{
  "type": "URL",
  "indicator": "https://mail.comune.wiza.co",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://mail.comune.wiza.co",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3809840187,
      "indicator": "https://mail.comune.wiza.co",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "674795484411bb394274342d",
          "name": "uk.escortsaffair (enriched)",
          "description": "",
          "modified": "2024-12-27T21:04:00.158000",
          "created": "2024-11-27T21:55:19.831000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 103,
            "hostname": 277,
            "URL": 907,
            "FileHash-SHA256": 21
          },
          "indicator_count": 1308,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 177,
          "modified_text": "478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65bca8fcbe62297d71b47c33",
          "name": "Ragnar Locker",
          "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
          "modified": "2024-03-03T08:00:03.432000",
          "created": "2024-02-02T08:34:04.425000",
          "tags": [
            "referrer",
            "contacted",
            "whois record",
            "ssl certificate",
            "whois whois",
            "contacted urls",
            "execution",
            "historical ssl",
            "red team",
            "gang breached",
            "agent tesla",
            "redline stealer",
            "metro",
            "android",
            "urls url",
            "files",
            "kgs0",
            "kls0",
            "orgtechhandle",
            "orgtechref",
            "orgabusehandle",
            "orgdnshandle",
            "orgdnsref",
            "whois lookup",
            "netrange",
            "nethandle",
            "net108",
            "net1080000",
            "communicating",
            "urls http",
            "ransomware gang",
            "breached",
            "team",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "psiusa",
            "domain robot",
            "porkbun llc",
            "keysystems gmbh",
            "csc corporate",
            "domains",
            "domain name",
            "network pty",
            "tucows",
            "com laude",
            "dynadot inc"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8354,
            "FileHash-MD5": 104,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 2711,
            "CIDR": 5,
            "CVE": 6,
            "domain": 1489,
            "hostname": 3058,
            "email": 5
          },
          "indicator_count": 15813,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658303b7e2b4417d9e24a7cc",
          "name": "Reddit Honeypot  | Cyber Defense Firm Attack",
          "description": "",
          "modified": "2024-01-19T12:02:13.495000",
          "created": "2023-12-20T15:09:43.783000",
          "tags": [
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "sha1",
            "sha256",
            "runtime process",
            "date",
            "unknown",
            "error",
            "path",
            "class",
            "generator",
            "critical",
            "meta",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "accept",
            "url http",
            "filehashmd5",
            "url https",
            "search otx",
            "octoseek report",
            "spam author",
            "reddit",
            "tulach c2",
            "created",
            "minutes ago",
            "added active",
            "related pulses",
            "am",
            "no expiration",
            "indicator role",
            "pulses url",
            "showing",
            "entries",
            "dded active",
            "copyright",
            "reserved",
            "cve cve20170199",
            "win32 exe",
            "android",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "manager",
            "files",
            "detections type",
            "name",
            "lord krishna",
            "right",
            "tjprojmain",
            "windows",
            "secure",
            "headers nel",
            "ssl certificate",
            "whois whois",
            "historical ssl",
            "referrer",
            "logistics",
            "cyber defense",
            "firm collection",
            "ioc honeypot",
            "list for",
            "malware",
            "open",
            "attack",
            "contacted",
            "dropped",
            "bundled",
            "problems",
            "whois record",
            "domains",
            "execution",
            "agent tesla",
            "azorult",
            "project",
            "startpage",
            "vhash",
            "authentihash",
            "imphash",
            "rich pe",
            "ssdeep",
            "file type",
            "magic pe32",
            "installer",
            "compiler",
            "nsis",
            "serial number",
            "g4 code",
            "signing rsa4096",
            "sha384",
            "root g4",
            "valid from",
            "algorithm",
            "thumbprint",
            "fast corporate",
            "from",
            "pe resource",
            "collection",
            "vt graph",
            "paulsmith",
            "apple tv",
            "apple music",
            "$RTD4NQU.exe",
            "no data",
            "tag count",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "iocs",
            "summary",
            "nisis",
            "executable",
            "ms windows",
            "trid win64",
            "generic",
            "sections",
            "sha256 file",
            "type type",
            "chi2",
            "dkey english",
            "xml rtmanifest",
            "english us",
            "overlay",
            "learn",
            "botnet",
            "honeypot",
            "ejkaej saBey k7-^Oa"
          ],
          "references": [
            "https://www.reddit.com/user/",
            "https://www.virustotal.com/gui/url/6a627ce5fd6be7b3c0b5637e6b1facfa92c279d25ff9b1f50fe131c91591d804/summary",
            "Gowi Live Bot.exe",
            "https://www.virustotal.com/gui/file/2ab9e32cd78f2b538c36f145b790f78f1262bcfcf1a5d6d019e7a2a151a24424/summary",
            "https://www.hybrid-analysis.com/sample/d4f0fd95f42482e96d982df3d538f67ee9c8756834486dd2cf33e1679c90af50/65812fd9a34bc52aac0b910f",
            "nr-data.net [New Relic Tracking | Apple Private Data Collection]",
            "[w and w.o https] applemusic-spotlight.myunidays.com [Multilingual Portable.exe Apple music compromise]",
            "tv.apple.com [Apple Backdoor| Attack | Hacking]",
            "name-playatoms-pa.googleapis.com [ nr-data Apple tv tracking]",
            "browser.events.data.msn.com | events-sandbox.data.msn.com",
            "https://tulach.cc/ [phishing attacks]",
            "tulach.cc [AM | phishing]",
            "$RTD4NQU.exe - Sigma Rule: Audit Policy Tampering Via Auditpolicy",
            "$RTD4NQU.exe - Yara rule: INDICATOR TOOL UAC NSISUAC",
            "3.163.189.120    [Tracking]",
            "86.140.232.148  [scanning_host]",
            "https://seedbeej.pk/tin/index.php?QBOT.zip. [ phishing plus]",
            "http://iyfsearch.com/&ap=67&be=203&fe=198&dc=198&perf=      [phishing]",
            "checkip.dyndns.org    [command_and_control]",
            "104.86.182.8          [command_and_control]",
            "103.224.182.253    [command_and_control]",
            "103.224.182.246    [command_and_control]",
            "www.supernetforme.com    [command_and_control]",
            "rp.downloadastrocdn.com   [command_and_control]",
            "ddos.dnsnb8.net   [command_and_control]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "AM",
              "display_name": "AM",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "adware.pcappstore/veryfast",
              "display_name": "adware.pcappstore/veryfast",
              "target": null
            },
            {
              "id": "NSIS",
              "display_name": "NSIS",
              "target": null
            },
            {
              "id": "Static AI - Malicious PE",
              "display_name": "Static AI - Malicious PE",
              "target": null
            },
            {
              "id": "HoneyPot",
              "display_name": "HoneyPot",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 392,
            "FileHash-SHA1": 374,
            "FileHash-SHA256": 5560,
            "URL": 7433,
            "domain": 1461,
            "hostname": 2463,
            "CVE": 3,
            "email": 1
          },
          "indicator_count": 17687,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "821 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "tv.apple.com [Apple Backdoor| Attack | Hacking]",
        "$RTD4NQU.exe - Sigma Rule: Audit Policy Tampering Via Auditpolicy",
        "https://seedbeej.pk/tin/index.php?QBOT.zip. [ phishing plus]",
        "103.224.182.253    [command_and_control]",
        "name-playatoms-pa.googleapis.com [ nr-data Apple tv tracking]",
        "rp.downloadastrocdn.com   [command_and_control]",
        "104.86.182.8          [command_and_control]",
        "www.supernetforme.com    [command_and_control]",
        "103.224.182.246    [command_and_control]",
        "$RTD4NQU.exe - Yara rule: INDICATOR TOOL UAC NSISUAC",
        "Gowi Live Bot.exe",
        "https://www.virustotal.com/gui/url/6a627ce5fd6be7b3c0b5637e6b1facfa92c279d25ff9b1f50fe131c91591d804/summary",
        "checkip.dyndns.org    [command_and_control]",
        "[w and w.o https] applemusic-spotlight.myunidays.com [Multilingual Portable.exe Apple music compromise]",
        "3.163.189.120    [Tracking]",
        "https://www.virustotal.com/gui/file/2ab9e32cd78f2b538c36f145b790f78f1262bcfcf1a5d6d019e7a2a151a24424/summary",
        "86.140.232.148  [scanning_host]",
        "nr-data.net [New Relic Tracking | Apple Private Data Collection]",
        "https://www.reddit.com/user/",
        "http://iyfsearch.com/&ap=67&be=203&fe=198&dc=198&perf=      [phishing]",
        "tulach.cc [AM | phishing]",
        "https://tulach.cc/ [phishing attacks]",
        "ddos.dnsnb8.net   [command_and_control]",
        "browser.events.data.msn.com | events-sandbox.data.msn.com",
        "https://www.hybrid-analysis.com/sample/d4f0fd95f42482e96d982df3d538f67ee9c8756834486dd2cf33e1679c90af50/65812fd9a34bc52aac0b910f"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Tulach malware",
            "Am",
            "Honeypot",
            "Agent tesla",
            "Static ai - malicious pe",
            "Nsis",
            "Malware",
            "Adware.pcappstore/veryfast"
          ],
          "industries": [],
          "unique_indicators": 34875
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/wiza.co",
    "whois": "http://whois.domaintools.com/wiza.co",
    "domain": "wiza.co",
    "hostname": "mail.comune.wiza.co"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "674795484411bb394274342d",
      "name": "uk.escortsaffair (enriched)",
      "description": "",
      "modified": "2024-12-27T21:04:00.158000",
      "created": "2024-11-27T21:55:19.831000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 103,
        "hostname": 277,
        "URL": 907,
        "FileHash-SHA256": 21
      },
      "indicator_count": 1308,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 177,
      "modified_text": "478 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65bca8fcbe62297d71b47c33",
      "name": "Ragnar Locker",
      "description": "\u2022 FBI Flash CU-000163-MW: RagnarLocker Ransomware Indicators of Compromise\n\u2022 Found in https://www.Esurance.com\n  108.26.193.165\nAS 701 (UUNET)\n\u2022108.26.193.165 Postal Code: 02465 Reverse Domain Lookup: pool-108-26-193-165.bstnma.fios.verizon.net \n| Ragnar Locker is ransomware for Windows and Linux that exfiltrates information from a compromised machine, encrypts files using the Salsa20 encryption algorithm, and demands that victims pay a ransom to recover their data. The Ragnar Locker group is known to employ a double extortion tactic.",
      "modified": "2024-03-03T08:00:03.432000",
      "created": "2024-02-02T08:34:04.425000",
      "tags": [
        "referrer",
        "contacted",
        "whois record",
        "ssl certificate",
        "whois whois",
        "contacted urls",
        "execution",
        "historical ssl",
        "red team",
        "gang breached",
        "agent tesla",
        "redline stealer",
        "metro",
        "android",
        "urls url",
        "files",
        "kgs0",
        "kls0",
        "orgtechhandle",
        "orgtechref",
        "orgabusehandle",
        "orgdnshandle",
        "orgdnsref",
        "whois lookup",
        "netrange",
        "nethandle",
        "net108",
        "net1080000",
        "communicating",
        "urls http",
        "ransomware gang",
        "breached",
        "team",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "psiusa",
        "domain robot",
        "porkbun llc",
        "keysystems gmbh",
        "csc corporate",
        "domains",
        "domain name",
        "network pty",
        "tucows",
        "com laude",
        "dynadot inc"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8354,
        "FileHash-MD5": 104,
        "FileHash-SHA1": 81,
        "FileHash-SHA256": 2711,
        "CIDR": 5,
        "CVE": 6,
        "domain": 1489,
        "hostname": 3058,
        "email": 5
      },
      "indicator_count": 15813,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "658303b7e2b4417d9e24a7cc",
      "name": "Reddit Honeypot  | Cyber Defense Firm Attack",
      "description": "",
      "modified": "2024-01-19T12:02:13.495000",
      "created": "2023-12-20T15:09:43.783000",
      "tags": [
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "sha1",
        "sha256",
        "runtime process",
        "date",
        "unknown",
        "error",
        "path",
        "class",
        "generator",
        "critical",
        "meta",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "accept",
        "url http",
        "filehashmd5",
        "url https",
        "search otx",
        "octoseek report",
        "spam author",
        "reddit",
        "tulach c2",
        "created",
        "minutes ago",
        "added active",
        "related pulses",
        "am",
        "no expiration",
        "indicator role",
        "pulses url",
        "showing",
        "entries",
        "dded active",
        "copyright",
        "reserved",
        "cve cve20170199",
        "win32 exe",
        "android",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "headers",
        "manager",
        "files",
        "detections type",
        "name",
        "lord krishna",
        "right",
        "tjprojmain",
        "windows",
        "secure",
        "headers nel",
        "ssl certificate",
        "whois whois",
        "historical ssl",
        "referrer",
        "logistics",
        "cyber defense",
        "firm collection",
        "ioc honeypot",
        "list for",
        "malware",
        "open",
        "attack",
        "contacted",
        "dropped",
        "bundled",
        "problems",
        "whois record",
        "domains",
        "execution",
        "agent tesla",
        "azorult",
        "project",
        "startpage",
        "vhash",
        "authentihash",
        "imphash",
        "rich pe",
        "ssdeep",
        "file type",
        "magic pe32",
        "installer",
        "compiler",
        "nsis",
        "serial number",
        "g4 code",
        "signing rsa4096",
        "sha384",
        "root g4",
        "valid from",
        "algorithm",
        "thumbprint",
        "fast corporate",
        "from",
        "pe resource",
        "collection",
        "vt graph",
        "paulsmith",
        "apple tv",
        "apple music",
        "$RTD4NQU.exe",
        "no data",
        "tag count",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "search",
        "iocs",
        "summary",
        "nisis",
        "executable",
        "ms windows",
        "trid win64",
        "generic",
        "sections",
        "sha256 file",
        "type type",
        "chi2",
        "dkey english",
        "xml rtmanifest",
        "english us",
        "overlay",
        "learn",
        "botnet",
        "honeypot",
        "ejkaej saBey k7-^Oa"
      ],
      "references": [
        "https://www.reddit.com/user/",
        "https://www.virustotal.com/gui/url/6a627ce5fd6be7b3c0b5637e6b1facfa92c279d25ff9b1f50fe131c91591d804/summary",
        "Gowi Live Bot.exe",
        "https://www.virustotal.com/gui/file/2ab9e32cd78f2b538c36f145b790f78f1262bcfcf1a5d6d019e7a2a151a24424/summary",
        "https://www.hybrid-analysis.com/sample/d4f0fd95f42482e96d982df3d538f67ee9c8756834486dd2cf33e1679c90af50/65812fd9a34bc52aac0b910f",
        "nr-data.net [New Relic Tracking | Apple Private Data Collection]",
        "[w and w.o https] applemusic-spotlight.myunidays.com [Multilingual Portable.exe Apple music compromise]",
        "tv.apple.com [Apple Backdoor| Attack | Hacking]",
        "name-playatoms-pa.googleapis.com [ nr-data Apple tv tracking]",
        "browser.events.data.msn.com | events-sandbox.data.msn.com",
        "https://tulach.cc/ [phishing attacks]",
        "tulach.cc [AM | phishing]",
        "$RTD4NQU.exe - Sigma Rule: Audit Policy Tampering Via Auditpolicy",
        "$RTD4NQU.exe - Yara rule: INDICATOR TOOL UAC NSISUAC",
        "3.163.189.120    [Tracking]",
        "86.140.232.148  [scanning_host]",
        "https://seedbeej.pk/tin/index.php?QBOT.zip. [ phishing plus]",
        "http://iyfsearch.com/&ap=67&be=203&fe=198&dc=198&perf=      [phishing]",
        "checkip.dyndns.org    [command_and_control]",
        "104.86.182.8          [command_and_control]",
        "103.224.182.253    [command_and_control]",
        "103.224.182.246    [command_and_control]",
        "www.supernetforme.com    [command_and_control]",
        "rp.downloadastrocdn.com   [command_and_control]",
        "ddos.dnsnb8.net   [command_and_control]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "AM",
          "display_name": "AM",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Tulach Malware",
          "display_name": "Tulach Malware",
          "target": null
        },
        {
          "id": "adware.pcappstore/veryfast",
          "display_name": "adware.pcappstore/veryfast",
          "target": null
        },
        {
          "id": "NSIS",
          "display_name": "NSIS",
          "target": null
        },
        {
          "id": "Static AI - Malicious PE",
          "display_name": "Static AI - Malicious PE",
          "target": null
        },
        {
          "id": "HoneyPot",
          "display_name": "HoneyPot",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 392,
        "FileHash-SHA1": 374,
        "FileHash-SHA256": 5560,
        "URL": 7433,
        "domain": 1461,
        "hostname": 2463,
        "CVE": 3,
        "email": 1
      },
      "indicator_count": 17687,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "821 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://mail.comune.wiza.co",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://mail.comune.wiza.co",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776661210.7967508
}