED mobility equipment. Stop the craziness. Is it possible gamer hackers are riding the DoD w/o their knowledge?",
      "modified": "2026-01-07T00:00:30.717000",
      "created": "2025-10-05T17:56:29.109000",
      "tags": [
        "gtmk5nxqc6",
        "utc amazon",
        "utc na",
        "acceptencoding",
        "gmt contenttype",
        "connection",
        "true pragma",
        "gmt setcookie",
        "httponly",
        "gmt vary",
        "nc000000 up",
        "html document",
        "unicode text",
        "utf8 text",
        "oc0006 http",
        "http traffic",
        "https http",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "match info",
        "t1573 severity",
        "info",
        "number",
        "ja3s",
        "algorithm",
        "azure rsa",
        "tls issuing",
        "cus subject",
        "stwa lredmond",
        "cnmicrosoft ecc",
        "update secure",
        "server ca",
        "omicrosoft cus",
        "get http",
        "dns resolutions",
        "registrar",
        "markmonitor inc",
        "country",
        "resolver domain",
        "type name",
        "html",
        "apnic",
        "apnic whois",
        "please",
        "rirs",
        "cidr",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "development att",
        "name tactics",
        "binary file",
        "ck matrix",
        "wheelchair",
        "iamrobert",
        "pattern match",
        "ascii text",
        "href",
        "united",
        "general",
        "local",
        "path",
        "encrypt",
        "click",
        "passive dns",
        "urls",
        "files",
        "reverse dns",
        "netherlands",
        "present aug",
        "a domains",
        "moved",
        "first pqc",
        "ip address",
        "unknown ns",
        "unknown aaaa",
        "title",
        "body",
        "meta",
        "window",
        "accept",
        "body doctype",
        "welcome",
        "ok server",
        "gmt content",
        "present jul",
        "present sep",
        "aaaa",
        "hostname",
        "error",
        "defense evasion",
        "windows nt",
        "response",
        "vary",
        "strings",
        "core",
        "t1027.013 encrypted/encoded",
        "michelin lazy k",
        "prefetch8",
        "flag",
        "date",
        "starfield",
        "hybrid",
        "mobility cr",
        "extraction",
        "data upload",
        "include",
        "o url",
        "url url",
        "included i0",
        "review ioc",
        "excluded ic",
        "suggested",
        "find sugi",
        "failed",
        "cre pul",
        "enter",
        "enter sc",
        "type",
        "enric",
        "extra",
        "type opaste",
        "data u",
        "included",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "null",
        "refresh",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "expiration",
        "url https",
        "no expiration",
        "iocs",
        "ipv4",
        "text drag",
        "drop or",
        "browse to",
        "select file",
        "redacted for",
        "server",
        "privacy tech",
        "privacy admin",
        "postal code",
        "stateprovince",
        "organization",
        "email",
        "code",
        "quantum rooms",
        "sam somalia",
        "emp",
        "porn",
        "media defense",
        "gov porn",
        "suck my nips",
        "reimer suspect",
        "jeffrey reimer",
        "dod",
        "department of defense",
        "show",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results may",
        "entries http",
        "scans record",
        "value status",
        "sabey type",
        "merits fake",
        "y.a.s.",
        "pornography",
        "ramsom"
      ],
      "references": [
        "https://www.meritshealth.com/ Defense.Gov Mobility Co?  <https://iamwithrobert.com/>",
        "zeroeyes.host \u2022 media.defense.gov \u2022 defense.gov \u2022 23.222.155.67",
        "https://media.defense.gov/2022/Mar/17/2002958406/-1/-1/1/SUMMARY-OF-THE-JOINT-ALL-DOMAIN-COMMAND-AND-CONTROL-STRATEGY.pdf",
        "https://media.defense.gov/2020/jun/09/2002313081/-1/-1/0/csi-detect-and-prevent-web-shell-malware-20200422.pdf",
        "https://rto.bappam.eu/ai-n2cdl/mirai-2025-ven5k-telugu-movie-watch-online.html",
        "https://pornokind.vgt.pl \u2022  https://cdn2.video.itsyourporn.com",
        "https://webcams.itsyourporn.com/ \u2022 https://members.itsyourporn.com/",
        "https://pics-storage-1.pornhat.com/contents/albums/main/1920x1080/135000/135855/9537375.jp",
        "https://static.pornhat.com/contents/videos_screenshots/642000/642793/640x360/1.jpg",
        "https://d1rozh26tys225.cloudfront.net/robot-suspicion.svg (mobility company no one has heard of)",
        "https://www2.itsyourporn.com/license.php \u2022  https://www.lovephoto.tw/members",
        "https://members.engine.com/login \u2022  https://members.engine.com/payment-details/220210",
        "https://www-pornocarioca-com.sexogratis.page/videos/bbb/ex",
        "https://media.defense.gov/2024/sep/18/2003547016/-1/-1/0/csa-prc-linked-actors-botnet.pdf",
        "https://maisexo-com.putaria.info/casting \u2022  https://contosadultos-club.sexogratis.page/tudo",
        "https://meumundogay-com.sexogratis.page/locker",
        "https://es.pornhat.com/models/the-sex-creator/",
        "Dear US Government, the man who assaulted targets name is Jeffrey Scott Reimer of Chester Springs, PA",
        "Can the DoD no questions asked target a SA victim",
        "Red Team Abuse? Starfield ? DoD? You need a real criminal Jeffrey Reimer.",
        "There\u2019s a problem with terrorizing victims, relatives of, associates of and stealing their property intellectual or otherwise",
        "socialmedia \u2022 socialmedia.defense.gov \u2022 static.defense.gov",
        "There is fear in silence or speaking out",
        "Target left unattended by anyone in a hospital except a security guard. Hospital refused care. Ignored rare brain incident from high cervical & brain assault injuries aggravated by car accident.",
        "3-4 Police presence. 25 + hospital employees prepped radiology room. No one left room so was it for her?",
        "If someone is believed to be a threat they have right to due process.",
        "Infectious Disease UC Health denied target medication they said she needed as questionable liquid seeped into her brain.",
        "She was a researcher not a hacker. A mother not a criminal. Most talented and least impressed person I have ever known.",
        "Remarks online \u2018 T\u2019*#^^ is not a runner\u2019 a size 00 broke two track records at a major universities.",
        "Honestly, you\u2019ve never seen or met her no many how many people you\u2019ve sent out. That\u2019s why you quiz.",
        "ftp.iamrobert.com ? \u2022 https://www.meritshealth.com/templates/iamrobert/fonts/Graphik-Regular.eot",
        "iamrobert.com Y.A.S.",
        "1.2016 M.Brian Sabey filed a complaint about?  Jeffrey Reimer refused Lie detector test and False memory exam",
        "Target agreed and complied with all lie detector measures.",
        "Is the family allowed to have a funeral for Tsara or print an obituary",
        "No, they put Tsara in her mom\u2019s obituary, she couldn\u2019t grieve, she had to take it down.",
        "I am very upset. Whoever is doing this is sick."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "TA0042",
          "name": "Resource Development",
          "display_name": "TA0042 - Resource Development"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1562.004",
          "name": "Disable or Modify System Firewall",
          "display_name": "T1562.004 - Disable or Modify System Firewall"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1562.008",
          "name": "Disable Cloud Logs",
          "display_name": "T1562.008 - Disable Cloud Logs"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1056.003",
          "name": "Web Portal Capture",
          "display_name": "T1056.003 - Web Portal Capture"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1180",
          "name": "Screensaver",
          "display_name": "T1180 - Screensaver"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1328,
        "URL": 9931,
        "hostname": 2621,
        "FileHash-MD5": 381,
        "FileHash-SHA256": 4360,
        "FileHash-SHA1": 338,
        "CIDR": 4,
        "SSLCertFingerprint": 24,
        "CVE": 1,
        "email": 1
      },
      "indicator_count": 18989,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "102 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68db395368d6c4042517f3f3",
      "name": "Target Saver M1 Agent TSA Spy \u2022 Mastadon - Hit Tip! Thanks!",
      "description": "Hot Tip! I would love to give a shout out to the person who provided this information, I\u2019m not sure if they want to remain anonymous or not. Thank SO Much!\n\nSpyware and a source for distributing malicious media. Complete foothold\non networks, browsers, phones, search history and everything, massive streaming pornography distributed, members and contributors. \n\nVery important tip.  I will analyze and break down into digestible pulse sizes.",
      "modified": "2025-12-27T15:01:22.545000",
      "created": "2025-09-30T01:58:43.592000",
      "tags": [
        "http traffic",
        "match info",
        "http get",
        "info performs",
        "dns query",
        "https http",
        "mitre att",
        "evasion ta0005",
        "creates",
        "info",
        "oc0006 http",
        "wininet c0005",
        "resolved ips",
        "get http",
        "html document",
        "unicode text",
        "dynamicloader",
        "fe ff",
        "medium",
        "x00bx00",
        "uswv",
        "k uswv",
        "search",
        "high",
        "delete c",
        "yara detections",
        "redline",
        "guard",
        "write",
        "united",
        "present sep",
        "aaaa",
        "passive dns",
        "urls",
        "next associated",
        "found",
        "x content",
        "hacktool",
        "trojan",
        "error",
        "lowfi",
        "win32",
        "worm",
        "ip address",
        "mtb apr",
        "ransom",
        "virtool",
        "ain add",
        "directui",
        "element",
        "classinfobase",
        "ccbase",
        "hwndhost",
        "yara rule",
        "hpavvalue",
        "qaejh",
        "name servers",
        "cryp",
        "emails",
        "next related",
        "domain related",
        "no expiration",
        "url http",
        "url https",
        "indicator role",
        "hostname",
        "email",
        "present jun",
        "present aug",
        "present jul",
        "servers",
        "title",
        "encrypt",
        "altsvc h3",
        "date tue",
        "acceptranges",
        "reportto",
        "server",
        "gmt expires",
        "gmt contenttype",
        "script",
        "expiresthu",
        "maxage63072000",
        "pragma",
        "google safe",
        "unknown ns",
        "files",
        "location united",
        "asn as15169",
        "trojandropper",
        "susp",
        "creation date",
        "asn as133618",
        "tags",
        "related tags",
        "indicator facts",
        "backdoor",
        "ipv4 add",
        "click",
        "artro",
        "target saver",
        "trojanspy",
        "reverse dns",
        "america flag",
        "443 ma2592000",
        "hostname add",
        "verdict",
        "present mar",
        "present jan",
        "present dec",
        "present apr",
        "ipv4",
        "type indicator",
        "role title",
        "related pulses",
        "iocs",
        "moved",
        "downloads",
        "apple",
        "microsoft",
        "hexagonsystem",
        "mastadon",
        "status",
        "twitter",
        "gmt content",
        "easyredir cache",
        "v4 add",
        "redacted for",
        "privacy tech",
        "privacy admin",
        "registrar abuse",
        "available from",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "entity",
        "code",
        "date",
        "dnssec",
        "showing",
        "unknown aaaa",
        "sha256",
        "sha1",
        "ascii text",
        "ck id",
        "show technique",
        "ck matrix",
        "meta",
        "hybrid",
        "general",
        "local",
        "path",
        "strings",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "certificate"
      ],
      "references": [
        "FileHash-SHA256 025ca2c59c26197f3c1cd746469a5b9fe219a748716abd90daee792f34037d63",
        "mastodon.social",
        "https://families.google/intl/pt-PT_ALL/familylink/",
        "http://service.adultprovide.com/docs/records.htm?site=bigtitsboss",
        "slscr.update.microsoft.com \u2022client.wns.windows.com \u2022  c.pki.goog \u2022 login.live.com",
        "https://discuss.ai.google.dev/c/gemma/10",
        "https://uj140.keap-link003.com/v2/render/acc9c3f6b0340c8e01d0d3d0e1662c9e/eJxtjjsLwjAUhf_LnTP0hdRspYQSWkXEwU1Ce4XUmob0Riil_90o0snxPD7OWYDQKEOyAw6-j7MIGDhstdVoqBwNqfYbprs4T3IGgzaPyo3eAl_-sVv-cbM0yfYRA5otho44FLKBddOXc1HW8ljdTvIqmgDjU5N4heEJODmPDJS1aLrfjxpn4Hc1TLi-ARRkO0Y=/pixel.png",
        "https://m.bigwetbutts.com/ tmi",
        "Spyware: FileHash-SHA256 035e393630953b89c602e7cfa3409da790e99309c2d916336147cf9c59ee1b89",
        "Mirai: simswap.in",
        "66.254.114.41 \u2022 brazzersnetwork.com \u2022 brazzers.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian \u2022 www.pornhub.com",
        "https://buildings.hexagongeosystems.com \u2022 https://connect.hexagongeosystems.com",
        "https://load.ss.hexagongeosystems.com \u2022 https://rail.hexagongeosystems.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:VirTool:Win32/GenDecnryptAlgo.S02",
          "display_name": "#Lowfi:HSTR:VirTool:Win32/GenDecnryptAlgo.S02",
          "target": null
        },
        {
          "id": "Win.Ransomware.Bitman-9862733-0",
          "display_name": "Win.Ransomware.Bitman-9862733-0",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Target Saver",
          "display_name": "Target Saver",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Hacktool",
          "display_name": "Hacktool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        }
      ],
      "industries": [
        "Media",
        "Legal",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2964,
        "hostname": 1164,
        "URL": 4334,
        "domain": 956,
        "FileHash-MD5": 476,
        "FileHash-SHA1": 451,
        "CVE": 1,
        "email": 20,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 10368,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "113 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68eff833ed84ceaf611521d2",
      "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
      "description": "",
      "modified": "2025-10-15T19:38:27.739000",
      "created": "2025-10-15T19:38:27.739000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": "68c73fbd85dfbb4d41006ad1",
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "185 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c73fbd85dfbb4d41006ad1",
      "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
      "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
      "modified": "2025-10-14T22:26:18.109000",
      "created": "2025-09-14T22:20:45.617000",
      "tags": [
        "resolved ips",
        "parent pid",
        "full path",
        "command line",
        "cname",
        "ip address",
        "port",
        "involved direct",
        "country name",
        "nxdomain",
        "tcp connections",
        "udp connections",
        "data",
        "datacrashpad",
        "edge",
        "passive dns",
        "origin trial",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "ipv4 add",
        "files",
        "title",
        "date",
        "found",
        "gmt content",
        "hostname",
        "verdict",
        "error",
        "code",
        "present aug",
        "present sep",
        "aaaa",
        "search",
        "domain",
        "present apr",
        "present jun",
        "address google",
        "safe browsing",
        "present oct",
        "match info",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "match medium",
        "icmp traffic",
        "port t1571",
        "info",
        "c0002 wininet",
        "flag",
        "markmonitor",
        "domain address",
        "contacted hosts",
        "process details",
        "size",
        "iend ihdridatx",
        "qrmf",
        "qkdi",
        "qiyay",
        "kjtn8",
        "r0x3",
        "ihdridatx",
        "yg6qp",
        "kkrz",
        "t6 ex",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "data upload",
        "extraction",
        "failed",
        "please",
        "your browser",
        "learn",
        "opera mozilla",
        "firefox google",
        "chrome remind",
        "privacy policy",
        "safety",
        "google llc",
        "youtube",
        "mozilla firefox",
        "safari google",
        "edge opera",
        "browse youtube",
        "file",
        "indicator",
        "pattern match",
        "ascii text",
        "ck id",
        "ck matrix",
        "href",
        "general",
        "local",
        "path",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "files domain",
        "files related",
        "related tags",
        "registrar",
        "files ip",
        "asn as15169",
        "address domain",
        "ip whois",
        "service address",
        "po box",
        "city hayes",
        "country gb",
        "dnssec",
        "domain name",
        "emails",
        "script urls",
        "a domains",
        "texas flyover",
        "script domains",
        "script script",
        "trojan",
        "meta",
        "window",
        "msie",
        "chrome",
        "twitter",
        "unknown aaaa",
        "record value",
        "content type",
        "united states",
        "dynamicloader",
        "medium",
        "write c",
        "high",
        "show",
        "digicert",
        "olet",
        "encrypt",
        "win64",
        "responder",
        "write",
        "next",
        "unknown",
        "install",
        "dummy",
        "entries",
        "displayname",
        "windows",
        "united",
        "tofsee",
        "copy",
        "stream",
        "malware",
        "hostile",
        "body",
        "hostile client",
        "apollo",
        "jaik",
        "code overlap",
        "sri lanka",
        "pintuck sri",
        "lanka",
        "unknown ns",
        "moved",
        "buy apparal",
        "win32",
        "trojandropper",
        "virtool",
        "susp",
        "ipv4",
        "pulse pulses",
        "urls",
        "reverse dns",
        "location united",
        "installer"
      ],
      "references": [
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Malware + Code Overlap",
          "display_name": "Malware + Code Overlap",
          "target": null
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "Trojandownloader:Win32/Upatre",
          "display_name": "Trojandownloader:Win32/Upatre",
          "target": "/malware/Trojandownloader:Win32/Upatre"
        },
        {
          "id": "Trojan:BAT/Musecador",
          "display_name": "Trojan:BAT/Musecador",
          "target": "/malware/Trojan:BAT/Musecador"
        },
        {
          "id": "Win32:Trojan",
          "display_name": "Win32:Trojan",
          "target": null
        },
        {
          "id": "Bancos",
          "display_name": "Bancos",
          "target": null
        },
        {
          "id": "Hematite",
          "display_name": "Hematite",
          "target": null
        },
        {
          "id": "Trojanspy:Win32/Banker.LY",
          "display_name": "Trojanspy:Win32/Banker.LY",
          "target": "/malware/Trojanspy:Win32/Banker.LY"
        },
        {
          "id": "Trojan:Win32/Vflooder!rfn",
          "display_name": "Trojan:Win32/Vflooder!rfn",
          "target": "/malware/Trojan:Win32/Vflooder!rfn"
        },
        {
          "id": "Win32:MalwareX",
          "display_name": "Win32:MalwareX",
          "target": null
        },
        {
          "id": "Malwarex",
          "display_name": "Malwarex",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.AKZ!bit",
          "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
          "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
        },
        {
          "id": "Win32:Dropper",
          "display_name": "Win32:Dropper",
          "target": null
        },
        {
          "id": "Ymacco",
          "display_name": "Ymacco",
          "target": null
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Trojandownloader:Win32/Upatre.A",
          "display_name": "Trojandownloader:Win32/Upatre.A",
          "target": "/malware/Trojandownloader:Win32/Upatre.A"
        },
        {
          "id": "Win32:Evo",
          "display_name": "Win32:Evo",
          "target": null
        },
        {
          "id": "Trojandropper:Win32/BcryptInject.B!MSR",
          "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
          "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
        },
        {
          "id": "Win32:TrojanX-gen\\ [Trj]",
          "display_name": "Win32:TrojanX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win32:Cleaman-K\\ [Trj]",
          "display_name": "Win32:Cleaman-K\\ [Trj]",
          "target": null
        },
        {
          "id": "Asacky",
          "display_name": "Asacky",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Media"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4746,
        "hostname": 1829,
        "domain": 913,
        "FileHash-MD5": 249,
        "FileHash-SHA1": 213,
        "FileHash-SHA256": 1765,
        "email": 3,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 9735,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "186 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68c6026160a826c170a8ce93",
      "name": "Mira - Targeted attacks that demolished victim/s Media Platforms",
      "description": "Targeted attacks that demolished victim/s Media Platforms. \nDangerous crowd, bullied till the end, murder attempted hit by a vehicle many times on a one way. 22 year old who walked after attempting to drive her off I-25 Denver. Suffered more life threatening injuries. \nMonitored target. Crime: unwilling female trapped under nasty physical therapists crotch. No charges, no questions. No treatments except one SCI surgery that was 5 years too late. \nDenver is nuts. Denver law enforcement , quasi government , CBI  & attorneys are corrupted. There\u2019s something to the wicked DIA theories.  I wonder how many others have been silenced to death behind corporate greed. The PT who caused all\nof this is thoroughly treated as a victim. Family moved to safety? She was never the threat. TLB will always rest assured sheltered in the arms of God like she believed.\n#theft #rip #paypal #drive-by_compromise #mira #spotify #youtube #trulymissed",
      "modified": "2025-10-13T22:27:44.477000",
      "created": "2025-09-13T23:46:41.355000",
      "tags": [
        "http traffic",
        "iframe src",
        "https http",
        "re att",
        "access ta0001",
        "t1189 severity",
        "info found",
        "command",
        "control ta0011",
        "protocol t1071",
        "info",
        "resolved ips",
        "ip traffic",
        "pattern domains",
        "pattern urls",
        "tls sni",
        "get http",
        "dns resolutions",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "response",
        "user",
        "rules not",
        "registry keys",
        "detections not",
        "found mitre",
        "info ids",
        "sandbox",
        "number",
        "algorithm",
        "azure rsa",
        "tls issuing",
        "cus subject",
        "stwa lredmond",
        "cnmicrosoft ecc",
        "update secure",
        "server ca",
        "omicrosoft cus",
        "ip address",
        "port",
        "http",
        "url data",
        "accept",
        "gmt ifnonematch",
        "network dropped",
        "duration cuckoo",
        "version file",
        "machine label",
        "manager",
        "shutdown",
        "udp connections",
        "http requests",
        "cname",
        "nxdomain",
        "involved direct",
        "country name",
        "parent pid",
        "full path",
        "command line",
        "t1055 process",
        "layer protocol",
        "access t1189",
        "defense evasion",
        "discovery t1082",
        "control t1573",
        "youtube",
        "spotify",
        "spotify",
        "colorado blows"
      ],
      "references": [
        "https://forward.ro/",
        "https://vtbehaviour.commondatastorage.googleapis.com/db4e2e018a3e7f1227d7ee73590290cbd2c5f85083d7d2cd2bfbfce2d86bc85b_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1757802136&Signature=ZMB94nTTqlBqbckg%2Bto3APyffn72wQ8c%2BtAJCCTNE3HE7lF3WYAXyjdMPB0xKY6TVdQIXYiGj6C8cK925JJttjjW91Be%2BG5oJQ2Tkmou66cPgSgOdOAQEKXq2RNXSvvZUTKgJSbxJritEPsUDcE%2FOZrDG1fY%2FtVq7cxQdLdhKacpB%2FiFLNzlcCWDCLJtwGhyRwoESchlxvvy%2Bazy40CNs35Eiw1rci3tBqQS97F7mBV1GnSrz%2FFZKh",
        "http://clients2.google.com/time/1/current?cup2key=8:ZnsjfqkCHZe8ziQKNl-PZVHX2EXyFv9m6Q0Dnd_a_t8&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
        "Colorado corruption will be exposed one day.",
        "Discovery of targets pirated music led to her website down the next day! After 9 years?",
        "These greedy people & government grifters steal  money from victims, including life insurance policies",
        "Stop following targets relatives everywhere , associates. Stop circling former residence..",
        "Targets mother passed in 2014. So much malicious activity obituary had to be taken down when hackers put target in obituary",
        "Targets mother died in her bed in Castke Rock, Douglasc County, Colorado",
        "Moms body moved by Douglas County to Jefferson County after cause of death ruled natural causes.",
        "Jefferson County, Coroner  falsely states Mom died in car accident in Lakewood on death certificate .",
        "This information was brought to target by concerned entities who handled body.",
        "Off subject: Don\u2019t try to kill Tucker Carlson for asking valid questions about an apparent murder Sam.",
        "First they discredit you, wear you down mentally , hunt you down , then\u2026.They  have to deal with God.",
        "Sorry! I can\u2019t help being upset about the unfairness of this constant cruel harassment.",
        "Jeffrey Scott Reiner was considered a skilled predator by Bryan Counts MD. He later attacked target."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "All",
          "display_name": "All",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Government",
        "Financial",
        "Media",
        "Targets"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 781,
        "hostname": 339,
        "FileHash-SHA256": 697,
        "FileHash-MD5": 112,
        "domain": 152,
        "FileHash-SHA1": 2
      },
      "indicator_count": 2083,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "187 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6694bb9be1b61bf820500004",
      "name": "YouTube Creator Cyber Attacks | Jays Youtube Bot.exe | YT Botnet",
      "description": "YouTube Creator account attacks. Critical alerts, botnets, YT bots. I cannot adequately describe  attack right now.  Retaliation for targets YT channel Song Culture stems from retaliation shortly after a crime against target. Id be interested to learn more. An ITC Intercepter records traffic passed through Song Culture YouTube channel m redirects to other channels. Not reflected in the 1.5 million followers or the 3.2 million views. They just stopped. Then managing director was notified as all of Song Cultures social media Twitter, Instagram, Pinterest succumbed to Emotet attack. Social engineering did occur. Several parties. Alleged eBay , health insurance representatives, an attorney, alleged PI's music managers contacted by phone. A man from Great Britain also began an SE campaign, The strange part is following, confrontations, dangerous attacks, MIB, and other curious in person encounter, critical injuries, financial devastation has caused target to remain isolated.",
      "modified": "2024-08-14T05:03:59.815000",
      "created": "2024-07-15T06:03:07.423000",
      "tags": [
        "historical ssl",
        "referrer",
        "december",
        "sneaky server",
        "replacement",
        "unauthorized",
        "high level",
        "hackers",
        "highly targeted",
        "cyber attack",
        "emotet",
        "critical",
        "copy",
        "united",
        "command decode",
        "suricata ipv4",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "name server",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "song culture",
        "tsara lynn",
        "culture",
        "chime sa",
        "mediawarning",
        "youtube twitter",
        "secchuabitness",
        "secchuamodel",
        "secchuawow64",
        "secchuaplatform",
        "pragma",
        "form",
        "hope",
        "karma",
        "learn",
        "suspicious",
        "flag",
        "pe resource",
        "synaptics",
        "apeaksoft ios",
        "hiddentear",
        "urls",
        "domains",
        "contacted",
        "markmonitor",
        "win32 exe",
        "parents",
        "type name",
        "msrsaapp",
        "youtube bot",
        "rar jays",
        "mozilla firefox",
        "twitch",
        "samplename",
        "rar youtube",
        "zip youtube",
        "social bots",
        "files",
        "file type",
        "kb file",
        "b file",
        "graph",
        "get https",
        "msie",
        "windows nt",
        "win64",
        "slcc2",
        "media center",
        "request",
        "gmt server",
        "referer https",
        "amd64 accept",
        "accept",
        "code",
        "rwx memory",
        "managed code",
        "calls unmanaged",
        "native",
        "often seen",
        "base64 encrypt",
        "trojan",
        "tsara brashears",
        "red team hacking",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "high",
        "medium",
        "objects",
        "regbinary",
        "module load",
        "t1129",
        "t1060",
        "crash",
        "dock",
        "persistence",
        "execution",
        "okhfjrtblzo",
        "ip check",
        "windows",
        "http host",
        "controlservice",
        "domain",
        "registry",
        "tools",
        "service",
        "worm",
        "malware",
        "win32",
        "bits",
        "read c",
        "intel",
        "ms windows",
        "pe32",
        "search",
        "type read",
        "show",
        "wow64",
        "stop",
        "write",
        "unknown",
        "waiting",
        "push",
        "next",
        "asnone united",
        "aaaa",
        "united kingdom",
        "as20738 host",
        "moved",
        "passive dns",
        "default",
        "delete c",
        "pe32 executable",
        "document file",
        "v2 document",
        "floodfix",
        "floxif",
        "name servers",
        "susp",
        "showing",
        "as55286",
        "scan endpoints",
        "all scoreblue",
        "ransom",
        "amadey",
        "songculture",
        "spreader",
        "tracey richter",
        "roberts",
        "michael roberts",
        "jays",
        "sabey",
        "rexxfield",
        "darklivity"
      ],
      "references": [
        "https://www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Jays Youtube Bot.exe",
        "https://www.virustotal.com/gui/url/b766d444d21c2ad2d777ae4a5ef7b7b7b97f2097805732e9651834e0a76be1f4/details",
        "Jays Youtube Bot.exe > FileHash-SHA256\t00514527e00ee001d042",
        "Matches rule DotNet_Reactor from ruleset DotNet_Reactor by @bartblaze",
        "https://www.virustotal.com/gui/file/00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5/detection",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "http://freedns.afraid.org/subdomain/edit.php?data_id=21091713",
        "Ransom: message.htm.com",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H | IDS Detections: Win32.Floxif.A Checkin 403 Forbidden",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception",
        "Alerts: infostealer_browser creates_exe suspicious_process modifies_certificates stealth_window exe_appdata",
        "Antivirus Detections: Win32:Renos-KY\\ [Trj] ,  Win.Worm.Pykspa-6057105-0 ,  Worm:Win32/Pykspa.C IDS Detections Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host) IP Check Domain (showmyipaddress .com in HTTP Host) IP Check Domain (whatismyipaddress .com in HTTP Host) 403 Forbidden Yara Detections None Alerts network_icmp disables_security antiav_servicestop antisandbox_sleep persistence_autorun modify_uac_prompt antivm_vmware_in_instruction network_http recon_checkip creates_exe create",
        "Win32:Renos-KY\\ [Trj] , Win.Worm.Pykspa , Worm:Win32/Pykspa.C: FileHash-SHA256 0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd trojan",
        "https://otx.alienvault.com/indicator/file/0000294999c616c2dc6722880830752e826f2c11719c926ef3e62f7b0ef1e0bd",
        "Jays Youtube Bot.exe | **http://ur.now.afraid.org/update/bft.exe | https://avsono.com/networkmanager/ | http://fatah.afraid.org/files/books/Embedded.Linux.Programming.pdf",
        "https://otx.alienvault.com/indicator/file/da06b3d7e20045b6edad50f28ce8bac1",
        "FileHash-MD5 da06b3d7e20045b6edad50f28ce8bac1",
        "Antivirus Detections: Win.Virus.Pioneer-9111434-0 ,  Virus:Win32/Floxif.H",
        "IDS Detections: Win32.Floxif.A Checkin 403 Forbidden |   |",
        "Yara Detections: stack_string ,  KERNEL32_DLL_xor_exe_key_197 ,  xor_0xc5_This_program",
        "Alerts: dead_host network_icmp nolookup_communication persistence_autorun installs_bho modifies_certificates",
        "Alerts: modifies_proxy_wpad multiple_useragents injection_resumethread antivm_vmware_in_instruction",
        "Alerts: dumped_buffer network_cnc_http network_http allocates_rwx applcation_raises_exception infostealer_browser",
        "Alerts: stealth_windowcreates_exe suspicious_process exe_appdata",
        "http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg [Tsara Brashears > Song Culture & Samantha Borrego> dorkingbeaty]",
        "https://otx.alienvault.com/indicator/url/http://jofu93hf9fdsl.canadacaregiverconsulting.com/pclianyeapp/1167.jpg",
        "https://otx.alienvault.com/indicator/url/https://my.newzapp.co.uk/t/click/1684555348/129495091/17547390 [Target:SongCulture/Tsara Brashears YT]",
        "Related somehow, pulse modified by?https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
        "http://ur.now.afraid.org/update/bft.exe (Joshua Anderson Address 4120 Douglas Blvd #306-199 City\tGranite Bay Country US ?)",
        "https://otx.alienvault.com/indicator/domain/mywebsitetransfer.com [really?]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor.Xtreme",
          "display_name": "Backdoor.Xtreme",
          "target": null
        },
        {
          "id": "W32.AIDetectMalware.CS",
          "display_name": "W32.AIDetectMalware.CS",
          "target": null
        },
        {
          "id": "Win.Virus.Pioneer-9111434-0",
          "display_name": "Win.Virus.Pioneer-9111434-0",
          "target": null
        },
        {
          "id": "Virus:Win32/Floxif.H",
          "display_name": "Virus:Win32/Floxif.H",
          "target": "/malware/Virus:Win32/Floxif.H"
        },
        {
          "id": "Win32:Renos-KY\\ [Trj]",
          "display_name": "Win32:Renos-KY\\ [Trj]",
          "target": null
        },
        {
          "id": ",  Win.Worm.Pykspa-6057105-0",
          "display_name": ",  Win.Worm.Pykspa-6057105-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Pykspa.C",
          "display_name": "Worm:Win32/Pykspa.C",
          "target": "/malware/Worm:Win32/Pykspa.C"
        },
        {
          "id": "PUP/Hacktool",
          "display_name": "PUP/Hacktool",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 439,
        "FileHash-SHA1": 386,
        "FileHash-SHA256": 2320,
        "URL": 1873,
        "domain": 478,
        "hostname": 839,
        "SSLCertFingerprint": 9,
        "email": 7
      },
      "indicator_count": 6351,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "613 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "665182d791bfc08412ec2c0a",
      "name": "Shadow Pad | Appears as investigation of an infirmed non criminal",
      "description": "ShadowPad is a modular backdoor attack platform that uses an ecosystem of plugins. It stealthily infiltrates target systems and provides attackers with capabilities to gather data execute commands, interacts with the file system and registry, and deploys new modules to extend functionality controlling the compromised systems remotely.\n\nElderly ill target cannot summon help.\n*Forced Updates for Google Chrome\n*Browser bar plug-in. \nRedirects calls to OOS phone message who;e call is still dialing\n*Emergency calls are always answered by 'police communication' at every given time of the day there are no police , ambulance, or any help available. They have already left for the day. \n*Nefarious user has on UTC time.\n Merits further investigation.",
      "modified": "2024-06-24T05:01:31.025000",
      "created": "2024-05-25T06:19:03.896000",
      "tags": [
        "threat roundup",
        "historical ssl",
        "referrer",
        "socs",
        "water dybbuk",
        "a bec",
        "actor using",
        "service",
        "privateloader",
        "blacknet rat",
        "shadowpad",
        "algorithm",
        "v3 serial",
        "number",
        "cus ogoogle",
        "trust",
        "llc cngts",
        "validity",
        "subject public",
        "key info",
        "aaaa",
        "record type",
        "ttl value",
        "cname",
        "server",
        "domain status",
        "google llc",
        "registrar abuse",
        "registrar",
        "admin country",
        "ca creation",
        "dnssec",
        "subdomains",
        "key algorithm",
        "ec oid",
        "key identifier",
        "subject key",
        "identifier",
        "first",
        "name verdict",
        "falcon sandbox",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "sha1",
        "sha256",
        "severity",
        "ascii text",
        "hybrid",
        "local",
        "click",
        "strings",
        "contact",
        "isoscope",
        "malicious",
        "Trojan:PDF/Owaphish.A",
        "android",
        "cisco",
        "show",
        "create c",
        "related pulses",
        "copy",
        "search",
        "peter pdf",
        "modifydate",
        "hacker playbook",
        "practical guide",
        "write",
        "trojan",
        "format",
        "core",
        "united",
        "unknown",
        "passive dns",
        "scan endpoints",
        "all scoreblue",
        "urls",
        "files",
        "none related",
        "miles",
        "all search",
        "otx scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "abuse",
        "pentest",
        "127.0.0.1"
      ],
      "references": [
        "Trojan:PDF/Owaphish.A: https://otx.alienvault.com/indicator/file/b3735b6a91f612fdb28832408fe53ee286d0d618802db2e35f0c9e1f266f8918",
        "https://www.hybrid-analysis.com/sample/1843e6de2e062031e54642a10f4582884a2a9e5d97092f7221c35e9fa9b92cc7/665173a88bb19689e2005033"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "RCE CVE-2023-3519",
          "display_name": "RCE CVE-2023-3519",
          "target": null
        },
        {
          "id": "Trojan:PDF/Owaphish.A",
          "display_name": "Trojan:PDF/Owaphish.A",
          "target": "/malware/Trojan:PDF/Owaphish.A"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1453",
          "name": "Abuse Accessibility Features",
          "display_name": "T1453 - Abuse Accessibility Features"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-MD5": 97,
        "FileHash-SHA1": 93,
        "FileHash-SHA256": 822,
        "domain": 166,
        "URL": 571,
        "hostname": 252,
        "email": 6,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 2012,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "664 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eadaae65b9123721198d08",
      "name": "Nivdort | Affected OTX accounts | Yotta Network (Cloned OTX user)",
      "description": "",
      "modified": "2024-04-06T23:03:19.046000",
      "created": "2024-03-08T09:30:22.295000",
      "tags": [
        "methodpost",
        "threat",
        "iocs",
        "urls http",
        "samples",
        "cnc",
        "phishing",
        "ransom",
        "emotet",
        "fraud services",
        "command _and_control",
        "trojan",
        "scanning host",
        "active threat",
        "malicious",
        "date hash",
        "avast avg",
        "susp",
        "win32",
        "paste",
        "hostnames",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "headers date",
        "connection",
        "first",
        "utc submissions",
        "submitters",
        "computer",
        "company limited",
        "gandi sas",
        "ovh sas",
        "export",
        "summary iocs",
        "graph community",
        "limited",
        "yotta network",
        "gvb gelimed",
        "kb microsoft",
        "indonesia",
        "kyriazhs1975",
        "vj79",
        "bc https",
        "rexxfield",
        "brian sabey",
        "as21342",
        "united",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "msie",
        "chrome",
        "creation date",
        "search",
        "dnssec",
        "entries",
        "body",
        "date",
        "as63949 linode",
        "mtb feb",
        "checkin m1",
        "gmt content",
        "type",
        "encrypt",
        "trojan",
        "artro",
        "moved",
        "pulse pulses",
        "yotta data",
        "yotta",
        "private limited",
        "india",
        "limited yotta",
        "number",
        "as140641",
        "network",
        "facebook",
        "info",
        "cisco umbrella",
        "site",
        "alexa top",
        "site top",
        "million",
        "safe site",
        "million alexa",
        "site safe",
        "cobalt strike",
        "malicious url",
        "blacknet rat",
        "union",
        "vidar",
        "malware",
        "stealer",
        "bank",
        "alexa",
        "deepscan",
        "phishing",
        "team",
        "super",
        "blacknet",
        "babar",
        "detection list",
        "blacklist http",
        "sample",
        "submission",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "kb body",
        "path",
        "as396982 google",
        "bq mar",
        "win32cve mar",
        "exploit",
        "virtool",
        "status",
        "name servers",
        "emails",
        "servers",
        "next",
        "files",
        "as44273 host",
        "germany unknown",
        "expiration date",
        "showing",
        "win32upatre mar",
        "milehighmedia",
        "ids detections",
        "possible fake",
        "av checkin",
        "initial checkin",
        "checkin",
        "utah data",
        "center",
        "june",
        "data center",
        "responsible",
        "nsa utah",
        "march",
        "closeup view",
        "july",
        "view",
        "february",
        "prism",
        "cascade",
        "darpa",
        "twitter",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "nxdomain",
        "whitelisted",
        "domain",
        "as54113",
        "msil",
        "cryp",
        "files show",
        "entries related",
        "domains",
        "as15169 google",
        "gmt cache",
        "sameorigin",
        "trojandropper",
        "asnone united",
        "title error",
        "porkbun",
        "mtb mar",
        "trojanspy",
        "installer",
        "loader",
        "hijacker",
        "targeting",
        "as30456",
        "sec ch",
        "for privacy",
        "ch ua",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "lowfi",
        "dns replication",
        "ip detections",
        "country",
        "contacted",
        "graph",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid file",
        "file size",
        "open threat",
        "learn",
        "html info",
        "exchange meta",
        "tags twitter",
        "alienvault",
        "script tags",
        "iframe tags",
        "google tag",
        "manager anchor",
        "iana",
        "whois lookup",
        "ipv4 address",
        "ripe ncc",
        "afrinic",
        "africa",
        "apnic",
        "asia pacific",
        "arin",
        "lacnic",
        "google",
        "amazon ec2",
        "email",
        "city",
        "server",
        "amazon data",
        "amazon",
        "code",
        "form",
        "po box",
        "tech",
        "show",
        "description ype",
        "collections",
        "partru",
        "execution",
        "fake host"
      ],
      "references": [
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "https://www.milehighmedia.com/legal/2257",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "https://nsa.gov1.info/utah-data-center",
        "https://softwaremill.com/grpc-vs-rest/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Arab Emirates"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort.CW",
          "display_name": "TrojanSpy:Win32/Nivdort.CW",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
        },
        {
          "id": "AndroidOverlayMalware - MOB-S0012",
          "display_name": "AndroidOverlayMalware - MOB-S0012",
          "target": null
        },
        {
          "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "target": null
        },
        {
          "id": "Crypt3.BWVY",
          "display_name": "Crypt3.BWVY",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "Dropper.Generic_r.EC",
          "display_name": "Dropper.Generic_r.EC",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Zbot",
          "display_name": "ALF:Trojan:Win32/Zbot",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1605",
          "name": "Command-Line Interface",
          "display_name": "T1605 - Command-Line Interface"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology",
        "Financial"
      ],
      "TLP": "white",
      "cloned_from": "65ea56ae1992b02a25aa5c51",
      "export_count": 63,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6765,
        "FileHash-MD5": 688,
        "FileHash-SHA1": 422,
        "FileHash-SHA256": 3169,
        "domain": 2171,
        "hostname": 1714,
        "email": 11,
        "CVE": 2,
        "CIDR": 2
      },
      "indicator_count": 14944,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "742 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea56ae1992b02a25aa5c51",
      "name": "TrojanSpy:Win32/Nivdort | Affected OTX accounts | Yotta  Network",
      "description": "Part II -Some users OTX accounts connected to the following | Unexpected revelation | A group of hackers masquerading as attorneys, government officials, advocates, fake nsa, security professional, help desk, etc. I don't know the association with otx.alienvault. Unauthorized logins OTX users. accounts. Deleted and modified pulses, etc. Needs further research for me to fully understand.",
      "modified": "2024-04-06T23:03:19.046000",
      "created": "2024-03-08T00:07:10.521000",
      "tags": [
        "methodpost",
        "threat",
        "iocs",
        "urls http",
        "samples",
        "cnc",
        "phishing",
        "ransom",
        "emotet",
        "fraud services",
        "command _and_control",
        "trojan",
        "scanning host",
        "active threat",
        "malicious",
        "date hash",
        "avast avg",
        "susp",
        "win32",
        "paste",
        "hostnames",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "headers date",
        "connection",
        "first",
        "utc submissions",
        "submitters",
        "computer",
        "company limited",
        "gandi sas",
        "ovh sas",
        "export",
        "summary iocs",
        "graph community",
        "limited",
        "yotta network",
        "gvb gelimed",
        "kb microsoft",
        "indonesia",
        "kyriazhs1975",
        "vj79",
        "bc https",
        "rexxfield",
        "brian sabey",
        "as21342",
        "united",
        "passive dns",
        "unknown",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "msie",
        "chrome",
        "creation date",
        "search",
        "dnssec",
        "entries",
        "body",
        "date",
        "as63949 linode",
        "mtb feb",
        "checkin m1",
        "gmt content",
        "type",
        "encrypt",
        "trojan",
        "artro",
        "moved",
        "pulse pulses",
        "yotta data",
        "yotta",
        "private limited",
        "india",
        "limited yotta",
        "number",
        "as140641",
        "network",
        "facebook",
        "info",
        "cisco umbrella",
        "site",
        "alexa top",
        "site top",
        "million",
        "safe site",
        "million alexa",
        "site safe",
        "cobalt strike",
        "malicious url",
        "blacknet rat",
        "union",
        "vidar",
        "malware",
        "stealer",
        "bank",
        "alexa",
        "deepscan",
        "phishing",
        "team",
        "super",
        "blacknet",
        "babar",
        "detection list",
        "blacklist http",
        "sample",
        "submission",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url http",
        "kb body",
        "path",
        "as396982 google",
        "bq mar",
        "win32cve mar",
        "exploit",
        "virtool",
        "status",
        "name servers",
        "emails",
        "servers",
        "next",
        "files",
        "as44273 host",
        "germany unknown",
        "expiration date",
        "showing",
        "win32upatre mar",
        "milehighmedia",
        "ids detections",
        "possible fake",
        "av checkin",
        "initial checkin",
        "checkin",
        "utah data",
        "center",
        "june",
        "data center",
        "responsible",
        "nsa utah",
        "march",
        "closeup view",
        "july",
        "view",
        "february",
        "prism",
        "cascade",
        "darpa",
        "twitter",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "nxdomain",
        "whitelisted",
        "domain",
        "as54113",
        "msil",
        "cryp",
        "files show",
        "entries related",
        "domains",
        "as15169 google",
        "gmt cache",
        "sameorigin",
        "trojandropper",
        "asnone united",
        "title error",
        "porkbun",
        "mtb mar",
        "trojanspy",
        "installer",
        "loader",
        "hijacker",
        "targeting",
        "as30456",
        "sec ch",
        "for privacy",
        "ch ua",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "lowfi",
        "dns replication",
        "ip detections",
        "country",
        "contacted",
        "graph",
        "ssdeep",
        "file type",
        "html internet",
        "magic html",
        "ascii text",
        "trid file",
        "file size",
        "open threat",
        "learn",
        "html info",
        "exchange meta",
        "tags twitter",
        "alienvault",
        "script tags",
        "iframe tags",
        "google tag",
        "manager anchor",
        "iana",
        "whois lookup",
        "ipv4 address",
        "ripe ncc",
        "afrinic",
        "africa",
        "apnic",
        "asia pacific",
        "arin",
        "lacnic",
        "google",
        "amazon ec2",
        "email",
        "city",
        "server",
        "amazon data",
        "amazon",
        "code",
        "form",
        "po box",
        "tech",
        "show",
        "description ype",
        "collections",
        "partru",
        "execution",
        "fake host"
      ],
      "references": [
        "Part II -Some users OTX accounts connected to the following | Unexpected revelation |",
        "Title Salzburg Airport | Public Operations Display Portal  | http://quantum.emsbk.com/",
        "go.sabey.com | sabey.com | smear.cloud | w1.voyeurweb.com | Never stops...",
        "https://www.milehighmedia.com/legal/2257",
        "http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://schoolcare.dyndns.org/soap/ISCKeyUpdater",
        "http://callenjoy.net/index.php | watchhers.net | emails.redvue.com | nexus.devnautiluscloud.net | http://finishstrong.net/index.php?email=google_romania2000@yahoo.com&method=post&len",
        "http://45.159.189.105/bot/regex | http://46.109.184.5/search.htm | http://acycseiiqsau.org/ | emsbk.innocraft.cloud  | jenkins.devnautiluscloud.net |",
        "hostmaster.hostmaster.hostmaster.cartography.midst.co.uk | message.htm.com | quantum.emsbk.com http://cms.static.hw.famedownload.com/famedigital/m/",
        "http://cms.static.hw.famedownload.com/famedigital/m/1b6j9enlerq8k4g8/header-big8.jpg",
        "CnC IP's: 104.200.21.37 | 106.14.226.91 | 192.187.111.221 | 198.58.118.167 | 208.100.26.245 |  34.174.78.212",
        "Cookies AWSALB h0mLG52+gDNUdBHb468xx6EZCua7FVRvlZWH7URKSKV27WSs637El46CBcw8RmPBxIAT2jqmmByDbnMIsYobUWhWbNadYFsxVQk/gVDcDfdixV/5aQn0VRon9gXO",
        "https://nsa.gov1.info/utah-data-center",
        "https://softwaremill.com/grpc-vs-rest/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "United Arab Emirates"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy:Win32/Nivdort.CW",
          "display_name": "TrojanSpy:Win32/Nivdort.CW",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
        },
        {
          "id": "AndroidOverlayMalware - MOB-S0012",
          "display_name": "AndroidOverlayMalware - MOB-S0012",
          "target": null
        },
        {
          "id": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "display_name": "#Lowfi:LUA:AutoItV3CraftedOverlay",
          "target": null
        },
        {
          "id": "Crypt3.BWVY",
          "display_name": "Crypt3.BWVY",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "BlackNET",
          "display_name": "BlackNET",
          "target": null
        },
        {
          "id": "Babar",
          "display_name": "Babar",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "#VirTool:Win32/Obfuscator.ADB",
          "display_name": "#VirTool:Win32/Obfuscator.ADB",
          "target": "/malware/#VirTool:Win32/Obfuscator.ADB"
        },
        {
          "id": "Dropper.Generic_r.EC",
          "display_name": "Dropper.Generic_r.EC",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "ALF:Trojan:Win32/Zbot",
          "display_name": "ALF:Trojan:Win32/Zbot",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1605",
          "name": "Command-Line Interface",
          "display_name": "T1605 - Command-Line Interface"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1583.004",
          "name": "Server",
          "display_name": "T1583.004 - Server"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1091",
          "name": "Replication Through Removable Media",
          "display_name": "T1091 - Replication Through Removable Media"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology",
        "Financial"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 59,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6765,
        "FileHash-MD5": 688,
        "FileHash-SHA1": 422,
        "FileHash-SHA256": 3169,
        "domain": 2171,
        "hostname": 1714,
        "email": 11,
        "CVE": 2,
        "CIDR": 2
      },
      "indicator_count": 14944,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 231,
      "modified_text": "742 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://m.youtube.com.mx",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://m.youtube.com.mx",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622287.1677797
}