{
  "type": "URL",
  "indicator": "https://mail.mckit.co.il",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://mail.mckit.co.il",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3175469019,
      "indicator": "https://mail.mckit.co.il",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 24,
      "pulses": [
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a458c9934c2c2387556a",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:42:00.798000",
          "created": "2023-12-06T16:42:00.798000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a45205d13649df0844ba",
          "name": "iOS Hacktool Actively exploited",
          "description": "",
          "modified": "2023-12-06T16:41:54.157000",
          "created": "2023-12-06T16:41:54.157000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a44bb1c37c78fb86e09d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:41:47.803000",
          "created": "2023-12-06T16:41:47.803000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a441d4e3eae9a6de91dd",
          "name": "Apple iOS - COBALT STRIKE",
          "description": "",
          "modified": "2023-12-06T16:41:37.067000",
          "created": "2023-12-06T16:41:37.067000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a43affc51769be1188f9",
          "name": "Apple exploit targets private citizen. Actively exploited.",
          "description": "",
          "modified": "2023-12-06T16:41:30.939000",
          "created": "2023-12-06T16:41:30.939000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a434c72e0d41666e0b43",
          "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
          "description": "",
          "modified": "2023-12-06T16:41:24.547000",
          "created": "2023-12-06T16:41:24.547000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a42c670fdf66b4af46df",
          "name": "Crimson Apple",
          "description": "",
          "modified": "2023-12-06T16:41:16.304000",
          "created": "2023-12-06T16:41:16.304000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4250011524abcdf1be0",
          "name": "Apple Tracking \u2022 Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:09.398000",
          "created": "2023-12-06T16:41:09.398000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a41e852f6b1b04648d44",
          "name": "Apple iOS Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:02.718000",
          "created": "2023-12-06T16:41:02.718000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4161da64500aa609121",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:54.425000",
          "created": "2023-12-06T16:40:54.425000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a40e62ca90307d3ed7a3",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:46.173000",
          "created": "2023-12-06T16:40:46.173000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "650a0b7c9a6b3c5d0a2a3960",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "Link: apple.instagram.com \nQuasar is a lightweight, publicly available open-source Remote Access Trojan (RAT). Used by a variety of attackers.  Typically packed to make analysis of the source demanding.\nAccount appears to have been breached, operational in dark web. Dead host.",
          "modified": "2023-10-19T14:04:37.381000",
          "created": "2023-09-19T20:58:36.137000",
          "tags": [
            "contacted",
            "threat roundup",
            "execution",
            "ssl certificate",
            "dark web",
            "crypto threat",
            "resolutions",
            "referrer",
            "stealer",
            "quasar",
            "asyncrat",
            "error",
            "social engineering",
            "iPhone phishing",
            "Apple phishing",
            "email phishing",
            "emotet",
            "remote",
            "attacks"
          ],
          "references": [
            "Alienvault OTX",
            "Data Analysis",
            "Online Research",
            "WebTools"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "India"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/AsyncRAT",
              "display_name": "Backdoor:MSIL/AsyncRAT",
              "target": "/malware/Backdoor:MSIL/AsyncRAT"
            },
            {
              "id": "Backdoor:MSIL/QuasarRat",
              "display_name": "Backdoor:MSIL/QuasarRat",
              "target": "/malware/Backdoor:MSIL/QuasarRat"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [
            "Media",
            "Social Media",
            "Technology",
            "Hacking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 5791,
            "URL": 11513,
            "domain": 2317,
            "hostname": 3255,
            "CVE": 3
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "913 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffd9a1a50c6f76a8f7de02",
          "name": "Major Apple Exploit",
          "description": "Exploit/Shellcode Apple \u2022 Remote, Access \u2022 Command and Control \u2022 24/7 Monitoring\nCrimson Apple",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:23:13.409000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdce908b6c507cf08faf7",
          "name": "     ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:37:13.129000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdba12fec032a4684721c",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc6c08b6c507cf08faf6",
          "name": "   iOS Hacktool Actively exploited ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:35:08.802000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc42fa7e80fbb768244d",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc42fa7e80fbb768244d",
          "name": "    ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:34:26.716000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc2d3c898b5a98fcfc64",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc2d3c898b5a98fcfc64",
          "name": "Apple iOS - COBALT STRIKE ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:34:05.784000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdc093e1a5bc65f6b28b3",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdc093e1a5bc65f6b28b3",
          "name": "Apple exploit targets private citizen. Actively exploited.",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:33:29.774000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdba12fec032a4684721c",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdba12fec032a4684721c",
          "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:31:45.373000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdaed5dc332a3b00549f1",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdaed5dc332a3b00549f1",
          "name": "Crimson Apple ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:28:45.920000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdad70ebc73b9922363f8",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdad70ebc73b9922363f8",
          "name": "Apple Tracking \u2022 Remote Access ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:28:23.256000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffdaa6d6b8dec6c841dddf",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffdaa6d6b8dec6c841dddf",
          "name": "Apple iOS Remote Access ",
          "description": "",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:27:34.382000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64ffd9a1a50c6f76a8f7de02",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64ffd9a641b3478bfd23fe30",
          "name": "Major Apple Exploit",
          "description": "Exploit/Shellcode Apple \u2022 Remote, Access \u2022 Command and Control \u2022 24/7 Monitoring\nCrimson Apple",
          "modified": "2023-10-12T01:03:34.287000",
          "created": "2023-09-12T03:23:18.625000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "historical ssl",
            "september",
            "whois whois",
            "march",
            "resolutions",
            "august",
            "subdomains",
            "april",
            "cobalt strike",
            "hacktool",
            "unlocker",
            "december",
            "attack",
            "malware",
            "open",
            "name verdict",
            "yyyy",
            "d mmmm",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "misc attack",
            "llll",
            "hybrid",
            "pattern match",
            "windir",
            "mitre att",
            "local",
            "file",
            "indicator",
            "script",
            "facebook",
            "mutex",
            "crimson apple",
            "hashtablemutex",
            "drops",
            "antivirus",
            "dead",
            "ascii text",
            "windows nt",
            "appdata",
            "jpeg image",
            "png image",
            "jfif standard",
            "unicode text",
            "localappdata",
            "united",
            "flag",
            "date",
            "markmonitor",
            "name server",
            "server",
            "sample",
            "session details",
            "no relevant",
            "hybrid analysis",
            "click",
            "size",
            "copy md5",
            "sha1",
            "copy sha1",
            "sha256",
            "copy sha256",
            "runtime process",
            "type data",
            "av scan",
            "result",
            "openurl c",
            "prefetch2",
            "suricata alerts"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1215,
            "URL": 5266,
            "domain": 1247,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "email": 6
          },
          "indicator_count": 10271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "921 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "WebTools",
        "Alienvault OTX",
        "Data Analysis",
        "Online Research"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Backdoor:msil/asyncrat",
            "Backdoor:msil/quasarrat"
          ],
          "industries": [
            "Technology",
            "Hacking",
            "Social media",
            "Media"
          ],
          "unique_indicators": 33207
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/mckit.co.il",
    "whois": "http://whois.domaintools.com/mckit.co.il",
    "domain": "mckit.co.il",
    "hostname": "mail.mckit.co.il"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 24,
  "pulses": [
    {
      "id": "6570a581b1024ea61979da96",
      "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
      "description": "",
      "modified": "2023-12-06T16:46:57.782000",
      "created": "2023-12-06T16:46:57.782000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 5791,
        "hostname": 3255,
        "domain": 2317,
        "FileHash-MD5": 44,
        "FileHash-SHA1": 34,
        "URL": 11513
      },
      "indicator_count": 22957,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a458c9934c2c2387556a",
      "name": "",
      "description": "",
      "modified": "2023-12-06T16:42:00.798000",
      "created": "2023-12-06T16:42:00.798000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a45205d13649df0844ba",
      "name": "iOS Hacktool Actively exploited",
      "description": "",
      "modified": "2023-12-06T16:41:54.157000",
      "created": "2023-12-06T16:41:54.157000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a44bb1c37c78fb86e09d",
      "name": "Undefined Name",
      "description": "",
      "modified": "2023-12-06T16:41:47.803000",
      "created": "2023-12-06T16:41:47.803000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a441d4e3eae9a6de91dd",
      "name": "Apple iOS - COBALT STRIKE",
      "description": "",
      "modified": "2023-12-06T16:41:37.067000",
      "created": "2023-12-06T16:41:37.067000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 112,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a43affc51769be1188f9",
      "name": "Apple exploit targets private citizen. Actively exploited.",
      "description": "",
      "modified": "2023-12-06T16:41:30.939000",
      "created": "2023-12-06T16:41:30.939000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a434c72e0d41666e0b43",
      "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
      "description": "",
      "modified": "2023-12-06T16:41:24.547000",
      "created": "2023-12-06T16:41:24.547000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a42c670fdf66b4af46df",
      "name": "Crimson Apple",
      "description": "",
      "modified": "2023-12-06T16:41:16.304000",
      "created": "2023-12-06T16:41:16.304000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4250011524abcdf1be0",
      "name": "Apple Tracking \u2022 Remote Access",
      "description": "",
      "modified": "2023-12-06T16:41:09.398000",
      "created": "2023-12-06T16:41:09.398000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a41e852f6b1b04648d44",
      "name": "Apple iOS Remote Access",
      "description": "",
      "modified": "2023-12-06T16:41:02.718000",
      "created": "2023-12-06T16:41:02.718000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 2468,
        "CVE": 2,
        "domain": 1247,
        "hostname": 1215,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 36,
        "URL": 5265,
        "email": 6
      },
      "indicator_count": 10270,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://mail.mckit.co.il",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://mail.mckit.co.il",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776647587.3504484
}