{
  "type": "URL",
  "indicator": "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "akamai",
        "message": "Akamai rank: #624",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain bootstrapcdn.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain bootstrapcdn.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 1185762478,
      "indicator": "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 12,
      "pulses": [
        {
          "id": "698e906da16336f8e87c3b90",
          "name": "CoinHive Clone ",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-02-13T02:46:05.544000",
          "tags": [
            "united",
            "td tr",
            "a domains",
            "history group",
            "state",
            "b td",
            "present sep",
            "find",
            "alabama",
            "iowa",
            "apache",
            "content type",
            "passive dns",
            "meta http",
            "content",
            "gmt server",
            "pragma",
            "title",
            "linksys eseries",
            "device rce",
            "inbound",
            "et exploit",
            "attempt",
            "et webserver",
            "suspicious user",
            "user agent",
            "et worm",
            "policy python",
            "python",
            "agent",
            "generic",
            "malware",
            "nids",
            "dst_ip",
            "\"sid\": 2017515,",
            "2020/08/23",
            "dst_port\": 8080",
            "suricata",
            "network_icmp",
            "tcp_syn_scan",
            "unix",
            "mirai",
            "infection",
            "port 8080",
            "aitm",
            "mitm",
            "xfinity",
            "lumen backbone",
            "xfinity cf",
            "et info",
            "useragent",
            "webserver",
            "android",
            "linux",
            "statistically stripped",
            "local",
            "Jefferson County",
            "Colorado",
            "State",
            "is__elf",
            "is__war",
            "cyber warfare",
            "marking",
            "targeting",
            "stalking",
            "impersonating",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "mitre att",
            "ck matrix",
            "february",
            "hybrid",
            "general",
            "path",
            "encrypt",
            "click",
            "strings",
            "attack",
            "ssl certificate",
            "ascii text",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "medium",
            "high",
            "eb d8",
            "f0 ff",
            "ff bb",
            "host",
            "unknown",
            "explorer",
            "virtool",
            "write",
            "next",
            "Douglas County",
            "Michael Roberts",
            "Brian Sabey",
            "Chris\u2019Buzz\u2019 Ahmann",
            "Mirai BotMaster",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "date march",
            "am size",
            "imphash",
            "otx logo",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "moved",
            "urls",
            "expiration date",
            "all hostname",
            "files",
            "media",
            "present feb",
            "present jan",
            "present dec",
            "present nov",
            "ip address",
            "present",
            "codex",
            "sf.net",
            "next associated",
            "ipv4 add",
            "location united",
            "america flag",
            "spawns",
            "found",
            "t1480 execution",
            "pattern match",
            "present aug",
            "search",
            "name servers",
            "showing",
            "record value",
            "meta",
            "accept",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "denver",
            "yandex",
            "post",
            "entries",
            "post http",
            "show",
            "post liquor",
            "execution",
            "port",
            "destination",
            "icmp traffic",
            "dns query",
            "include",
            "top source"
          ],
          "references": [
            "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
            "genealogytrails.com",
            "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
            "Has been present throughout a specific campaign",
            "Mirai",
            "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
            "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
            "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
            "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
            "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
            "ET INFO User-Agent (python-requests) Inbound to Webserver",
            "Suspicious User Agent | ETPRO POLICY Python Requests",
            "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
            "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
            "TCP SYN packets were observed",
            "ET WORM TheMoon.linksys.router",
            "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
            "\"ET WEB_SERVER WebShell Generic - wget http - POST",
            "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
            "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
            "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
            "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
            "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
            "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
            "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
            "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
            "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
            "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
            "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
            "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
            "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
            "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
            "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
            "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
            "IPs Contacted:  149.56.240.31  172.66.136.209",
            "Domains Contacted: c.statcounter.com sstatic1.histats.com",
            "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
            "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
            "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
            "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
            "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
            "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
            "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
            "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-7646352-0",
              "display_name": "Unix.Trojan.Mirai-7646352-0",
              "target": null
            },
            {
              "id": "SpyFu",
              "display_name": "SpyFu",
              "target": null
            },
            {
              "id": "Win.Trojan.VB-83922",
              "display_name": "Win.Trojan.VB-83922",
              "target": null
            },
            {
              "id": "virtool:Win32/VBInject.gen!JB",
              "display_name": "virtool:Win32/VBInject.gen!JB",
              "target": "/malware/virtool:Win32/VBInject.gen!JB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "698966742c9fd9691396bb3a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5836,
            "domain": 857,
            "FileHash-MD5": 185,
            "FileHash-SHA1": 147,
            "hostname": 1842,
            "email": 7,
            "FileHash-SHA256": 947,
            "CVE": 43,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 9872,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "698966742c9fd9691396bb3a",
          "name": "CoinHive In-Browser Miner | ET EXPLOIT Linksys E-Series Device RCE Attempt via \u2018AI chat\u2019  Xfinity Commercial Fleet vehicle parked /AITM",
          "description": "Merits further research. Work no is consistent with a man advocate named Michael\nRoberts of Rexxfield and Miles2/ Mile2 / seen frequently in attacks against females | targeted individual apparently was using an AI browser search when a keyword triggered glitches.\nSearch of a URL\ntarget has never heard of or seen found in device search results. Targets device injected, Mirai botnet found, Other suspicious findings. TBConrinued..:.\n[OTX. Auto populated Significantly more details have been revealed about the GoDaddy.com domain, which has been listed as an unregistered domain by the Internet Service Authority (icann). and its users are not allowed to use it.] #man_jn_tve_midxle #drive_ by_compromise #injection.",
          "modified": "2026-03-11T04:02:50.189000",
          "created": "2026-02-09T04:45:40.250000",
          "tags": [
            "united",
            "td tr",
            "a domains",
            "history group",
            "state",
            "b td",
            "present sep",
            "find",
            "alabama",
            "iowa",
            "apache",
            "content type",
            "passive dns",
            "meta http",
            "content",
            "gmt server",
            "pragma",
            "title",
            "linksys eseries",
            "device rce",
            "inbound",
            "et exploit",
            "attempt",
            "et webserver",
            "suspicious user",
            "user agent",
            "et worm",
            "policy python",
            "python",
            "agent",
            "generic",
            "malware",
            "nids",
            "dst_ip",
            "\"sid\": 2017515,",
            "2020/08/23",
            "dst_port\": 8080",
            "suricata",
            "network_icmp",
            "tcp_syn_scan",
            "unix",
            "mirai",
            "infection",
            "port 8080",
            "aitm",
            "mitm",
            "xfinity",
            "lumen backbone",
            "xfinity cf",
            "et info",
            "useragent",
            "webserver",
            "android",
            "linux",
            "statistically stripped",
            "local",
            "Jefferson County",
            "Colorado",
            "State",
            "is__elf",
            "is__war",
            "cyber warfare",
            "marking",
            "targeting",
            "stalking",
            "impersonating",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "initial access",
            "defense evasion",
            "mitre att",
            "ck matrix",
            "february",
            "hybrid",
            "general",
            "path",
            "encrypt",
            "click",
            "strings",
            "attack",
            "ssl certificate",
            "ascii text",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "medium",
            "high",
            "eb d8",
            "f0 ff",
            "ff bb",
            "host",
            "unknown",
            "explorer",
            "virtool",
            "write",
            "next",
            "Douglas County",
            "Michael Roberts",
            "Brian Sabey",
            "Chris\u2019Buzz\u2019 Ahmann",
            "Mirai BotMaster",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "date march",
            "am size",
            "imphash",
            "otx logo",
            "all filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "moved",
            "urls",
            "expiration date",
            "all hostname",
            "files",
            "media",
            "present feb",
            "present jan",
            "present dec",
            "present nov",
            "ip address",
            "present",
            "codex",
            "sf.net",
            "next associated",
            "ipv4 add",
            "location united",
            "america flag",
            "spawns",
            "found",
            "t1480 execution",
            "pattern match",
            "present aug",
            "search",
            "name servers",
            "showing",
            "record value",
            "meta",
            "accept",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "denver",
            "yandex",
            "post",
            "entries",
            "post http",
            "show",
            "post liquor",
            "execution",
            "port",
            "destination",
            "icmp traffic",
            "dns query",
            "include",
            "top source"
          ],
          "references": [
            "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
            "genealogytrails.com",
            "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
            "Has been present throughout a specific campaign",
            "Mirai",
            "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
            "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
            "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
            "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
            "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
            "ET INFO User-Agent (python-requests) Inbound to Webserver",
            "Suspicious User Agent | ETPRO POLICY Python Requests",
            "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
            "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
            "TCP SYN packets were observed",
            "ET WORM TheMoon.linksys.router",
            "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
            "\"ET WEB_SERVER WebShell Generic - wget http - POST",
            "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
            "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
            "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
            "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
            "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
            "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
            "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
            "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
            "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
            "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
            "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
            "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
            "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
            "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
            "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
            "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
            "IPs Contacted:  149.56.240.31  172.66.136.209",
            "Domains Contacted: c.statcounter.com sstatic1.histats.com",
            "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
            "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
            "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
            "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
            "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
            "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
            "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
            "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-7646352-0",
              "display_name": "Unix.Trojan.Mirai-7646352-0",
              "target": null
            },
            {
              "id": "SpyFu",
              "display_name": "SpyFu",
              "target": null
            },
            {
              "id": "Win.Trojan.VB-83922",
              "display_name": "Win.Trojan.VB-83922",
              "target": null
            },
            {
              "id": "virtool:Win32/VBInject.gen!JB",
              "display_name": "virtool:Win32/VBInject.gen!JB",
              "target": "/malware/virtool:Win32/VBInject.gen!JB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1562.003",
              "name": "Impair Command History Logging",
              "display_name": "T1562.003 - Impair Command History Logging"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5779,
            "domain": 730,
            "FileHash-MD5": 185,
            "FileHash-SHA1": 147,
            "hostname": 1790,
            "email": 5,
            "FileHash-SHA256": 947,
            "CVE": 3,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 9594,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "39 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6951f52a5af00a9be445ad41",
          "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
          "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
          "modified": "2026-01-28T02:03:16.337000",
          "created": "2025-12-29T03:27:38.183000",
          "tags": [
            "no expiration",
            "expiration",
            "url http",
            "url https",
            "iocs",
            "enter source",
            "url or",
            "name servers",
            "a domains",
            "accept encoding",
            "urls",
            "emails",
            "servers",
            "url add",
            "http",
            "files domain",
            "files related",
            "related tags",
            "united",
            "gmt contenttype",
            "ipv4 add",
            "url analysis",
            "files",
            "present dec",
            "cname",
            "virtool",
            "cryp",
            "ip address",
            "trojan",
            "win32",
            "therahand",
            "jeffrey reimer",
            "reimer  dpt",
            "msie",
            "chrome",
            "unknown ns",
            "unknown cname",
            "record value",
            "accept",
            "encrypt",
            "passive dns",
            "moved",
            "wp engine",
            "meta",
            "wordpress",
            "pegasus",
            "america flag",
            "america asn",
            "reverse dns",
            "flag",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "analysis",
            "tor analysis",
            "dns requests",
            "united states",
            "hostname",
            "pulse submit",
            "domain",
            "files ip",
            "eva lisa",
            "eva reimer",
            "all ipv4",
            "dynamic_content",
            "fingerprinting",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "status",
            "hostname add",
            "evasion",
            "proximity",
            "pulse pulses",
            "address",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "command",
            "initial access",
            "spawns",
            "present mar",
            "present jun",
            "title",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "data recovery",
            "ms windows",
            "process32nextw",
            "intel",
            "pe32",
            "format",
            "mozilla",
            "installcapital",
            "generic",
            "write",
            "unknown",
            "malware",
            "next",
            "installer",
            "template",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "script script",
            "pragma",
            "port",
            "destination",
            "binbusybox",
            "high",
            "post",
            "icmp traffic",
            "dns query",
            "newstatusurl",
            "mirai",
            "prefetch8",
            "ck matrix",
            "localappdata",
            "info",
            "ssl certificate",
            "czech republic",
            "prefetch1",
            "prefetch2",
            "israel israel",
            "analysis tip",
            "href",
            "ascii text",
            "null",
            "refresh",
            "span",
            "iframe",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "beginstring",
            "windir",
            "openurl c",
            "programfiles",
            "related nids",
            "files location",
            "flag united",
            "dynamicloader",
            "medium",
            "named pipe",
            "win64",
            "download",
            "delphi",
            "smartassembly",
            "m. brian sabey",
            "quasi government",
            "no such agency",
            "facebook",
            "search",
            "date",
            "showing",
            "ukraine",
            "\u2018buzz\u2019",
            "alex karp",
            "peter theil",
            "elon musk",
            "ff d5",
            "yara rule",
            "ee fc",
            "generic http",
            "exe upload",
            "f0 ff",
            "eb e1",
            "ff bb",
            "show process",
            "sha1",
            "sub domain",
            "show technique",
            "network traffic",
            "class",
            "starfield",
            "cyber crime",
            "yara detections",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "sha256 add",
            "av detections",
            "ids detections",
            "alerts",
            "show",
            "dock",
            "execution",
            "present feb",
            "value",
            "content type",
            "mirai",
            "sha256",
            "body",
            "gmt content",
            "ddos",
            "mtb sep",
            "hosting",
            "domain robot",
            "expiration date",
            "welcome",
            "apple",
            "christopher p. ahmann",
            "tsara",
            "monitored target",
            "github https",
            "github",
            "smart assembly",
            "red hat",
            "hackers",
            "google"
          ],
          "references": [
            "https://therahand.com",
            "www.socialimages.reputationdatabase.com",
            "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
            "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
            "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
            "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
            "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
            "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "BinBusyBox: 0x.un5t48l3.host",
            "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
            "AS24961 MyLoc Managed IT AG",
            "PSI | Planned Systems International https://www.plan-sys.com/cyber",
            "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
            "https://www.red-gate.com/products/smartassembly",
            "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
            "Colorado maintains a public-facing police misconduct database via the state's",
            "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
            "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
          ],
          "public": 1,
          "adversary": "NSO Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-306281",
              "display_name": "Win.Trojan.Agent-306281",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.KI",
              "display_name": "VirTool:Win32/Obfuscator.KI",
              "target": "/malware/VirTool:Win32/Obfuscator.KI"
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "ELF:Gafgyt-DZ\\ [Trj]",
              "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-5607483-0",
              "display_name": "Unix.Trojan.Mirai-5607483-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1036.005",
              "name": "Match Legitimate Name or Location",
              "display_name": "T1036.005 - Match Legitimate Name or Location"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 523,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 2165,
            "URL": 4953,
            "domain": 1118,
            "hostname": 1951,
            "email": 12,
            "SSLCertFingerprint": 52,
            "CVE": 2
          },
          "indicator_count": 11178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "81 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "688b0fbceab364a2b84b1124",
          "name": "Busybox MIORI Hackers - ongoing  Aurora , Medical Campus -Mirai [by scoreblue -Team 8]",
          "description": "",
          "modified": "2025-07-31T06:39:56.204000",
          "created": "2025-07-31T06:39:56.204000",
          "tags": [
            "idnischdr http",
            "computer",
            "america asn",
            "as7018 att",
            "url https",
            "america",
            "united states",
            "united",
            "germany",
            "italy",
            "trojan",
            "all scoreblue",
            "report spam",
            "created",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "all search",
            "author avatar",
            "miori hackers",
            "file score",
            "detections elf",
            "path",
            "busybox busybox",
            "brute force",
            "attack bad",
            "login yara",
            "detections",
            "sid name",
            "malware cve",
            "suspicious path",
            "busybox",
            "activity",
            "system",
            "malware beacon",
            "bad login",
            "attack",
            "port",
            "destination",
            "show",
            "search",
            "exif data",
            "property value",
            "elf info",
            "key value",
            "x86 baddr",
            "elf64 crypto",
            "final url",
            "ip address",
            "status code",
            "body",
            "kb body",
            "sha256",
            "server",
            "gmt connection",
            "date sun",
            "gmt contenttype",
            "filehashsha256",
            "crazy doll",
            "next",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "number",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "cus stcolorado",
            "info",
            "director",
            "orgtechhandle",
            "orgtechref",
            "university",
            "whois lookup",
            "netrange",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "network",
            "registry arin",
            "country us",
            "continent na",
            "meta",
            "script script",
            "lance mueller",
            "mueller",
            "unknown",
            "script urls",
            "photography",
            "passive dns",
            "urls",
            "model",
            "creation date",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "status",
            "http",
            "record value",
            "emails",
            "dnssec",
            "domain name",
            "backdoor",
            "bad request",
            "entries",
            "title style",
            "f2f2f2 color",
            "helvetica neue",
            "exploit",
            "browse scan",
            "endpoints all",
            "search otx",
            "related pulses",
            "file samples",
            "files matching",
            "as44273 host",
            "showing",
            "telper",
            "date hash",
            "copyright",
            "url http",
            "win64",
            "as53665 bodis",
            "aaaa",
            "as206834 team",
            "canada unknown",
            "read c",
            "create c",
            "write c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "delete c",
            "dock",
            "write",
            "execution",
            "copy",
            "xport",
            "1575038779",
            "medium",
            "capture",
            "malware",
            "february",
            "as61969 team",
            "servers",
            "domain robot",
            "expiration date",
            "as714 apple",
            "as42 woodynet",
            "nxdomain",
            "name servers",
            "a nxdomain",
            "ipv4",
            "found",
            "control",
            "content type",
            "as20940",
            "asnone united",
            "as701 verizon",
            "as2914 ntt",
            "win32",
            "certificate",
            "date",
            "dynamicloader",
            "high",
            "t1055",
            "attempts",
            "yara detections",
            "bitcoinaltcoin",
            "code injection",
            "high defense",
            "ip related",
            "pulses otx",
            "pulses",
            "overview domain",
            "files ip",
            "address domain",
            "related tags",
            "pulse pulses",
            "div div",
            "as49505",
            "span",
            "form",
            "as6185 apple",
            "china",
            "as4812 china",
            "as17816 china",
            "as4134 chinanet",
            "scan endpoints",
            "trojan features",
            "enigmaprotector",
            "dynamic",
            "powershell",
            "filehash",
            "for privacy",
            "ltd dba",
            "com laude",
            "cname",
            "cve20170147 sep",
            "verdict",
            "as63949 linode",
            "https",
            "as8075",
            "united kingdom",
            "whitelisted",
            "as25825",
            "moved",
            "aurora",
            "redacted for",
            "whois lookups",
            "orgid",
            "east",
            "seen",
            "update date",
            "cidr",
            "netname uch",
            "parent net168",
            "nettype direct",
            "contacted",
            "tulach",
            "brian sabey"
          ],
          "references": [
            "ELF:Mirai-TO\\ [Trj] UCH/PU_Log_ID/Locked_Scr [168.200.5.63] || http://itsupport.uchealth.org/ ||  [Trj] http://itsupport.uchealth.org/",
            "ELF:Mirai-TO\\ [Trj] 12.111.210.191 |  United States of America ASN AS7018 att services inc",
            "ELF:Mirai-TO\\ [Trj] FileHash-SHA256. 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
            "ELF:Mirai-TO\\ [Trj] tulach.cc",
            "ELF:Mirai-TO\\ [Trj] FileHash-SHA256 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
            "IDS Detections:  busybox MIORI Hackers - Infected System SUSPICIOUS Path to BusyBox",
            "IDS Detections: busybox MIORI Hackers - Possible Brute Force Attack Bad Login",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "Yara Detections: is__elf",
            "168.200.5.0/24: Autonomous System Number :18693 ||  Autonomous System Label UCH-CENTRAL Regional Internet Registry: ARIN: Country US",
            "www.proxydocker.com Yvmc.org is hosted in United States ip detail \u00c9tats Unis (US) , (Aurora , Colorado ) links to network IP address: 168.200.5.63",
            "Computer Forensics Malware Analysis Digital Investigations | www.forensickb.com |",
            "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
            "webcam.sopris.net || https://www.chietimeteo.it/webcamabruzzo.htm savethemalesdenver.com",
            "girlsandtheir.webcam - suspicious_write_exe network_icmp infostealer_keylogger process_martian injection_resumethread | parkingcrew.net  ns2.parkingcrew.net",
            "http://serafinipelletteria.it/riparazioni/13-borse-restauro/22-spy-bag-%C3%83%C2%A2%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9C-fend",
            "Title The page title. Chieti Meteo - Webcam Abruzzo",
            "Final URL contacted when you try to visit the URL under study, after any potential redirects. https://www.chietimeteo.it/webcamabruzzo.htm Serving IP Address: 89.46.110.55",
            "savethemalesdenver.com | brasville.com.br?",
            "168.200.45.168 Original IP- UCHealth is jacking accounts | University of Colorado Hospital Scot.MacCabe@uchealth.org",
            "Basic Properties Regional Internet Registry ARIN   Country US   Continent NA Whois Lookup NetRange: 168.200.0.0 - 168.200.255.255 US",
            "CIDR: 168.200.0.0/16 NetName: UCH NetHandle: NET-168-200-0-0-1 Parent: NET168 (NET-168-0-0-0-0) NetType: Direct Allocation Organization: University of Colorado Hospital (UCHA) RegDate: 1994-06-22 Updated: 2021-12-14 Ref: https://rdap.arin.net/registry/ip/168.200.0.0 OrgName: University of Colorado Hospital OrgId: UCHA Address: 13001 East 17th Place Address: UH Fitzsimons bldg 500 5th floor east Address: Information Services City: Aurora StateProv: CO PostalCode: 80045-0505 Country:",
            "Address 198.185.159.144 ,  198.185.159.145 ,  198.49.23.144 ,  198.49.23.145",
            "Lance Mueller Photography Artistic Portraiture || Domains || lancemueller.com/https://www.lancemueller.com/ www.instagram.com",
            "IP: 198.185.159.144 Backdoor:Linux/Mirai.B || TELPER:HSTR:DotCisOffer || TrojanSpy:Win32/Nivdort || Bladabindi || TrojanDownloader:Win32/Bulilit",
            "IDS Detections: Win32.Renos/Artro Trojan Checkin M1 Fakealert.ATQ/Renos.GNC Checkin AlphaCrypt CnC Beacon 5 Win32.Meredrop Checkin",
            "IDS Detections: CryptoWall Check-in Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 6 Koobface HTTP Request",
            "IDS Detections: Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) FormBook CnC Checkin (GET)",
            "Crypt3.BWVY \u00bb forums.girlsandtheir.webcam | http://girlsandtheir.webcam/&_=1642807476815 | http://girlsandtheir.webcam/&_=1677944772349",
            "http://girlsandtheir.webcam/&_=1678440394065 | http://girlsandtheir.webcam/&_=1678605911170 | http://girlsandtheir.webcam/&_=1678901115584",
            "http://girlsandtheir.webcam/&_=1727668914786 | http://girlsandtheir.webcam/&_=1727684361432 | http://girlsandtheir.webcam/&_=1678620676912",
            "http://girlsandtheir.webcam/&_=167922487756 | http://girlsandtheir.webcam/&_=1678764409894 | http://girlsandtheir.webcam/&_=1679002803910",
            "http://girlsandtheir.webcam/&_=1679275226198 | http://girlsandtheir.webcam/&_=1679338009770| http://girlsandtheir.webcam/&_=1679628920449 No Expira http://girlsandtheir.webcam/&_=1727448919580\t  | http://girlsandtheir.webcam/&_=1727487291351 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727511329381 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727586798507 | http://girlsandtheir.webcam/&_=1727595333556  | http://girlsandtheir.webcam/&_=1727665483552",
            "chatluongvn.tk - use of targeted surveillance intended to spy on members of civil society, suppress dissent, crime victims & monitor journalists.",
            "Apple ID: 17.253.142.4 | Reverse DNS www.applesports.webcam",
            "Associated w/Apple ID: http://www.ripmixburn.com/| www.ripmixburn.com | 17.253.142.4 | http://www.qttv.net |www.qttv.net | 17.253.142.4",
            "Associated w/Apple ID: http://qumoteze.apple-hk.com\tqumoteze.apple-hk.com | 17.253.142.4 | http://identity.appke.com | identity.appke.com",
            "Associated w/Apple ID: 17.253.142.4 |\thttp://xn--8mrw5wsjh2jt.top | xn--8mrw5wsjh2jt.top | 17.253.142.4 | https://www.qttv.net | www.qttv.net",
            "Associated w.Apple ID: 17.253.142.4 | https://qumoteze.apple-hk.com | http://applegiftcard.apple/ | https://identity.appke.com",
            "Win.Packed.Enigma-10023199-0: FileHash - SHA256 2753cb6cd4b034d91a1361d5d4f643e3f45abbe249a1563e2e3bf6e7b6001cd3",
            "Trojan:Win32/Mydoom | apple.com | IP Address 17.253.144.10: Yara Detections EnigmaProtector ,  xor_0x8_This_program Alerts network_bind persistence_autorun antivm_generic_diskreg",
            "Win.Malware.Midie-9950743-0 Apple IP 17.253.144.10: SHA256 8b3170934dd8efaf4335f752d4a1a1816f8be3cdba963d897b93f308fa4ab644",
            "Win.Malware.Midie Alerts: injection_inter_process injection_create_remote_thread antisandbox_sleep persistence_autorun browser_security",
            "Win.Malware.Midie Alerts: antisandbox_unhook infostealer_cookies  deletes_executed_files infostealer_bitcoin injection_createremotethread",
            "Win.Malware.Midie-9950743-0: Domains Contacted microsoft.com dropbox.com twitter.com sendspace.com etrade.com",
            "Win.Malware.Midie-9950743-0: Domains Contacted instagram.com github.com icloud.com python.org facebook.com"
          ],
          "public": 1,
          "adversary": "busybox MIORI Hackers",
          "targeted_countries": [
            "United States of America",
            "Mexico"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Bulilit",
              "display_name": "TrojanDownloader:Win32/Bulilit",
              "target": "/malware/TrojanDownloader:Win32/Bulilit"
            },
            {
              "id": "ELF:Mirai-TO\\ [Trj]",
              "display_name": "ELF:Mirai-TO\\ [Trj]",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.B",
              "display_name": "Backdoor:Linux/Mirai.B",
              "target": "/malware/Backdoor:Linux/Mirai.B"
            },
            {
              "id": "TELPER:HSTR:DotCisOffer",
              "display_name": "TELPER:HSTR:DotCisOffer",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Backdoor:Win32/Bladabindi",
              "display_name": "Backdoor:Win32/Bladabindi",
              "target": "/malware/Backdoor:Win32/Bladabindi"
            },
            {
              "id": "ALF:E5",
              "display_name": "ALF:E5",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-9950743-0",
              "display_name": "Win.Malware.Midie-9950743-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.ARJ!MTB",
              "display_name": "Trojan:Win32/Emotet.ARJ!MTB",
              "target": "/malware/Trojan:Win32/Emotet.ARJ!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66fb3c4e8a2593134641f3c0",
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 459,
            "FileHash-MD5": 1228,
            "FileHash-SHA1": 1163,
            "FileHash-SHA256": 2243,
            "domain": 876,
            "hostname": 1088,
            "CIDR": 2,
            "email": 17,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 7083,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "262 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66fc29a49b5ac693c8d75122",
          "name": "Medical Campus - Aurora, Co | Recheck",
          "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
          "modified": "2024-10-31T16:03:52.240000",
          "created": "2024-10-01T16:56:04.004000",
          "tags": [
            "united",
            "as397240",
            "search",
            "showing",
            "as54113",
            "as397241",
            "unknown",
            "moved",
            "creation date",
            "record value",
            "next",
            "date",
            "body",
            "a domains",
            "passive dns",
            "formbook cnc",
            "checkin",
            "entries",
            "github pages",
            "sea x",
            "accept",
            "status",
            "name servers",
            "certificate",
            "urls",
            "aaaa",
            "cname",
            "meta",
            "whitelisted ip",
            "address",
            "location united",
            "asn as36459",
            "github",
            "less whois",
            "registrar",
            "markmonitor",
            "related tags",
            "as36459",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "ninite",
            "expiration date",
            "domain",
            "hostname",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "document file",
            "v2 document",
            "utf8",
            "crlf line",
            "beginstring",
            "size",
            "null",
            "hybrid",
            "refresh",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "url https",
            "tulach type",
            "role title",
            "added active",
            "pulses url",
            "url http",
            "nextc type",
            "type indicator",
            "related pulses",
            "filehashsha256",
            "copyright",
            "ipv6",
            "germany",
            "italy",
            "trojan",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "linux x8664",
            "khtml",
            "gecko",
            "veryhigh",
            "redirect",
            "httpsupgrades",
            "collisionbox",
            "runner",
            "gameoverpanel",
            "trex",
            "orgtechhandle",
            "orgtechref",
            "director",
            "university",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "orgid",
            "east",
            "report spam",
            "as8075",
            "servers",
            "secure server",
            "error all",
            "typeof",
            "error f",
            "crazy doll",
            "created",
            "filehashmd5",
            "types of",
            "russia",
            "emotet type",
            "mirai type",
            "mirai",
            "mtb description",
            "win32 type",
            "as31034 aruba",
            "italy unknown",
            "as19527 google",
            "encrypt",
            "health type",
            "miori hackers",
            "brute force",
            "backdoor",
            "aurora",
            "ip address",
            "path",
            "unis",
            "dotcisoffer",
            "bladabindi",
            "artro",
            "script urls",
            "as46606",
            "brazil unknown",
            "as11284",
            "as10906",
            "apache",
            "lanc type",
            "telper",
            "win32",
            "win64",
            "pulses email",
            "as9009 m247",
            "as7296 alchemy",
            "as14061",
            "as16276",
            "trojandropper",
            "ransom",
            "mtb sep",
            "msie",
            "chrome",
            "ip check",
            "gmt content",
            "pulse submit",
            "url analysis",
            "files ip",
            "aaaa nxdomain",
            "nxdomain",
            "a nxdomain",
            "as22612",
            "dnssec",
            "meta http",
            "accept encoding",
            "request id",
            "united kingdom",
            "div div",
            "arial helvetica",
            "emails",
            "as15169 google",
            "cryp",
            "gmt cache",
            "sameorigin",
            "domain name",
            "code",
            "false",
            "command type",
            "roleselfservice",
            "mcig sep",
            "all search",
            "author avatar",
            "days ago",
            "http",
            "related nids",
            "files location",
            "as30081",
            "gmt contenttype",
            "mozilla",
            "as15133 verizon",
            "whitelisted",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "softcnapp",
            "overview ip",
            "flag united",
            "files related",
            "as62597 nsone",
            "as31898 oracle",
            "mtb aug",
            "class",
            "twitter",
            "april",
            "secure",
            "httponly",
            "expiresthu",
            "pragma",
            "as13414 twitter",
            "smoke loader",
            "reverse dns",
            "asnone united",
            "idlogin sep",
            "uid38009",
            "expiration",
            "hack type",
            "porn type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Aruba"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3850,
            "FileHash-MD5": 6012,
            "FileHash-SHA1": 5906,
            "domain": 3329,
            "email": 33,
            "hostname": 4231,
            "CVE": 2,
            "FileHash-SHA256": 8407,
            "CIDR": 2,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 31779,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "535 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66fb3c4e8a2593134641f3c0",
          "name": "busybox MIORI Hackers - attack Aurora, Medical Campus -Mirai",
          "description": "*Tipped-Patient reports computers with fully locked screens log in every time she enters a room at UC Health Anshutz Campus. Unauthorized Login: http://ITSupport.UCHealth.org. Graphs deleted from Virus Total\u00bbLogin ID: 168.200.45.168 [bound]. I've tried to post pulse multiple times. IP's were contacted. Brute force attempts on my device. Anyway it's Tulach. There is a 'pro- ale' and other 'monitoring, silencing, dangerous groups'  silencing crime victims, journalists, dissents, potential whistle blowers. One victim attacked physically losing health battle. Doctors unwilling to treat.Auto populated\u00bb The full text of the Mirai-TO malware, which was launched on Friday, has now been published on the website of www.forensickb.co.uk..com. hmmm...there was a counter attack.",
          "modified": "2024-10-30T22:04:06.705000",
          "created": "2024-10-01T00:03:26.199000",
          "tags": [
            "idnischdr http",
            "computer",
            "america asn",
            "as7018 att",
            "url https",
            "america",
            "united states",
            "united",
            "germany",
            "italy",
            "trojan",
            "all scoreblue",
            "report spam",
            "created",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "all search",
            "author avatar",
            "miori hackers",
            "file score",
            "detections elf",
            "path",
            "busybox busybox",
            "brute force",
            "attack bad",
            "login yara",
            "detections",
            "sid name",
            "malware cve",
            "suspicious path",
            "busybox",
            "activity",
            "system",
            "malware beacon",
            "bad login",
            "attack",
            "port",
            "destination",
            "show",
            "search",
            "exif data",
            "property value",
            "elf info",
            "key value",
            "x86 baddr",
            "elf64 crypto",
            "final url",
            "ip address",
            "status code",
            "body",
            "kb body",
            "sha256",
            "server",
            "gmt connection",
            "date sun",
            "gmt contenttype",
            "filehashsha256",
            "crazy doll",
            "next",
            "key identifier",
            "x509v3 subject",
            "data",
            "v3 serial",
            "number",
            "cgb stgreater",
            "cnsectigo rsa",
            "secure server",
            "ca validity",
            "cus stcolorado",
            "info",
            "director",
            "orgtechhandle",
            "orgtechref",
            "university",
            "whois lookup",
            "netrange",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "network",
            "registry arin",
            "country us",
            "continent na",
            "meta",
            "script script",
            "lance mueller",
            "mueller",
            "unknown",
            "script urls",
            "photography",
            "passive dns",
            "urls",
            "model",
            "creation date",
            "hostname",
            "pulse submit",
            "url analysis",
            "files",
            "domain",
            "status",
            "http",
            "record value",
            "emails",
            "dnssec",
            "domain name",
            "backdoor",
            "bad request",
            "entries",
            "title style",
            "f2f2f2 color",
            "helvetica neue",
            "exploit",
            "browse scan",
            "endpoints all",
            "search otx",
            "related pulses",
            "file samples",
            "files matching",
            "as44273 host",
            "showing",
            "telper",
            "date hash",
            "copyright",
            "url http",
            "win64",
            "as53665 bodis",
            "aaaa",
            "as206834 team",
            "canada unknown",
            "read c",
            "create c",
            "write c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "delete c",
            "dock",
            "write",
            "execution",
            "copy",
            "xport",
            "1575038779",
            "medium",
            "capture",
            "malware",
            "february",
            "as61969 team",
            "servers",
            "domain robot",
            "expiration date",
            "as714 apple",
            "as42 woodynet",
            "nxdomain",
            "name servers",
            "a nxdomain",
            "ipv4",
            "found",
            "control",
            "content type",
            "as20940",
            "asnone united",
            "as701 verizon",
            "as2914 ntt",
            "win32",
            "certificate",
            "date",
            "dynamicloader",
            "high",
            "t1055",
            "attempts",
            "yara detections",
            "bitcoinaltcoin",
            "code injection",
            "high defense",
            "ip related",
            "pulses otx",
            "pulses",
            "overview domain",
            "files ip",
            "address domain",
            "related tags",
            "pulse pulses",
            "div div",
            "as49505",
            "span",
            "form",
            "as6185 apple",
            "china",
            "as4812 china",
            "as17816 china",
            "as4134 chinanet",
            "scan endpoints",
            "trojan features",
            "enigmaprotector",
            "dynamic",
            "powershell",
            "filehash",
            "for privacy",
            "ltd dba",
            "com laude",
            "cname",
            "cve20170147 sep",
            "verdict",
            "as63949 linode",
            "https",
            "as8075",
            "united kingdom",
            "whitelisted",
            "as25825",
            "moved",
            "aurora",
            "redacted for",
            "whois lookups",
            "orgid",
            "east",
            "seen",
            "update date",
            "cidr",
            "netname uch",
            "parent net168",
            "nettype direct",
            "contacted",
            "tulach",
            "brian sabey"
          ],
          "references": [
            "ELF:Mirai-TO\\ [Trj] UCH/PU_Log_ID/Locked_Scr [168.200.5.63] || http://itsupport.uchealth.org/ ||  [Trj] http://itsupport.uchealth.org/",
            "ELF:Mirai-TO\\ [Trj] 12.111.210.191 |  United States of America ASN AS7018 att services inc",
            "ELF:Mirai-TO\\ [Trj] FileHash-SHA256. 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
            "ELF:Mirai-TO\\ [Trj] tulach.cc",
            "ELF:Mirai-TO\\ [Trj] FileHash-SHA256 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
            "IDS Detections:  busybox MIORI Hackers - Infected System SUSPICIOUS Path to BusyBox",
            "IDS Detections: busybox MIORI Hackers - Possible Brute Force Attack Bad Login",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "Yara Detections: is__elf",
            "168.200.5.0/24: Autonomous System Number :18693 ||  Autonomous System Label UCH-CENTRAL Regional Internet Registry: ARIN: Country US",
            "www.proxydocker.com Yvmc.org is hosted in United States ip detail \u00c9tats Unis (US) , (Aurora , Colorado ) links to network IP address: 168.200.5.63",
            "Computer Forensics Malware Analysis Digital Investigations | www.forensickb.com |",
            "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
            "webcam.sopris.net || https://www.chietimeteo.it/webcamabruzzo.htm savethemalesdenver.com",
            "girlsandtheir.webcam - suspicious_write_exe network_icmp infostealer_keylogger process_martian injection_resumethread | parkingcrew.net  ns2.parkingcrew.net",
            "http://serafinipelletteria.it/riparazioni/13-borse-restauro/22-spy-bag-%C3%83%C2%A2%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9C-fend",
            "Title The page title. Chieti Meteo - Webcam Abruzzo",
            "Final URL contacted when you try to visit the URL under study, after any potential redirects. https://www.chietimeteo.it/webcamabruzzo.htm Serving IP Address: 89.46.110.55",
            "savethemalesdenver.com | brasville.com.br?",
            "168.200.45.168 Original IP- UCHealth is jacking accounts | University of Colorado Hospital Scot.MacCabe@uchealth.org",
            "Basic Properties Regional Internet Registry ARIN   Country US   Continent NA Whois Lookup NetRange: 168.200.0.0 - 168.200.255.255 US",
            "CIDR: 168.200.0.0/16 NetName: UCH NetHandle: NET-168-200-0-0-1 Parent: NET168 (NET-168-0-0-0-0) NetType: Direct Allocation Organization: University of Colorado Hospital (UCHA) RegDate: 1994-06-22 Updated: 2021-12-14 Ref: https://rdap.arin.net/registry/ip/168.200.0.0 OrgName: University of Colorado Hospital OrgId: UCHA Address: 13001 East 17th Place Address: UH Fitzsimons bldg 500 5th floor east Address: Information Services City: Aurora StateProv: CO PostalCode: 80045-0505 Country:",
            "Address 198.185.159.144 ,  198.185.159.145 ,  198.49.23.144 ,  198.49.23.145",
            "Lance Mueller Photography Artistic Portraiture || Domains || lancemueller.com/https://www.lancemueller.com/ www.instagram.com",
            "IP: 198.185.159.144 Backdoor:Linux/Mirai.B || TELPER:HSTR:DotCisOffer || TrojanSpy:Win32/Nivdort || Bladabindi || TrojanDownloader:Win32/Bulilit",
            "IDS Detections: Win32.Renos/Artro Trojan Checkin M1 Fakealert.ATQ/Renos.GNC Checkin AlphaCrypt CnC Beacon 5 Win32.Meredrop Checkin",
            "IDS Detections: CryptoWall Check-in Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 6 Koobface HTTP Request",
            "IDS Detections: Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) FormBook CnC Checkin (GET)",
            "Crypt3.BWVY \u00bb forums.girlsandtheir.webcam | http://girlsandtheir.webcam/&_=1642807476815 | http://girlsandtheir.webcam/&_=1677944772349",
            "http://girlsandtheir.webcam/&_=1678440394065 | http://girlsandtheir.webcam/&_=1678605911170 | http://girlsandtheir.webcam/&_=1678901115584",
            "http://girlsandtheir.webcam/&_=1727668914786 | http://girlsandtheir.webcam/&_=1727684361432 | http://girlsandtheir.webcam/&_=1678620676912",
            "http://girlsandtheir.webcam/&_=167922487756 | http://girlsandtheir.webcam/&_=1678764409894 | http://girlsandtheir.webcam/&_=1679002803910",
            "http://girlsandtheir.webcam/&_=1679275226198 | http://girlsandtheir.webcam/&_=1679338009770| http://girlsandtheir.webcam/&_=1679628920449 No Expira http://girlsandtheir.webcam/&_=1727448919580\t  | http://girlsandtheir.webcam/&_=1727487291351 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727511329381 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727586798507 | http://girlsandtheir.webcam/&_=1727595333556  | http://girlsandtheir.webcam/&_=1727665483552",
            "chatluongvn.tk - use of targeted surveillance intended to spy on members of civil society, suppress dissent, crime victims & monitor journalists.",
            "Apple ID: 17.253.142.4 | Reverse DNS www.applesports.webcam",
            "Associated w/Apple ID: http://www.ripmixburn.com/| www.ripmixburn.com | 17.253.142.4 | http://www.qttv.net |www.qttv.net | 17.253.142.4",
            "Associated w/Apple ID: http://qumoteze.apple-hk.com\tqumoteze.apple-hk.com | 17.253.142.4 | http://identity.appke.com | identity.appke.com",
            "Associated w/Apple ID: 17.253.142.4 |\thttp://xn--8mrw5wsjh2jt.top | xn--8mrw5wsjh2jt.top | 17.253.142.4 | https://www.qttv.net | www.qttv.net",
            "Associated w.Apple ID: 17.253.142.4 | https://qumoteze.apple-hk.com | http://applegiftcard.apple/ | https://identity.appke.com",
            "Win.Packed.Enigma-10023199-0: FileHash - SHA256 2753cb6cd4b034d91a1361d5d4f643e3f45abbe249a1563e2e3bf6e7b6001cd3",
            "Trojan:Win32/Mydoom | apple.com | IP Address 17.253.144.10: Yara Detections EnigmaProtector ,  xor_0x8_This_program Alerts network_bind persistence_autorun antivm_generic_diskreg",
            "Win.Malware.Midie-9950743-0 Apple IP 17.253.144.10: SHA256 8b3170934dd8efaf4335f752d4a1a1816f8be3cdba963d897b93f308fa4ab644",
            "Win.Malware.Midie Alerts: injection_inter_process injection_create_remote_thread antisandbox_sleep persistence_autorun browser_security",
            "Win.Malware.Midie Alerts: antisandbox_unhook infostealer_cookies  deletes_executed_files infostealer_bitcoin injection_createremotethread",
            "Win.Malware.Midie-9950743-0: Domains Contacted microsoft.com dropbox.com twitter.com sendspace.com etrade.com",
            "Win.Malware.Midie-9950743-0: Domains Contacted instagram.com github.com icloud.com python.org facebook.com"
          ],
          "public": 1,
          "adversary": "busybox MIORI Hackers",
          "targeted_countries": [
            "United States of America",
            "Mexico"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Bulilit",
              "display_name": "TrojanDownloader:Win32/Bulilit",
              "target": "/malware/TrojanDownloader:Win32/Bulilit"
            },
            {
              "id": "ELF:Mirai-TO\\ [Trj]",
              "display_name": "ELF:Mirai-TO\\ [Trj]",
              "target": null
            },
            {
              "id": "Backdoor:Linux/Mirai.B",
              "display_name": "Backdoor:Linux/Mirai.B",
              "target": "/malware/Backdoor:Linux/Mirai.B"
            },
            {
              "id": "TELPER:HSTR:DotCisOffer",
              "display_name": "TELPER:HSTR:DotCisOffer",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Backdoor:Win32/Bladabindi",
              "display_name": "Backdoor:Win32/Bladabindi",
              "target": "/malware/Backdoor:Win32/Bladabindi"
            },
            {
              "id": "ALF:E5",
              "display_name": "ALF:E5",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-9950743-0",
              "display_name": "Win.Malware.Midie-9950743-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.ARJ!MTB",
              "display_name": "Trojan:Win32/Emotet.ARJ!MTB",
              "target": "/malware/Trojan:Win32/Emotet.ARJ!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 459,
            "FileHash-MD5": 1228,
            "FileHash-SHA1": 1163,
            "FileHash-SHA256": 2243,
            "domain": 876,
            "hostname": 1088,
            "CIDR": 2,
            "email": 17,
            "CVE": 2,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 7083,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "535 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f38d1b2e4ef8d8db533d36",
          "name": "FormBook - moa.moe ??? Pegasus & Brian Sabey Related",
          "description": "",
          "modified": "2024-10-25T03:00:50.871000",
          "created": "2024-09-25T04:10:03.211000",
          "tags": [
            "as54113",
            "united",
            "a domains",
            "passive dns",
            "unknown",
            "mtb sep",
            "github pages",
            "request id",
            "sea x",
            "twitter",
            "accept",
            "status",
            "cookie",
            "search",
            "certificate",
            "record value",
            "showing",
            "as8075",
            "aaaa",
            "asnone united",
            "yara detections",
            "trojan",
            "show",
            "all scoreblue",
            "av detections",
            "ids detections",
            "body",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "urls",
            "443 ma2592000",
            "encrypt",
            "germany unknown",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "ipv4",
            "main",
            "name servers",
            "redacted for",
            "for privacy",
            "servers",
            "meta",
            "homemakers",
            "as212222",
            "script domains",
            "script urls",
            "diy artikelen",
            "zo bieden",
            "class",
            "customer",
            "as16276",
            "canada unknown",
            "sigattr",
            "formbook cnc",
            "checkin",
            "win32",
            "entries",
            "bootasep apr",
            "alerts",
            "read",
            "write",
            "delete",
            "top source",
            "files",
            "location united",
            "creation date",
            "domain",
            "emails",
            "expiration date",
            "next",
            "ovhcloud meta",
            "cname",
            "as36459",
            "whitelisted ip",
            "address",
            "asn as36459",
            "registrar",
            "markmonitor",
            "related tags",
            "france unknown",
            "moved",
            "setcookie",
            "gmt contenttype",
            "refloadapihash",
            "france",
            "nxdomain",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "error",
            "backend",
            "as40065",
            "china unknown",
            "deleted site",
            "atom",
            "record type",
            "ttl value",
            "as174 cogent",
            "pulse submit",
            "url analysis",
            "hostname",
            "as64050 bgpnet",
            "x9875 x9762",
            "gmt max",
            "httponly",
            "hong kong",
            "taiwan unknown",
            "china asn",
            "server",
            "privacy tech",
            "privacy admin",
            "registrar abuse",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "data",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cnr3",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "ec oid",
            "dns replication",
            "algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "first",
            "enom"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "China",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4675,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 623,
            "FileHash-MD5": 760,
            "FileHash-SHA1": 794,
            "FileHash-SHA256": 3406,
            "domain": 1633,
            "hostname": 1037,
            "email": 17,
            "CVE": 1
          },
          "indicator_count": 8271,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "541 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aafd0e93efa420f74123c",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2024-10-12T01:00:47.836000",
          "created": "2023-12-02T04:17:20.189000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6562908e28e6cdc237fbf8db",
          "export_count": 107,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3895,
            "URL": 11195,
            "domain": 2959,
            "hostname": 3575,
            "CVE": 16,
            "SSLCertFingerprint": 1,
            "email": 1
          },
          "indicator_count": 24465,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "554 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e24b157718e7ddf71765db",
          "name": "Lenovo Tablet K series  Remotely Connects & controls Devices",
          "description": "Lenovo K series Tablet resource used to connect to thermostat devices and develops full CnC of victims network. All types of malicious abuses from dumping to spyware, tracking, enabling device features, listening to room. Creates zombie devices. Zusy: Man-in-the-middle attacks, injection, stealer.\n | AutoIt_3_00_Third_Party: treat actors dependent on various environments to load maware, when exploited, user interface , scripting, malicious activity possible by hidden users",
          "modified": "2024-03-31T15:02:37.900000",
          "created": "2024-03-01T21:39:33.521000",
          "tags": [
            "url http",
            "search",
            "lenovo type",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "status",
            "united",
            "unknown",
            "creation date",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "date",
            "next",
            "meta",
            "tabx explorer",
            "urls",
            "hichina",
            "record value",
            "entries",
            "explorer",
            "target",
            "china unknown",
            "as4812 china",
            "as58461",
            "as4808 china",
            "smartchat",
            "vary",
            "accept encoding",
            "ipv4",
            "pulse submit",
            "dns replication",
            "as4837 china",
            "aaaa",
            "as9808 china",
            "whitelisted",
            "nxdomain",
            "as56047 china",
            "as58542 tianjij",
            "ns nxdomain",
            "body",
            "pe32",
            "intel",
            "ms windows",
            "windows activex",
            "control panel",
            "item",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "javascript",
            "win32 exe",
            "kb file",
            "files",
            "file type",
            "javascript code",
            "windows",
            "text",
            "web open",
            "font format",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "connection",
            "date fri",
            "contacted",
            "whois record",
            "pe resource",
            "execution",
            "communicating",
            "siblings",
            "referrer",
            "whois whois",
            "bundled",
            "resolutions",
            "contacted urls",
            "siblings domain",
            "parent domain",
            "ssl certificate",
            "historical ssl",
            "whois domain",
            "set cookie",
            "gmt path",
            "url analysis",
            "find",
            "service",
            "as15169 google",
            "as9009 m247",
            "as14061",
            "as16276",
            "name servers",
            "alienvault",
            "open threat",
            "yara rule",
            "high",
            "show",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "accept",
            "copy",
            "write",
            "pecompact",
            "february",
            "packer",
            "delphi",
            "win32",
            "malware",
            "zusy",
            "local",
            "json",
            "delete c",
            "ascii text",
            "suspicious",
            "cookie",
            "jpeg image",
            "exif standard",
            "tiff image",
            "autoit",
            "markus",
            "april",
            "dropper",
            "default",
            "delete",
            "switch",
            "as20940",
            "dynamicloader",
            "medium",
            "http",
            "write c",
            "ciphersuite",
            "a li",
            "amazon ses",
            "moved",
            "pepo campaigns",
            "advanced email",
            "twitter",
            "span",
            "servers",
            "authority",
            "win32upatre feb",
            "artro",
            "apple",
            "typosquatting",
            "botnet",
            "network",
            "advertising botnet",
            "adware",
            "mining",
            "spyware",
            "cnc",
            "mbs"
          ],
          "references": [
            "http://www.tabxexplorer.com/lenovo",
            "114.80.179.242 \u2022 61.170.80.193 [malware hosting]",
            "IDS Detections Zusy Variant CnC Checkin",
            "IDS Signatures: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\t192.168.122.30\t104.18.12.173",
            "Registry:   Read - DisableUserModeCallbackFilter",
            "OTX Alerts: procmem_yara injection_inter_process \u2022 ransomware_file_modifications \u2022 stack_pivot stealth_file antiav_detectfile \u2022 deletes_self",
            "OTX Alerts: cape_extracted_content \u2022 infostealer_cookies \u2022 recon_fingerprint \u2022 suricata_alert \u2022 anomalous_deletefile dead_connect \u2022dynamic_function_loading ipc_namedpipe powershell_download createtoolhelp32snapshot_module_enumeration reads_self antidebug_ntsetinformationthread injection_rwx network_http",
            "Stack pivoting was detected when using a critical API",
            "Tracking: trackite.com \u2022 track.beanstalkdata.com \u2022 http://tracking.butterflymx.com/ls/click?upn= \u2022 sonymobilemail.com \u2022 connect.grovelfun.com",
            "apple.ios-slgn-in.com \u2022 appleid.com \u2022 apple.com  \u2022 http://apple.ddianle.com \u2022 http://write.52toolbox.com/cms/privacy_policy_lenovo.html",
            "http://desk.52toolbox.com/cms/agreement_lenovo.html \u2022 http://chat.52toolbox.com/cms/agreement_lenovo.html \u2022 www.tabxexplorer.com",
            "https://www.starbucks.com.cn/mobile-view/en/help/terms/digital-starbucks-rewards-kit?supportTel=fals \u2022 https://u.ysepay.com:8288/MobileGate/login.do",
            "https://download.tenorshare.cn/go/reiboot-for-android_2420.exe?track[banner]=home&track[mobilebanner]=ferragosto20220719&track[tslateset]=undefined&track[w]=3840&track[h]=220?linksource&track[utm_source]=awin&track[utm_medium]=affiliate&track[utm_term]=213429&track[awc]=18616_1659086165_ce9efdb1e9f159a1234acd82324b61a8&track[realMedium]=affiliate&track[cross_end_id]=-LyP4be7B42T9sbA&track[type]=2&track[page]=https://www.tenorshare.cn/guide/ios-system-recovery.html&track[sid]=118",
            "http://www.beneat.cn/mobile/index/index \u2022 http://www.beneat.cn/mobile/index/startAdv \u2022 http://www.beneat.cn/mobile/live/index",
            "http://www.beneat.cn/mobile/room/index \u2022 http://www.beneat.cn/mobile/user/cate  \u2022 http://www.tabxexplorer.com/channel/Commonapi?pid",
            "http://gahub.qijihezi.cn/outlink/others/UbisoftConnectInstaller.exe \u2022 http://zb1.baidu581.com/zhuobiao2/?nid=63047\\r\\nConnection: [location]",
            "accountchooser.com [malicious remote drive by] pop up covers screen, chooses from listed acompromised phone | no click |",
            "Multiple remotewd remotewd.com [DGA domain name changed, moved still active as]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Generickdz-9982080-0",
              "display_name": "Win.Malware.Generickdz-9982080-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zusy",
              "display_name": "Trojan:Win32/Zusy",
              "target": "/malware/Trojan:Win32/Zusy"
            },
            {
              "id": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
              "display_name": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
              "target": null
            },
            {
              "id": "Win.Malware.Autoit-7732194-0",
              "display_name": "Win.Malware.Autoit-7732194-0",
              "target": null
            },
            {
              "id": "DarkComet",
              "display_name": "DarkComet",
              "target": null
            },
            {
              "id": "!AutoIt_3_00_Third_Party",
              "display_name": "!AutoIt_3_00_Third_Party",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1463",
              "name": "Manipulate Device Communication",
              "display_name": "T1463 - Manipulate Device Communication"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1037.003",
              "name": "Network Logon Script",
              "display_name": "T1037.003 - Network Logon Script"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8359,
            "domain": 1687,
            "hostname": 1746,
            "email": 7,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 224,
            "FileHash-SHA256": 1862,
            "CVE": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 14244,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "749 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e24b1cd80668c22e7e1c7a",
          "name": "Lenovo Tablet K series  Remotely Connects & controls Devices",
          "description": "Lenovo K series Tablet resource used to connect to thermostat devices and develops full CnC of victims network. All types of malicious abuses from dumping to spyware, tracking, enabling device features, listening to room. Creates zombie devices. Zusy: Man-in-the-middle attacks, injection, stealer.\n | AutoIt_3_00_Third_Party: treat actors dependent on various environments to load maware, when exploited, user interface , scripting, malicious activity possible by hidden users",
          "modified": "2024-03-31T15:02:37.900000",
          "created": "2024-03-01T21:39:40.078000",
          "tags": [
            "url http",
            "search",
            "lenovo type",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "status",
            "united",
            "unknown",
            "creation date",
            "scan endpoints",
            "all octoseek",
            "domain",
            "pulse pulses",
            "passive dns",
            "date",
            "next",
            "meta",
            "tabx explorer",
            "urls",
            "hichina",
            "record value",
            "entries",
            "explorer",
            "target",
            "china unknown",
            "as4812 china",
            "as58461",
            "as4808 china",
            "smartchat",
            "vary",
            "accept encoding",
            "ipv4",
            "pulse submit",
            "dns replication",
            "as4837 china",
            "aaaa",
            "as9808 china",
            "whitelisted",
            "nxdomain",
            "as56047 china",
            "as58542 tianjij",
            "ns nxdomain",
            "body",
            "pe32",
            "intel",
            "ms windows",
            "windows activex",
            "control panel",
            "item",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "javascript",
            "win32 exe",
            "kb file",
            "files",
            "file type",
            "javascript code",
            "windows",
            "text",
            "web open",
            "font format",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "connection",
            "date fri",
            "contacted",
            "whois record",
            "pe resource",
            "execution",
            "communicating",
            "siblings",
            "referrer",
            "whois whois",
            "bundled",
            "resolutions",
            "contacted urls",
            "siblings domain",
            "parent domain",
            "ssl certificate",
            "historical ssl",
            "whois domain",
            "set cookie",
            "gmt path",
            "url analysis",
            "find",
            "service",
            "as15169 google",
            "as9009 m247",
            "as14061",
            "as16276",
            "name servers",
            "alienvault",
            "open threat",
            "yara rule",
            "high",
            "show",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "accept",
            "copy",
            "write",
            "pecompact",
            "february",
            "packer",
            "delphi",
            "win32",
            "malware",
            "zusy",
            "local",
            "json",
            "delete c",
            "ascii text",
            "suspicious",
            "cookie",
            "jpeg image",
            "exif standard",
            "tiff image",
            "autoit",
            "markus",
            "april",
            "dropper",
            "default",
            "delete",
            "switch",
            "as20940",
            "dynamicloader",
            "medium",
            "http",
            "write c",
            "ciphersuite",
            "a li",
            "amazon ses",
            "moved",
            "pepo campaigns",
            "advanced email",
            "twitter",
            "span",
            "servers",
            "authority",
            "win32upatre feb",
            "artro",
            "apple",
            "typosquatting",
            "botnet",
            "network",
            "advertising botnet",
            "adware",
            "mining",
            "spyware",
            "cnc",
            "mbs"
          ],
          "references": [
            "http://www.tabxexplorer.com/lenovo",
            "114.80.179.242 \u2022 61.170.80.193 [malware hosting]",
            "IDS Detections Zusy Variant CnC Checkin",
            "IDS Signatures: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\t192.168.122.30\t104.18.12.173",
            "Registry:   Read - DisableUserModeCallbackFilter",
            "OTX Alerts: procmem_yara injection_inter_process \u2022 ransomware_file_modifications \u2022 stack_pivot stealth_file antiav_detectfile \u2022 deletes_self",
            "OTX Alerts: cape_extracted_content \u2022 infostealer_cookies \u2022 recon_fingerprint \u2022 suricata_alert \u2022 anomalous_deletefile dead_connect \u2022dynamic_function_loading ipc_namedpipe powershell_download createtoolhelp32snapshot_module_enumeration reads_self antidebug_ntsetinformationthread injection_rwx network_http",
            "Stack pivoting was detected when using a critical API",
            "Tracking: trackite.com \u2022 track.beanstalkdata.com \u2022 http://tracking.butterflymx.com/ls/click?upn= \u2022 sonymobilemail.com \u2022 connect.grovelfun.com",
            "apple.ios-slgn-in.com \u2022 appleid.com \u2022 apple.com  \u2022 http://apple.ddianle.com \u2022 http://write.52toolbox.com/cms/privacy_policy_lenovo.html",
            "http://desk.52toolbox.com/cms/agreement_lenovo.html \u2022 http://chat.52toolbox.com/cms/agreement_lenovo.html \u2022 www.tabxexplorer.com",
            "https://www.starbucks.com.cn/mobile-view/en/help/terms/digital-starbucks-rewards-kit?supportTel=fals \u2022 https://u.ysepay.com:8288/MobileGate/login.do",
            "https://download.tenorshare.cn/go/reiboot-for-android_2420.exe?track[banner]=home&track[mobilebanner]=ferragosto20220719&track[tslateset]=undefined&track[w]=3840&track[h]=220?linksource&track[utm_source]=awin&track[utm_medium]=affiliate&track[utm_term]=213429&track[awc]=18616_1659086165_ce9efdb1e9f159a1234acd82324b61a8&track[realMedium]=affiliate&track[cross_end_id]=-LyP4be7B42T9sbA&track[type]=2&track[page]=https://www.tenorshare.cn/guide/ios-system-recovery.html&track[sid]=118",
            "http://www.beneat.cn/mobile/index/index \u2022 http://www.beneat.cn/mobile/index/startAdv \u2022 http://www.beneat.cn/mobile/live/index",
            "http://www.beneat.cn/mobile/room/index \u2022 http://www.beneat.cn/mobile/user/cate  \u2022 http://www.tabxexplorer.com/channel/Commonapi?pid",
            "http://gahub.qijihezi.cn/outlink/others/UbisoftConnectInstaller.exe \u2022 http://zb1.baidu581.com/zhuobiao2/?nid=63047\\r\\nConnection: [location]",
            "accountchooser.com [malicious remote drive by] pop up covers screen, chooses from listed acompromised phone | no click |",
            "Multiple remotewd remotewd.com [DGA domain name changed, moved still active as]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Generickdz-9982080-0",
              "display_name": "Win.Malware.Generickdz-9982080-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zusy",
              "display_name": "Trojan:Win32/Zusy",
              "target": "/malware/Trojan:Win32/Zusy"
            },
            {
              "id": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
              "display_name": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
              "target": null
            },
            {
              "id": "Win.Malware.Autoit-7732194-0",
              "display_name": "Win.Malware.Autoit-7732194-0",
              "target": null
            },
            {
              "id": "DarkComet",
              "display_name": "DarkComet",
              "target": null
            },
            {
              "id": "!AutoIt_3_00_Third_Party",
              "display_name": "!AutoIt_3_00_Third_Party",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1463",
              "name": "Manipulate Device Communication",
              "display_name": "T1463 - Manipulate Device Communication"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1037.003",
              "name": "Network Logon Script",
              "display_name": "T1037.003 - Network Logon Script"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8359,
            "domain": 1687,
            "hostname": 1746,
            "email": 7,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 224,
            "FileHash-SHA256": 1862,
            "CVE": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 14244,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "749 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6562908e28e6cdc237fbf8db",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2023-12-26T00:03:03.925000",
          "created": "2023-11-26T00:25:50.529000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3751,
            "URL": 10878,
            "domain": 2914,
            "hostname": 3520,
            "CVE": 16
          },
          "indicator_count": 23902,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aafce24b001cba328dcbc",
          "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
          "description": "",
          "modified": "2023-12-26T00:03:03.925000",
          "created": "2023-12-02T04:17:18.188000",
          "tags": [
            "ssl certificate",
            "contacted",
            "threat roundup",
            "whois record",
            "communicating",
            "subdomains",
            "resolutions",
            "june",
            "july",
            "october",
            "august",
            "noname057",
            "generic malware",
            "ice fog",
            "tag count",
            "thu nov",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "generic",
            "detection list",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malware",
            "alexa",
            "malware site",
            "malicious site",
            "unsafe",
            "artemis",
            "fakealert",
            "exploit",
            "opencandy",
            "riskware",
            "genkryptik",
            "iframe",
            "tiggre",
            "presenoker",
            "agent",
            "conduit",
            "wacatac",
            "phishing",
            "redline stealer",
            "dropper",
            "cobalt strike",
            "acint",
            "nircmd",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "crack",
            "filetour",
            "cleaner",
            "installpack",
            "xrat",
            "fusioncore",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "blacknet rat",
            "stealer",
            "maltiverse",
            "webtoolbar",
            "trojanspy",
            "united",
            "engineering",
            "cyber threat",
            "phishing site",
            "america",
            "emotet",
            "zbot",
            "malicious",
            "steam",
            "team",
            "indonesia",
            "miner",
            "ransomware",
            "ramnit",
            "pe resource",
            "historical ssl",
            "execution",
            "hacktool",
            "metasploit",
            "relic",
            "monitoring",
            "android",
            "skynet",
            "et",
            "anonymizer",
            "trojanx",
            "back",
            "laplasclipper",
            "win64",
            "trojan",
            "ghost rat",
            "suppobox",
            "asyncrat",
            "union",
            "samples",
            "blacklist",
            "malicious url",
            "hostname",
            "hostnames",
            "tsara brashears",
            "reinsurance",
            "pinnacol insurance",
            "industry and commerce",
            "state",
            "danger",
            "warning",
            "nr-data.net",
            "apple",
            "data.net",
            "asp.net",
            "domains",
            "hashes",
            "reverse dns",
            "general full",
            "resource",
            "software",
            "asn15169",
            "google",
            "url http",
            "server",
            "hash",
            "get h2",
            "main",
            "cookie",
            "thu dec",
            "germany",
            "frankfurt",
            "netherlands",
            "asn20446",
            "highwinds3",
            "page url",
            "search live",
            "api blog",
            "docs pricing",
            "tags",
            "november",
            "us summary",
            "http",
            "google safe",
            "browsing",
            "adware",
            "xtrat",
            "firehol",
            "microsoft",
            "control server",
            "services",
            "msil",
            "hiloti",
            "asn16509",
            "amazon02",
            "fastly",
            "asn54113",
            "prague",
            "login",
            "listen live",
            "centura health",
            "colorado jobs",
            "eeo public",
            "filing url",
            "blacklist https",
            "mimikatz",
            "beach research",
            "de indicators",
            "copyright",
            "gmbh version",
            "follow",
            "softcnapp",
            "philadelphia",
            "gamehack",
            "value",
            "line",
            "variables",
            "nreum",
            "postrelease",
            "url https",
            "security tls",
            "protocol h2",
            "name value",
            "scam",
            "gesponsert url",
            "outputldjh",
            "oid2",
            "uhis2",
            "uh1200",
            "uw1600",
            "uah1200",
            "uaw1600",
            "ucd24",
            "usd1",
            "utz60",
            "no data",
            "coinminer",
            "ip address",
            "exchange",
            "http attacker",
            "states",
            "jimburkedentistry",
            "leder-family",
            "adam lee",
            "erika lee",
            "malvertizing"
          ],
          "references": [
            "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
            "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
            "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
            "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
            "http://tracks.theleders.family",
            "photos.theleders.family",
            "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
            "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
            "http://mobtrack.trkclk.net",
            "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "nr-data.net",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "103.233.208.9                    (CNC IP)",
            "apex.jquery.com             (scammer | works for who?)",
            "api.useragentswitch.com",
            "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
            "dns.google                          (DNS client services - Doug Cole)",
            "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
            "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
            "apple-dns.net",
            "emails.redvue.com  (apple DNS w/amvima)",
            "142.250.180.4 (init.ess)",
            "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
            "freeimdatingsites.thomasdobo.eu",
            "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
            "https://urlscan.io/domain/maxwam.tk",
            "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "States",
              "display_name": "States",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6562908e28e6cdc237fbf8db",
          "export_count": 78,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1956,
            "FileHash-SHA1": 867,
            "FileHash-SHA256": 3751,
            "URL": 10878,
            "domain": 2914,
            "hostname": 3520,
            "CVE": 16
          },
          "indicator_count": 23902,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "845 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "IDS Detections: CryptoWall Check-in Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 6 Koobface HTTP Request",
        "168.200.45.168 Original IP- UCHealth is jacking accounts | University of Colorado Hospital Scot.MacCabe@uchealth.org",
        "http://girlsandtheir.webcam/&_=1679275226198 | http://girlsandtheir.webcam/&_=1679338009770| http://girlsandtheir.webcam/&_=1679628920449 No Expira http://girlsandtheir.webcam/&_=1727448919580\t  | http://girlsandtheir.webcam/&_=1727487291351 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727511329381 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727586798507 | http://girlsandtheir.webcam/&_=1727595333556  | http://girlsandtheir.webcam/&_=1727665483552",
        "Apple ID: 17.253.142.4 | Reverse DNS www.applesports.webcam",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "http://gahub.qijihezi.cn/outlink/others/UbisoftConnectInstaller.exe \u2022 http://zb1.baidu581.com/zhuobiao2/?nid=63047\\r\\nConnection: [location]",
        "ELF:Mirai-TO\\ [Trj] UCH/PU_Log_ID/Locked_Scr [168.200.5.63] || http://itsupport.uchealth.org/ ||  [Trj] http://itsupport.uchealth.org/",
        "Associated w/Apple ID: http://qumoteze.apple-hk.com\tqumoteze.apple-hk.com | 17.253.142.4 | http://identity.appke.com | identity.appke.com",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "savethemalesdenver.com | brasville.com.br?",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "IDS Detections:  busybox MIORI Hackers - Infected System SUSPICIOUS Path to BusyBox",
        "IDS Detections Zusy Variant CnC Checkin",
        "accountchooser.com [malicious remote drive by] pop up covers screen, chooses from listed acompromised phone | no click |",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "https://www.starbucks.com.cn/mobile-view/en/help/terms/digital-starbucks-rewards-kit?supportTel=fals \u2022 https://u.ysepay.com:8288/MobileGate/login.do",
        "www.proxydocker.com Yvmc.org is hosted in United States ip detail \u00c9tats Unis (US) , (Aurora , Colorado ) links to network IP address: 168.200.5.63",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "https://www.red-gate.com/products/smartassembly",
        "freeimdatingsites.thomasdobo.eu",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "Associated w/Apple ID: http://www.ripmixburn.com/| www.ripmixburn.com | 17.253.142.4 | http://www.qttv.net |www.qttv.net | 17.253.142.4",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Trojan:Win32/Mydoom | apple.com | IP Address 17.253.144.10: Yara Detections EnigmaProtector ,  xor_0x8_This_program Alerts network_bind persistence_autorun antivm_generic_diskreg",
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "168.200.5.0/24: Autonomous System Number :18693 ||  Autonomous System Label UCH-CENTRAL Regional Internet Registry: ARIN: Country US",
        "IDS Signatures: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\t192.168.122.30\t104.18.12.173",
        "http://girlsandtheir.webcam/&_=1678440394065 | http://girlsandtheir.webcam/&_=1678605911170 | http://girlsandtheir.webcam/&_=1678901115584",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "IP: 198.185.159.144 Backdoor:Linux/Mirai.B || TELPER:HSTR:DotCisOffer || TrojanSpy:Win32/Nivdort || Bladabindi || TrojanDownloader:Win32/Bulilit",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com",
        "www.socialimages.reputationdatabase.com",
        "ET WORM TheMoon.linksys.router",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "genealogytrails.com",
        "Basic Properties Regional Internet Registry ARIN   Country US   Continent NA Whois Lookup NetRange: 168.200.0.0 - 168.200.255.255 US",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "103.233.208.9                    (CNC IP)",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "ELF:Mirai-TO\\ [Trj] tulach.cc",
        "ELF:Mirai-TO\\ [Trj] 12.111.210.191 |  United States of America ASN AS7018 att services inc",
        "114.80.179.242 \u2022 61.170.80.193 [malware hosting]",
        "http://mobtrack.trkclk.net",
        "photos.theleders.family",
        "http://girlsandtheir.webcam/&_=1727668914786 | http://girlsandtheir.webcam/&_=1727684361432 | http://girlsandtheir.webcam/&_=1678620676912",
        "Computer Forensics Malware Analysis Digital Investigations | www.forensickb.com |",
        "http://www.beneat.cn/mobile/room/index \u2022 http://www.beneat.cn/mobile/user/cate  \u2022 http://www.tabxexplorer.com/channel/Commonapi?pid",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "apex.jquery.com             (scammer | works for who?)",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Lance Mueller Photography Artistic Portraiture || Domains || lancemueller.com/https://www.lancemueller.com/ www.instagram.com",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "apple.ios-slgn-in.com \u2022 appleid.com \u2022 apple.com  \u2022 http://apple.ddianle.com \u2022 http://write.52toolbox.com/cms/privacy_policy_lenovo.html",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "Tracking: trackite.com \u2022 track.beanstalkdata.com \u2022 http://tracking.butterflymx.com/ls/click?upn= \u2022 sonymobilemail.com \u2022 connect.grovelfun.com",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "OTX Alerts: cape_extracted_content \u2022 infostealer_cookies \u2022 recon_fingerprint \u2022 suricata_alert \u2022 anomalous_deletefile dead_connect \u2022dynamic_function_loading ipc_namedpipe powershell_download createtoolhelp32snapshot_module_enumeration reads_self antidebug_ntsetinformationthread injection_rwx network_http",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "IDS Detections: Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) FormBook CnC Checkin (GET)",
        "chatluongvn.tk - use of targeted surveillance intended to spy on members of civil society, suppress dissent, crime victims & monitor journalists.",
        "Win.Malware.Midie-9950743-0: Domains Contacted instagram.com github.com icloud.com python.org facebook.com",
        "girlsandtheir.webcam - suspicious_write_exe network_icmp infostealer_keylogger process_martian injection_resumethread | parkingcrew.net  ns2.parkingcrew.net",
        "Has been present throughout a specific campaign",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "http://www.tabxexplorer.com/lenovo",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "OTX Alerts: procmem_yara injection_inter_process \u2022 ransomware_file_modifications \u2022 stack_pivot stealth_file antiav_detectfile \u2022 deletes_self",
        "http://girlsandtheir.webcam/&_=167922487756 | http://girlsandtheir.webcam/&_=1678764409894 | http://girlsandtheir.webcam/&_=1679002803910",
        "IDS Detections: busybox MIORI Hackers - Possible Brute Force Attack Bad Login",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "Crypt3.BWVY \u00bb forums.girlsandtheir.webcam | http://girlsandtheir.webcam/&_=1642807476815 | http://girlsandtheir.webcam/&_=1677944772349",
        "dns.google                          (DNS client services - Doug Cole)",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "https://therahand.com",
        "Win.Malware.Midie Alerts: antisandbox_unhook infostealer_cookies  deletes_executed_files infostealer_bitcoin injection_createremotethread",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "api.useragentswitch.com",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "http://desk.52toolbox.com/cms/agreement_lenovo.html \u2022 http://chat.52toolbox.com/cms/agreement_lenovo.html \u2022 www.tabxexplorer.com",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Mirai",
        "Title The page title. Chieti Meteo - Webcam Abruzzo",
        "Associated w.Apple ID: 17.253.142.4 | https://qumoteze.apple-hk.com | http://applegiftcard.apple/ | https://identity.appke.com",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "http://serafinipelletteria.it/riparazioni/13-borse-restauro/22-spy-bag-%C3%83%C2%A2%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9C-fend",
        "Registry:   Read - DisableUserModeCallbackFilter",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "AS24961 MyLoc Managed IT AG",
        "apple-dns.net",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "Address 198.185.159.144 ,  198.185.159.145 ,  198.49.23.144 ,  198.49.23.145",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "Final URL contacted when you try to visit the URL under study, after any potential redirects. https://www.chietimeteo.it/webcamabruzzo.htm Serving IP Address: 89.46.110.55",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Win.Malware.Midie-9950743-0: Domains Contacted microsoft.com dropbox.com twitter.com sendspace.com etrade.com",
        "Win.Malware.Midie-9950743-0 Apple IP 17.253.144.10: SHA256 8b3170934dd8efaf4335f752d4a1a1816f8be3cdba963d897b93f308fa4ab644",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "emails.redvue.com  (apple DNS w/amvima)",
        "nr-data.net",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "webcam.sopris.net || https://www.chietimeteo.it/webcamabruzzo.htm savethemalesdenver.com",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "CIDR: 168.200.0.0/16 NetName: UCH NetHandle: NET-168-200-0-0-1 Parent: NET168 (NET-168-0-0-0-0) NetType: Direct Allocation Organization: University of Colorado Hospital (UCHA) RegDate: 1994-06-22 Updated: 2021-12-14 Ref: https://rdap.arin.net/registry/ip/168.200.0.0 OrgName: University of Colorado Hospital OrgId: UCHA Address: 13001 East 17th Place Address: UH Fitzsimons bldg 500 5th floor east Address: Information Services City: Aurora StateProv: CO PostalCode: 80045-0505 Country:",
        "Associated w/Apple ID: 17.253.142.4 |\thttp://xn--8mrw5wsjh2jt.top | xn--8mrw5wsjh2jt.top | 17.253.142.4 | https://www.qttv.net | www.qttv.net",
        "Multiple remotewd remotewd.com [DGA domain name changed, moved still active as]",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "https://urlscan.io/domain/maxwam.tk",
        "TCP SYN packets were observed",
        "Yara Detections: is__elf",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "https://download.tenorshare.cn/go/reiboot-for-android_2420.exe?track[banner]=home&track[mobilebanner]=ferragosto20220719&track[tslateset]=undefined&track[w]=3840&track[h]=220?linksource&track[utm_source]=awin&track[utm_medium]=affiliate&track[utm_term]=213429&track[awc]=18616_1659086165_ce9efdb1e9f159a1234acd82324b61a8&track[realMedium]=affiliate&track[cross_end_id]=-LyP4be7B42T9sbA&track[type]=2&track[page]=https://www.tenorshare.cn/guide/ios-system-recovery.html&track[sid]=118",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "http://tracks.theleders.family",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
        "Win.Malware.Midie Alerts: injection_inter_process injection_create_remote_thread antisandbox_sleep persistence_autorun browser_security",
        "IDS Detections: Win32.Renos/Artro Trojan Checkin M1 Fakealert.ATQ/Renos.GNC Checkin AlphaCrypt CnC Beacon 5 Win32.Meredrop Checkin",
        "BinBusyBox: 0x.un5t48l3.host",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "http://www.beneat.cn/mobile/index/index \u2022 http://www.beneat.cn/mobile/index/startAdv \u2022 http://www.beneat.cn/mobile/live/index",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256. 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "Win.Packed.Enigma-10023199-0: FileHash - SHA256 2753cb6cd4b034d91a1361d5d4f643e3f45abbe249a1563e2e3bf6e7b6001cd3",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "142.250.180.4 (init.ess)",
        "Stack pivoting was detected when using a critical API",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "busybox MIORI Hackers",
            "NSO Pegasus"
          ],
          "malware_families": [
            "Darkcomet",
            "Pegasus",
            "Trojan:win32/emotet.arj!mtb",
            "Virtool:win32/obfuscator.ki",
            "Artro",
            "Trojanspy",
            "!autoit_3_00_third_party",
            "States",
            "Spyfu",
            "Elf:mirai-gh\\ [trj]",
            "Beach research",
            "Elf:gafgyt-dz\\ [trj]",
            "Trojanspy:win32/nivdort",
            "Win.malware.midie-9950743-0",
            "#lowfi:hstr:autoititv3modguidmark",
            "Win.trojan.agent-306281",
            "Et",
            "Win.malware.generickdz-9982080-0",
            "Maltiverse",
            "Other malware",
            "Mirai",
            "Alf:e5",
            "Generic",
            "Elf:mirai-to\\ [trj]",
            "Backdoor:win32/bladabindi",
            "Backdoor:linux/mirai.b",
            "Unix.trojan.mirai-5607483-0",
            "Win.malware.autoit-7732194-0",
            "Gamehack",
            "Win.trojan.vb-83922",
            "Trojandownloader:win32/bulilit",
            "Fakeav.for",
            "Win32:malob-db\\ [cryp]",
            "Trojan:win32/zusy",
            "Nids",
            "Formbook",
            "Webtoolbar",
            "Telper:hstr:dotcisoffer",
            "Virtool:win32/vbinject.gen!jb",
            "Win.trojan.barys-10005825-0",
            "Unix.trojan.mirai-7646352-0"
          ],
          "industries": [
            "Telecommunications",
            "Technology",
            "Civil society"
          ],
          "unique_indicators": 101482
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/bootstrapcdn.com",
    "whois": "http://whois.domaintools.com/bootstrapcdn.com",
    "domain": "bootstrapcdn.com",
    "hostname": "maxcdn.bootstrapcdn.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 12,
  "pulses": [
    {
      "id": "698e906da16336f8e87c3b90",
      "name": "CoinHive Clone ",
      "description": "",
      "modified": "2026-03-27T00:30:39.055000",
      "created": "2026-02-13T02:46:05.544000",
      "tags": [
        "united",
        "td tr",
        "a domains",
        "history group",
        "state",
        "b td",
        "present sep",
        "find",
        "alabama",
        "iowa",
        "apache",
        "content type",
        "passive dns",
        "meta http",
        "content",
        "gmt server",
        "pragma",
        "title",
        "linksys eseries",
        "device rce",
        "inbound",
        "et exploit",
        "attempt",
        "et webserver",
        "suspicious user",
        "user agent",
        "et worm",
        "policy python",
        "python",
        "agent",
        "generic",
        "malware",
        "nids",
        "dst_ip",
        "\"sid\": 2017515,",
        "2020/08/23",
        "dst_port\": 8080",
        "suricata",
        "network_icmp",
        "tcp_syn_scan",
        "unix",
        "mirai",
        "infection",
        "port 8080",
        "aitm",
        "mitm",
        "xfinity",
        "lumen backbone",
        "xfinity cf",
        "et info",
        "useragent",
        "webserver",
        "android",
        "linux",
        "statistically stripped",
        "local",
        "Jefferson County",
        "Colorado",
        "State",
        "is__elf",
        "is__war",
        "cyber warfare",
        "marking",
        "targeting",
        "stalking",
        "impersonating",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "mitre att",
        "ck matrix",
        "february",
        "hybrid",
        "general",
        "path",
        "encrypt",
        "click",
        "strings",
        "attack",
        "ssl certificate",
        "ascii text",
        "dynamicloader",
        "yara rule",
        "ff d5",
        "medium",
        "high",
        "eb d8",
        "f0 ff",
        "ff bb",
        "host",
        "unknown",
        "explorer",
        "virtool",
        "write",
        "next",
        "Douglas County",
        "Michael Roberts",
        "Brian Sabey",
        "Chris\u2019Buzz\u2019 Ahmann",
        "Mirai BotMaster",
        "file type",
        "pexe",
        "pe32",
        "intel",
        "ms windows",
        "date march",
        "am size",
        "imphash",
        "otx logo",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "moved",
        "urls",
        "expiration date",
        "all hostname",
        "files",
        "media",
        "present feb",
        "present jan",
        "present dec",
        "present nov",
        "ip address",
        "present",
        "codex",
        "sf.net",
        "next associated",
        "ipv4 add",
        "location united",
        "america flag",
        "spawns",
        "found",
        "t1480 execution",
        "pattern match",
        "present aug",
        "search",
        "name servers",
        "showing",
        "record value",
        "meta",
        "accept",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "denver",
        "yandex",
        "post",
        "entries",
        "post http",
        "show",
        "post liquor",
        "execution",
        "port",
        "destination",
        "icmp traffic",
        "dns query",
        "include",
        "top source"
      ],
      "references": [
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "genealogytrails.com",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "Has been present throughout a specific campaign",
        "Mirai",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "TCP SYN packets were observed",
        "ET WORM TheMoon.linksys.router",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-7646352-0",
          "display_name": "Unix.Trojan.Mirai-7646352-0",
          "target": null
        },
        {
          "id": "SpyFu",
          "display_name": "SpyFu",
          "target": null
        },
        {
          "id": "Win.Trojan.VB-83922",
          "display_name": "Win.Trojan.VB-83922",
          "target": null
        },
        {
          "id": "virtool:Win32/VBInject.gen!JB",
          "display_name": "virtool:Win32/VBInject.gen!JB",
          "target": "/malware/virtool:Win32/VBInject.gen!JB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "698966742c9fd9691396bb3a",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5836,
        "domain": 857,
        "FileHash-MD5": 185,
        "FileHash-SHA1": 147,
        "hostname": 1842,
        "email": 7,
        "FileHash-SHA256": 947,
        "CVE": 43,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 9872,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "23 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "698966742c9fd9691396bb3a",
      "name": "CoinHive In-Browser Miner | ET EXPLOIT Linksys E-Series Device RCE Attempt via \u2018AI chat\u2019  Xfinity Commercial Fleet vehicle parked /AITM",
      "description": "Merits further research. Work no is consistent with a man advocate named Michael\nRoberts of Rexxfield and Miles2/ Mile2 / seen frequently in attacks against females | targeted individual apparently was using an AI browser search when a keyword triggered glitches.\nSearch of a URL\ntarget has never heard of or seen found in device search results. Targets device injected, Mirai botnet found, Other suspicious findings. TBConrinued..:.\n[OTX. Auto populated Significantly more details have been revealed about the GoDaddy.com domain, which has been listed as an unregistered domain by the Internet Service Authority (icann). and its users are not allowed to use it.] #man_jn_tve_midxle #drive_ by_compromise #injection.",
      "modified": "2026-03-11T04:02:50.189000",
      "created": "2026-02-09T04:45:40.250000",
      "tags": [
        "united",
        "td tr",
        "a domains",
        "history group",
        "state",
        "b td",
        "present sep",
        "find",
        "alabama",
        "iowa",
        "apache",
        "content type",
        "passive dns",
        "meta http",
        "content",
        "gmt server",
        "pragma",
        "title",
        "linksys eseries",
        "device rce",
        "inbound",
        "et exploit",
        "attempt",
        "et webserver",
        "suspicious user",
        "user agent",
        "et worm",
        "policy python",
        "python",
        "agent",
        "generic",
        "malware",
        "nids",
        "dst_ip",
        "\"sid\": 2017515,",
        "2020/08/23",
        "dst_port\": 8080",
        "suricata",
        "network_icmp",
        "tcp_syn_scan",
        "unix",
        "mirai",
        "infection",
        "port 8080",
        "aitm",
        "mitm",
        "xfinity",
        "lumen backbone",
        "xfinity cf",
        "et info",
        "useragent",
        "webserver",
        "android",
        "linux",
        "statistically stripped",
        "local",
        "Jefferson County",
        "Colorado",
        "State",
        "is__elf",
        "is__war",
        "cyber warfare",
        "marking",
        "targeting",
        "stalking",
        "impersonating",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "initial access",
        "defense evasion",
        "mitre att",
        "ck matrix",
        "february",
        "hybrid",
        "general",
        "path",
        "encrypt",
        "click",
        "strings",
        "attack",
        "ssl certificate",
        "ascii text",
        "dynamicloader",
        "yara rule",
        "ff d5",
        "medium",
        "high",
        "eb d8",
        "f0 ff",
        "ff bb",
        "host",
        "unknown",
        "explorer",
        "virtool",
        "write",
        "next",
        "Douglas County",
        "Michael Roberts",
        "Brian Sabey",
        "Chris\u2019Buzz\u2019 Ahmann",
        "Mirai BotMaster",
        "file type",
        "pexe",
        "pe32",
        "intel",
        "ms windows",
        "date march",
        "am size",
        "imphash",
        "otx logo",
        "all filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "moved",
        "urls",
        "expiration date",
        "all hostname",
        "files",
        "media",
        "present feb",
        "present jan",
        "present dec",
        "present nov",
        "ip address",
        "present",
        "codex",
        "sf.net",
        "next associated",
        "ipv4 add",
        "location united",
        "america flag",
        "spawns",
        "found",
        "t1480 execution",
        "pattern match",
        "present aug",
        "search",
        "name servers",
        "showing",
        "record value",
        "meta",
        "accept",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "denver",
        "yandex",
        "post",
        "entries",
        "post http",
        "show",
        "post liquor",
        "execution",
        "port",
        "destination",
        "icmp traffic",
        "dns query",
        "include",
        "top source"
      ],
      "references": [
        "https://genealogytrails.com/njer/morris/mortality_records.html#:~:text=From%20a%20summary%20statement%2C%20in",
        "genealogytrails.com",
        "It appears to be consistent with AI / SpyFu Michael Roberts | Rexxfield| Mikes IT",
        "Has been present throughout a specific campaign",
        "Mirai",
        "IDS Detections TheMoon.linksys.router 2 Linksys E-Series Device RCE Attempt",
        "IDS: Linksys E-Series Device RCE Attempt Outbound Possible HTTP 403 XSS",
        "IDS: Attempt (Local Source) 401TRG Generic Webshell Request - POST with wget in body Python Requests",
        "IDS: Suspicious User Agent WebShell Generic - wget http - POST User-Agent (python-requests)",
        "IDS: Inbound to Webserver CoinHive In-Browser Miner Detected 403 Forbidden",
        "ET INFO User-Agent (python-requests) Inbound to Webserver",
        "Suspicious User Agent | ETPRO POLICY Python Requests",
        "src_ip\": 192.168.122.51 | dst_ip\": 219.91.207.105",
        "\u201cNIDS_exploit_alert\" network_icmp\tGenerates some ICMP traffic\t High {   \"families\": [],   \"description\": \"Generates some ICMP traffic\",   \"severity\": 4,",
        "TCP SYN packets were observed",
        "ET WORM TheMoon.linksys.router",
        "ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound",
        "\"ET WEB_SERVER WebShell Generic - wget http - POST",
        "Yara Detections: SUSP_ELF_LNX_UPX_Compressed_File ,  is__elf ,  UPXProtectorv10x2 ,  UPX",
        "Alerts: dead_host nids_exploit_alert network_icmp tcp_syn_scan nolookup_communication",
        "Alerts: network_cnc_http network_http network_http_post nids_alert p2p_cnc",
        "Alerts: writes_to_stdout  android ,  win32 exe ,  key identifier ,  win32 dll ,  x509v3 subject",
        "File Type: ELF - ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked stripped:",
        "upx.sf.net Malformed domain IPv4 172.67.240.47 In CDN range: provider=cloudflare\t  IPv4",
        "192.168.122.51 Private IP Address\t  MD5 d41d8cd98f00b204e9800998ecf8427e Empty hash of type MD5\t  SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Empty hash of type SHA1\t  URL http://upx.sf.net",
        "Win.Trojan.VB-83922 ,  VirTool:Win32/VBInject.gen!JB",
        "IDS Detections: Win32/Esfury.T Connectivity Check (sstatic1.histats.com) Win32.VBKrypt.xiz",
        "IDS: Checkin Win32.VBKrypt.xiz Checkin 2 Win32/Esfury.T Checkin",
        "Yara Detections: UPX ,  LZMA ,  UPX_OEP_place ,  UPX293300LZMAMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser",
        "Alerts: infostealer_cookies injection_network_traffic injection_write_exe_process",
        "Alerts: multiple_useragents persistence_autorun procmem_yara suricata_alert",
        "Alerts: antivm_bochs_keys physical_drive_access bypass_firewall disables_folder_options",
        "Alerts: disables_run_command disables_uac injection_runpe modify_hostfile modify_uac_prompt persistence_ifeo stealth_hidden_extension stealth_hiddenreg anomalous_deletefile ..",
        "IP\u2019s Contacted:  142.251.9.94  104.21.69.250  104.21.61.138  172.237.146.8  34.41.139.193",
        "IPs Contacted:  149.56.240.31  172.66.136.209",
        "Domains Contacted: c.statcounter.com sstatic1.histats.com",
        "Domains Contacted: 54b73b3059myg2kta72weplb2a2uvd.ipcheker.com",
        "Domains Contacted: rk1pjif98b4r7zed28hle47wdlw9rm.ipgreat.com",
        "Domains Contacted: a2ex04689txl10z.directorio-w.com www.directorio-w.com",
        "Domains Contacted. xz4i2o3m7456n7nwd4757wgfta3it7.ipcheker.com",
        "Domains Contacted: b0h4f160dzkk7hgn65038eb73erxd8.ipgreat.com",
        "Domains Contacted: l545ds1s2d6v8wxts6pz75835j5hj4.ipcheker.com",
        "Domains Contacted: wv001gdb6n084bc533j7pf6043xg2v.ipgreat.com",
        "Hostname ios.chimney-se.cloud.farmerswife.com  \u2022 ios.vsila.cloud.farmerswife.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-7646352-0",
          "display_name": "Unix.Trojan.Mirai-7646352-0",
          "target": null
        },
        {
          "id": "SpyFu",
          "display_name": "SpyFu",
          "target": null
        },
        {
          "id": "Win.Trojan.VB-83922",
          "display_name": "Win.Trojan.VB-83922",
          "target": null
        },
        {
          "id": "virtool:Win32/VBInject.gen!JB",
          "display_name": "virtool:Win32/VBInject.gen!JB",
          "target": "/malware/virtool:Win32/VBInject.gen!JB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1562.003",
          "name": "Impair Command History Logging",
          "display_name": "T1562.003 - Impair Command History Logging"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1608.004",
          "name": "Drive-by Target",
          "display_name": "T1608.004 - Drive-by Target"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5779,
        "domain": 730,
        "FileHash-MD5": 185,
        "FileHash-SHA1": 147,
        "hostname": 1790,
        "email": 5,
        "FileHash-SHA256": 947,
        "CVE": 3,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 9594,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "39 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6951f52a5af00a9be445ad41",
      "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
      "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
      "modified": "2026-01-28T02:03:16.337000",
      "created": "2025-12-29T03:27:38.183000",
      "tags": [
        "no expiration",
        "expiration",
        "url http",
        "url https",
        "iocs",
        "enter source",
        "url or",
        "name servers",
        "a domains",
        "accept encoding",
        "urls",
        "emails",
        "servers",
        "url add",
        "http",
        "files domain",
        "files related",
        "related tags",
        "united",
        "gmt contenttype",
        "ipv4 add",
        "url analysis",
        "files",
        "present dec",
        "cname",
        "virtool",
        "cryp",
        "ip address",
        "trojan",
        "win32",
        "therahand",
        "jeffrey reimer",
        "reimer  dpt",
        "msie",
        "chrome",
        "unknown ns",
        "unknown cname",
        "record value",
        "accept",
        "encrypt",
        "passive dns",
        "moved",
        "wp engine",
        "meta",
        "wordpress",
        "pegasus",
        "america flag",
        "america asn",
        "reverse dns",
        "flag",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "analysis",
        "tor analysis",
        "dns requests",
        "united states",
        "hostname",
        "pulse submit",
        "domain",
        "files ip",
        "eva lisa",
        "eva reimer",
        "all ipv4",
        "dynamic_content",
        "fingerprinting",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "status",
        "hostname add",
        "evasion",
        "proximity",
        "pulse pulses",
        "address",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "command",
        "initial access",
        "spawns",
        "present mar",
        "present jun",
        "title",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "data recovery",
        "ms windows",
        "process32nextw",
        "intel",
        "pe32",
        "format",
        "mozilla",
        "installcapital",
        "generic",
        "write",
        "unknown",
        "malware",
        "next",
        "installer",
        "template",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "script script",
        "pragma",
        "port",
        "destination",
        "binbusybox",
        "high",
        "post",
        "icmp traffic",
        "dns query",
        "newstatusurl",
        "mirai",
        "prefetch8",
        "ck matrix",
        "localappdata",
        "info",
        "ssl certificate",
        "czech republic",
        "prefetch1",
        "prefetch2",
        "israel israel",
        "analysis tip",
        "href",
        "ascii text",
        "null",
        "refresh",
        "span",
        "iframe",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "beginstring",
        "windir",
        "openurl c",
        "programfiles",
        "related nids",
        "files location",
        "flag united",
        "dynamicloader",
        "medium",
        "named pipe",
        "win64",
        "download",
        "delphi",
        "smartassembly",
        "m. brian sabey",
        "quasi government",
        "no such agency",
        "facebook",
        "search",
        "date",
        "showing",
        "ukraine",
        "\u2018buzz\u2019",
        "alex karp",
        "peter theil",
        "elon musk",
        "ff d5",
        "yara rule",
        "ee fc",
        "generic http",
        "exe upload",
        "f0 ff",
        "eb e1",
        "ff bb",
        "show process",
        "sha1",
        "sub domain",
        "show technique",
        "network traffic",
        "class",
        "starfield",
        "cyber crime",
        "yara detections",
        "top source",
        "top destination",
        "source source",
        "filehash",
        "sha256 add",
        "av detections",
        "ids detections",
        "alerts",
        "show",
        "dock",
        "execution",
        "present feb",
        "value",
        "content type",
        "mirai",
        "sha256",
        "body",
        "gmt content",
        "ddos",
        "mtb sep",
        "hosting",
        "domain robot",
        "expiration date",
        "welcome",
        "apple",
        "christopher p. ahmann",
        "tsara",
        "monitored target",
        "github https",
        "github",
        "smart assembly",
        "red hat",
        "hackers",
        "google"
      ],
      "references": [
        "https://therahand.com",
        "www.socialimages.reputationdatabase.com",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "BinBusyBox: 0x.un5t48l3.host",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "AS24961 MyLoc Managed IT AG",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://www.red-gate.com/products/smartassembly",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
      ],
      "public": 1,
      "adversary": "NSO Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-306281",
          "display_name": "Win.Trojan.Agent-306281",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.KI",
          "display_name": "VirTool:Win32/Obfuscator.KI",
          "target": "/malware/VirTool:Win32/Obfuscator.KI"
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "ELF:Gafgyt-DZ\\ [Trj]",
          "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-5607483-0",
          "display_name": "Unix.Trojan.Mirai-5607483-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1036.005",
          "name": "Match Legitimate Name or Location",
          "display_name": "T1036.005 - Match Legitimate Name or Location"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 523,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 2165,
        "URL": 4953,
        "domain": 1118,
        "hostname": 1951,
        "email": 12,
        "SSLCertFingerprint": 52,
        "CVE": 2
      },
      "indicator_count": 11178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "81 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "688b0fbceab364a2b84b1124",
      "name": "Busybox MIORI Hackers - ongoing  Aurora , Medical Campus -Mirai [by scoreblue -Team 8]",
      "description": "",
      "modified": "2025-07-31T06:39:56.204000",
      "created": "2025-07-31T06:39:56.204000",
      "tags": [
        "idnischdr http",
        "computer",
        "america asn",
        "as7018 att",
        "url https",
        "america",
        "united states",
        "united",
        "germany",
        "italy",
        "trojan",
        "all scoreblue",
        "report spam",
        "created",
        "trojanspy",
        "worm",
        "trojanclicker",
        "virtool",
        "service",
        "all search",
        "author avatar",
        "miori hackers",
        "file score",
        "detections elf",
        "path",
        "busybox busybox",
        "brute force",
        "attack bad",
        "login yara",
        "detections",
        "sid name",
        "malware cve",
        "suspicious path",
        "busybox",
        "activity",
        "system",
        "malware beacon",
        "bad login",
        "attack",
        "port",
        "destination",
        "show",
        "search",
        "exif data",
        "property value",
        "elf info",
        "key value",
        "x86 baddr",
        "elf64 crypto",
        "final url",
        "ip address",
        "status code",
        "body",
        "kb body",
        "sha256",
        "server",
        "gmt connection",
        "date sun",
        "gmt contenttype",
        "filehashsha256",
        "crazy doll",
        "next",
        "key identifier",
        "x509v3 subject",
        "data",
        "v3 serial",
        "number",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "cus stcolorado",
        "info",
        "director",
        "orgtechhandle",
        "orgtechref",
        "university",
        "whois lookup",
        "netrange",
        "nethandle",
        "net168",
        "net1680000",
        "ucha",
        "network",
        "registry arin",
        "country us",
        "continent na",
        "meta",
        "script script",
        "lance mueller",
        "mueller",
        "unknown",
        "script urls",
        "photography",
        "passive dns",
        "urls",
        "model",
        "creation date",
        "hostname",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "status",
        "http",
        "record value",
        "emails",
        "dnssec",
        "domain name",
        "backdoor",
        "bad request",
        "entries",
        "title style",
        "f2f2f2 color",
        "helvetica neue",
        "exploit",
        "browse scan",
        "endpoints all",
        "search otx",
        "related pulses",
        "file samples",
        "files matching",
        "as44273 host",
        "showing",
        "telper",
        "date hash",
        "copyright",
        "url http",
        "win64",
        "as53665 bodis",
        "aaaa",
        "as206834 team",
        "canada unknown",
        "read c",
        "create c",
        "write c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "delete c",
        "dock",
        "write",
        "execution",
        "copy",
        "xport",
        "1575038779",
        "medium",
        "capture",
        "malware",
        "february",
        "as61969 team",
        "servers",
        "domain robot",
        "expiration date",
        "as714 apple",
        "as42 woodynet",
        "nxdomain",
        "name servers",
        "a nxdomain",
        "ipv4",
        "found",
        "control",
        "content type",
        "as20940",
        "asnone united",
        "as701 verizon",
        "as2914 ntt",
        "win32",
        "certificate",
        "date",
        "dynamicloader",
        "high",
        "t1055",
        "attempts",
        "yara detections",
        "bitcoinaltcoin",
        "code injection",
        "high defense",
        "ip related",
        "pulses otx",
        "pulses",
        "overview domain",
        "files ip",
        "address domain",
        "related tags",
        "pulse pulses",
        "div div",
        "as49505",
        "span",
        "form",
        "as6185 apple",
        "china",
        "as4812 china",
        "as17816 china",
        "as4134 chinanet",
        "scan endpoints",
        "trojan features",
        "enigmaprotector",
        "dynamic",
        "powershell",
        "filehash",
        "for privacy",
        "ltd dba",
        "com laude",
        "cname",
        "cve20170147 sep",
        "verdict",
        "as63949 linode",
        "https",
        "as8075",
        "united kingdom",
        "whitelisted",
        "as25825",
        "moved",
        "aurora",
        "redacted for",
        "whois lookups",
        "orgid",
        "east",
        "seen",
        "update date",
        "cidr",
        "netname uch",
        "parent net168",
        "nettype direct",
        "contacted",
        "tulach",
        "brian sabey"
      ],
      "references": [
        "ELF:Mirai-TO\\ [Trj] UCH/PU_Log_ID/Locked_Scr [168.200.5.63] || http://itsupport.uchealth.org/ ||  [Trj] http://itsupport.uchealth.org/",
        "ELF:Mirai-TO\\ [Trj] 12.111.210.191 |  United States of America ASN AS7018 att services inc",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256. 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "ELF:Mirai-TO\\ [Trj] tulach.cc",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "IDS Detections:  busybox MIORI Hackers - Infected System SUSPICIOUS Path to BusyBox",
        "IDS Detections: busybox MIORI Hackers - Possible Brute Force Attack Bad Login",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "Yara Detections: is__elf",
        "168.200.5.0/24: Autonomous System Number :18693 ||  Autonomous System Label UCH-CENTRAL Regional Internet Registry: ARIN: Country US",
        "www.proxydocker.com Yvmc.org is hosted in United States ip detail \u00c9tats Unis (US) , (Aurora , Colorado ) links to network IP address: 168.200.5.63",
        "Computer Forensics Malware Analysis Digital Investigations | www.forensickb.com |",
        "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "webcam.sopris.net || https://www.chietimeteo.it/webcamabruzzo.htm savethemalesdenver.com",
        "girlsandtheir.webcam - suspicious_write_exe network_icmp infostealer_keylogger process_martian injection_resumethread | parkingcrew.net  ns2.parkingcrew.net",
        "http://serafinipelletteria.it/riparazioni/13-borse-restauro/22-spy-bag-%C3%83%C2%A2%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9C-fend",
        "Title The page title. Chieti Meteo - Webcam Abruzzo",
        "Final URL contacted when you try to visit the URL under study, after any potential redirects. https://www.chietimeteo.it/webcamabruzzo.htm Serving IP Address: 89.46.110.55",
        "savethemalesdenver.com | brasville.com.br?",
        "168.200.45.168 Original IP- UCHealth is jacking accounts | University of Colorado Hospital Scot.MacCabe@uchealth.org",
        "Basic Properties Regional Internet Registry ARIN   Country US   Continent NA Whois Lookup NetRange: 168.200.0.0 - 168.200.255.255 US",
        "CIDR: 168.200.0.0/16 NetName: UCH NetHandle: NET-168-200-0-0-1 Parent: NET168 (NET-168-0-0-0-0) NetType: Direct Allocation Organization: University of Colorado Hospital (UCHA) RegDate: 1994-06-22 Updated: 2021-12-14 Ref: https://rdap.arin.net/registry/ip/168.200.0.0 OrgName: University of Colorado Hospital OrgId: UCHA Address: 13001 East 17th Place Address: UH Fitzsimons bldg 500 5th floor east Address: Information Services City: Aurora StateProv: CO PostalCode: 80045-0505 Country:",
        "Address 198.185.159.144 ,  198.185.159.145 ,  198.49.23.144 ,  198.49.23.145",
        "Lance Mueller Photography Artistic Portraiture || Domains || lancemueller.com/https://www.lancemueller.com/ www.instagram.com",
        "IP: 198.185.159.144 Backdoor:Linux/Mirai.B || TELPER:HSTR:DotCisOffer || TrojanSpy:Win32/Nivdort || Bladabindi || TrojanDownloader:Win32/Bulilit",
        "IDS Detections: Win32.Renos/Artro Trojan Checkin M1 Fakealert.ATQ/Renos.GNC Checkin AlphaCrypt CnC Beacon 5 Win32.Meredrop Checkin",
        "IDS Detections: CryptoWall Check-in Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 6 Koobface HTTP Request",
        "IDS Detections: Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) FormBook CnC Checkin (GET)",
        "Crypt3.BWVY \u00bb forums.girlsandtheir.webcam | http://girlsandtheir.webcam/&_=1642807476815 | http://girlsandtheir.webcam/&_=1677944772349",
        "http://girlsandtheir.webcam/&_=1678440394065 | http://girlsandtheir.webcam/&_=1678605911170 | http://girlsandtheir.webcam/&_=1678901115584",
        "http://girlsandtheir.webcam/&_=1727668914786 | http://girlsandtheir.webcam/&_=1727684361432 | http://girlsandtheir.webcam/&_=1678620676912",
        "http://girlsandtheir.webcam/&_=167922487756 | http://girlsandtheir.webcam/&_=1678764409894 | http://girlsandtheir.webcam/&_=1679002803910",
        "http://girlsandtheir.webcam/&_=1679275226198 | http://girlsandtheir.webcam/&_=1679338009770| http://girlsandtheir.webcam/&_=1679628920449 No Expira http://girlsandtheir.webcam/&_=1727448919580\t  | http://girlsandtheir.webcam/&_=1727487291351 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727511329381 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727586798507 | http://girlsandtheir.webcam/&_=1727595333556  | http://girlsandtheir.webcam/&_=1727665483552",
        "chatluongvn.tk - use of targeted surveillance intended to spy on members of civil society, suppress dissent, crime victims & monitor journalists.",
        "Apple ID: 17.253.142.4 | Reverse DNS www.applesports.webcam",
        "Associated w/Apple ID: http://www.ripmixburn.com/| www.ripmixburn.com | 17.253.142.4 | http://www.qttv.net |www.qttv.net | 17.253.142.4",
        "Associated w/Apple ID: http://qumoteze.apple-hk.com\tqumoteze.apple-hk.com | 17.253.142.4 | http://identity.appke.com | identity.appke.com",
        "Associated w/Apple ID: 17.253.142.4 |\thttp://xn--8mrw5wsjh2jt.top | xn--8mrw5wsjh2jt.top | 17.253.142.4 | https://www.qttv.net | www.qttv.net",
        "Associated w.Apple ID: 17.253.142.4 | https://qumoteze.apple-hk.com | http://applegiftcard.apple/ | https://identity.appke.com",
        "Win.Packed.Enigma-10023199-0: FileHash - SHA256 2753cb6cd4b034d91a1361d5d4f643e3f45abbe249a1563e2e3bf6e7b6001cd3",
        "Trojan:Win32/Mydoom | apple.com | IP Address 17.253.144.10: Yara Detections EnigmaProtector ,  xor_0x8_This_program Alerts network_bind persistence_autorun antivm_generic_diskreg",
        "Win.Malware.Midie-9950743-0 Apple IP 17.253.144.10: SHA256 8b3170934dd8efaf4335f752d4a1a1816f8be3cdba963d897b93f308fa4ab644",
        "Win.Malware.Midie Alerts: injection_inter_process injection_create_remote_thread antisandbox_sleep persistence_autorun browser_security",
        "Win.Malware.Midie Alerts: antisandbox_unhook infostealer_cookies  deletes_executed_files infostealer_bitcoin injection_createremotethread",
        "Win.Malware.Midie-9950743-0: Domains Contacted microsoft.com dropbox.com twitter.com sendspace.com etrade.com",
        "Win.Malware.Midie-9950743-0: Domains Contacted instagram.com github.com icloud.com python.org facebook.com"
      ],
      "public": 1,
      "adversary": "busybox MIORI Hackers",
      "targeted_countries": [
        "United States of America",
        "Mexico"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Bulilit",
          "display_name": "TrojanDownloader:Win32/Bulilit",
          "target": "/malware/TrojanDownloader:Win32/Bulilit"
        },
        {
          "id": "ELF:Mirai-TO\\ [Trj]",
          "display_name": "ELF:Mirai-TO\\ [Trj]",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.B",
          "display_name": "Backdoor:Linux/Mirai.B",
          "target": "/malware/Backdoor:Linux/Mirai.B"
        },
        {
          "id": "TELPER:HSTR:DotCisOffer",
          "display_name": "TELPER:HSTR:DotCisOffer",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Backdoor:Win32/Bladabindi",
          "display_name": "Backdoor:Win32/Bladabindi",
          "target": "/malware/Backdoor:Win32/Bladabindi"
        },
        {
          "id": "ALF:E5",
          "display_name": "ALF:E5",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-9950743-0",
          "display_name": "Win.Malware.Midie-9950743-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.ARJ!MTB",
          "display_name": "Trojan:Win32/Emotet.ARJ!MTB",
          "target": "/malware/Trojan:Win32/Emotet.ARJ!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "66fb3c4e8a2593134641f3c0",
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 459,
        "FileHash-MD5": 1228,
        "FileHash-SHA1": 1163,
        "FileHash-SHA256": 2243,
        "domain": 876,
        "hostname": 1088,
        "CIDR": 2,
        "email": 17,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 7083,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "262 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66fc29a49b5ac693c8d75122",
      "name": "Medical Campus - Aurora, Co | Recheck",
      "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
      "modified": "2024-10-31T16:03:52.240000",
      "created": "2024-10-01T16:56:04.004000",
      "tags": [
        "united",
        "as397240",
        "search",
        "showing",
        "as54113",
        "as397241",
        "unknown",
        "moved",
        "creation date",
        "record value",
        "next",
        "date",
        "body",
        "a domains",
        "passive dns",
        "formbook cnc",
        "checkin",
        "entries",
        "github pages",
        "sea x",
        "accept",
        "status",
        "name servers",
        "certificate",
        "urls",
        "aaaa",
        "cname",
        "meta",
        "whitelisted ip",
        "address",
        "location united",
        "asn as36459",
        "github",
        "less whois",
        "registrar",
        "markmonitor",
        "related tags",
        "as36459",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "files",
        "ninite",
        "expiration date",
        "domain",
        "hostname",
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "document file",
        "v2 document",
        "utf8",
        "crlf line",
        "beginstring",
        "size",
        "null",
        "hybrid",
        "refresh",
        "span",
        "local",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "contact",
        "url https",
        "tulach type",
        "role title",
        "added active",
        "pulses url",
        "url http",
        "nextc type",
        "type indicator",
        "related pulses",
        "filehashsha256",
        "copyright",
        "ipv6",
        "germany",
        "italy",
        "trojan",
        "trojanspy",
        "worm",
        "trojanclicker",
        "virtool",
        "service",
        "linux x8664",
        "khtml",
        "gecko",
        "veryhigh",
        "redirect",
        "httpsupgrades",
        "collisionbox",
        "runner",
        "gameoverpanel",
        "trex",
        "orgtechhandle",
        "orgtechref",
        "director",
        "university",
        "nethandle",
        "net168",
        "net1680000",
        "ucha",
        "orgid",
        "east",
        "report spam",
        "as8075",
        "servers",
        "secure server",
        "error all",
        "typeof",
        "error f",
        "crazy doll",
        "created",
        "filehashmd5",
        "types of",
        "russia",
        "emotet type",
        "mirai type",
        "mirai",
        "mtb description",
        "win32 type",
        "as31034 aruba",
        "italy unknown",
        "as19527 google",
        "encrypt",
        "health type",
        "miori hackers",
        "brute force",
        "backdoor",
        "aurora",
        "ip address",
        "path",
        "unis",
        "dotcisoffer",
        "bladabindi",
        "artro",
        "script urls",
        "as46606",
        "brazil unknown",
        "as11284",
        "as10906",
        "apache",
        "lanc type",
        "telper",
        "win32",
        "win64",
        "pulses email",
        "as9009 m247",
        "as7296 alchemy",
        "as14061",
        "as16276",
        "trojandropper",
        "ransom",
        "mtb sep",
        "msie",
        "chrome",
        "ip check",
        "gmt content",
        "pulse submit",
        "url analysis",
        "files ip",
        "aaaa nxdomain",
        "nxdomain",
        "a nxdomain",
        "as22612",
        "dnssec",
        "meta http",
        "accept encoding",
        "request id",
        "united kingdom",
        "div div",
        "arial helvetica",
        "emails",
        "as15169 google",
        "cryp",
        "gmt cache",
        "sameorigin",
        "domain name",
        "code",
        "false",
        "command type",
        "roleselfservice",
        "mcig sep",
        "all search",
        "author avatar",
        "days ago",
        "http",
        "related nids",
        "files location",
        "as30081",
        "gmt contenttype",
        "mozilla",
        "as15133 verizon",
        "whitelisted",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "softcnapp",
        "overview ip",
        "flag united",
        "files related",
        "as62597 nsone",
        "as31898 oracle",
        "mtb aug",
        "class",
        "twitter",
        "april",
        "secure",
        "httponly",
        "expiresthu",
        "pragma",
        "as13414 twitter",
        "smoke loader",
        "reverse dns",
        "asnone united",
        "idlogin sep",
        "uid38009",
        "expiration",
        "hack type",
        "porn type"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Aruba"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3850,
        "FileHash-MD5": 6012,
        "FileHash-SHA1": 5906,
        "domain": 3329,
        "email": 33,
        "hostname": 4231,
        "CVE": 2,
        "FileHash-SHA256": 8407,
        "CIDR": 2,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 31779,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 233,
      "modified_text": "535 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66fb3c4e8a2593134641f3c0",
      "name": "busybox MIORI Hackers - attack Aurora, Medical Campus -Mirai",
      "description": "*Tipped-Patient reports computers with fully locked screens log in every time she enters a room at UC Health Anshutz Campus. Unauthorized Login: http://ITSupport.UCHealth.org. Graphs deleted from Virus Total\u00bbLogin ID: 168.200.45.168 [bound]. I've tried to post pulse multiple times. IP's were contacted. Brute force attempts on my device. Anyway it's Tulach. There is a 'pro- ale' and other 'monitoring, silencing, dangerous groups'  silencing crime victims, journalists, dissents, potential whistle blowers. One victim attacked physically losing health battle. Doctors unwilling to treat.Auto populated\u00bb The full text of the Mirai-TO malware, which was launched on Friday, has now been published on the website of www.forensickb.co.uk..com. hmmm...there was a counter attack.",
      "modified": "2024-10-30T22:04:06.705000",
      "created": "2024-10-01T00:03:26.199000",
      "tags": [
        "idnischdr http",
        "computer",
        "america asn",
        "as7018 att",
        "url https",
        "america",
        "united states",
        "united",
        "germany",
        "italy",
        "trojan",
        "all scoreblue",
        "report spam",
        "created",
        "trojanspy",
        "worm",
        "trojanclicker",
        "virtool",
        "service",
        "all search",
        "author avatar",
        "miori hackers",
        "file score",
        "detections elf",
        "path",
        "busybox busybox",
        "brute force",
        "attack bad",
        "login yara",
        "detections",
        "sid name",
        "malware cve",
        "suspicious path",
        "busybox",
        "activity",
        "system",
        "malware beacon",
        "bad login",
        "attack",
        "port",
        "destination",
        "show",
        "search",
        "exif data",
        "property value",
        "elf info",
        "key value",
        "x86 baddr",
        "elf64 crypto",
        "final url",
        "ip address",
        "status code",
        "body",
        "kb body",
        "sha256",
        "server",
        "gmt connection",
        "date sun",
        "gmt contenttype",
        "filehashsha256",
        "crazy doll",
        "next",
        "key identifier",
        "x509v3 subject",
        "data",
        "v3 serial",
        "number",
        "cgb stgreater",
        "cnsectigo rsa",
        "secure server",
        "ca validity",
        "cus stcolorado",
        "info",
        "director",
        "orgtechhandle",
        "orgtechref",
        "university",
        "whois lookup",
        "netrange",
        "nethandle",
        "net168",
        "net1680000",
        "ucha",
        "network",
        "registry arin",
        "country us",
        "continent na",
        "meta",
        "script script",
        "lance mueller",
        "mueller",
        "unknown",
        "script urls",
        "photography",
        "passive dns",
        "urls",
        "model",
        "creation date",
        "hostname",
        "pulse submit",
        "url analysis",
        "files",
        "domain",
        "status",
        "http",
        "record value",
        "emails",
        "dnssec",
        "domain name",
        "backdoor",
        "bad request",
        "entries",
        "title style",
        "f2f2f2 color",
        "helvetica neue",
        "exploit",
        "browse scan",
        "endpoints all",
        "search otx",
        "related pulses",
        "file samples",
        "files matching",
        "as44273 host",
        "showing",
        "telper",
        "date hash",
        "copyright",
        "url http",
        "win64",
        "as53665 bodis",
        "aaaa",
        "as206834 team",
        "canada unknown",
        "read c",
        "create c",
        "write c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "delete c",
        "dock",
        "write",
        "execution",
        "copy",
        "xport",
        "1575038779",
        "medium",
        "capture",
        "malware",
        "february",
        "as61969 team",
        "servers",
        "domain robot",
        "expiration date",
        "as714 apple",
        "as42 woodynet",
        "nxdomain",
        "name servers",
        "a nxdomain",
        "ipv4",
        "found",
        "control",
        "content type",
        "as20940",
        "asnone united",
        "as701 verizon",
        "as2914 ntt",
        "win32",
        "certificate",
        "date",
        "dynamicloader",
        "high",
        "t1055",
        "attempts",
        "yara detections",
        "bitcoinaltcoin",
        "code injection",
        "high defense",
        "ip related",
        "pulses otx",
        "pulses",
        "overview domain",
        "files ip",
        "address domain",
        "related tags",
        "pulse pulses",
        "div div",
        "as49505",
        "span",
        "form",
        "as6185 apple",
        "china",
        "as4812 china",
        "as17816 china",
        "as4134 chinanet",
        "scan endpoints",
        "trojan features",
        "enigmaprotector",
        "dynamic",
        "powershell",
        "filehash",
        "for privacy",
        "ltd dba",
        "com laude",
        "cname",
        "cve20170147 sep",
        "verdict",
        "as63949 linode",
        "https",
        "as8075",
        "united kingdom",
        "whitelisted",
        "as25825",
        "moved",
        "aurora",
        "redacted for",
        "whois lookups",
        "orgid",
        "east",
        "seen",
        "update date",
        "cidr",
        "netname uch",
        "parent net168",
        "nettype direct",
        "contacted",
        "tulach",
        "brian sabey"
      ],
      "references": [
        "ELF:Mirai-TO\\ [Trj] UCH/PU_Log_ID/Locked_Scr [168.200.5.63] || http://itsupport.uchealth.org/ ||  [Trj] http://itsupport.uchealth.org/",
        "ELF:Mirai-TO\\ [Trj] 12.111.210.191 |  United States of America ASN AS7018 att services inc",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256. 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "ELF:Mirai-TO\\ [Trj] tulach.cc",
        "ELF:Mirai-TO\\ [Trj] FileHash-SHA256 09c0d1671fd9da396c13456d552a884a582aa194c8739a97ee18928c001bbbca",
        "IDS Detections:  busybox MIORI Hackers - Infected System SUSPICIOUS Path to BusyBox",
        "IDS Detections: busybox MIORI Hackers - Possible Brute Force Attack Bad Login",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "Yara Detections: is__elf",
        "168.200.5.0/24: Autonomous System Number :18693 ||  Autonomous System Label UCH-CENTRAL Regional Internet Registry: ARIN: Country US",
        "www.proxydocker.com Yvmc.org is hosted in United States ip detail \u00c9tats Unis (US) , (Aurora , Colorado ) links to network IP address: 168.200.5.63",
        "Computer Forensics Malware Analysis Digital Investigations | www.forensickb.com |",
        "https://otx.alienvault.com/otxapi/indicators/url/screenshot/http://www.forensickb.com/2013/03/file-entropy-explained.html",
        "webcam.sopris.net || https://www.chietimeteo.it/webcamabruzzo.htm savethemalesdenver.com",
        "girlsandtheir.webcam - suspicious_write_exe network_icmp infostealer_keylogger process_martian injection_resumethread | parkingcrew.net  ns2.parkingcrew.net",
        "http://serafinipelletteria.it/riparazioni/13-borse-restauro/22-spy-bag-%C3%83%C2%A2%C3%A2%C2%82%C2%AC%C3%A2%C2%80%C2%9C-fend",
        "Title The page title. Chieti Meteo - Webcam Abruzzo",
        "Final URL contacted when you try to visit the URL under study, after any potential redirects. https://www.chietimeteo.it/webcamabruzzo.htm Serving IP Address: 89.46.110.55",
        "savethemalesdenver.com | brasville.com.br?",
        "168.200.45.168 Original IP- UCHealth is jacking accounts | University of Colorado Hospital Scot.MacCabe@uchealth.org",
        "Basic Properties Regional Internet Registry ARIN   Country US   Continent NA Whois Lookup NetRange: 168.200.0.0 - 168.200.255.255 US",
        "CIDR: 168.200.0.0/16 NetName: UCH NetHandle: NET-168-200-0-0-1 Parent: NET168 (NET-168-0-0-0-0) NetType: Direct Allocation Organization: University of Colorado Hospital (UCHA) RegDate: 1994-06-22 Updated: 2021-12-14 Ref: https://rdap.arin.net/registry/ip/168.200.0.0 OrgName: University of Colorado Hospital OrgId: UCHA Address: 13001 East 17th Place Address: UH Fitzsimons bldg 500 5th floor east Address: Information Services City: Aurora StateProv: CO PostalCode: 80045-0505 Country:",
        "Address 198.185.159.144 ,  198.185.159.145 ,  198.49.23.144 ,  198.49.23.145",
        "Lance Mueller Photography Artistic Portraiture || Domains || lancemueller.com/https://www.lancemueller.com/ www.instagram.com",
        "IP: 198.185.159.144 Backdoor:Linux/Mirai.B || TELPER:HSTR:DotCisOffer || TrojanSpy:Win32/Nivdort || Bladabindi || TrojanDownloader:Win32/Bulilit",
        "IDS Detections: Win32.Renos/Artro Trojan Checkin M1 Fakealert.ATQ/Renos.GNC Checkin AlphaCrypt CnC Beacon 5 Win32.Meredrop Checkin",
        "IDS Detections: CryptoWall Check-in Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 6 Koobface HTTP Request",
        "IDS Detections: Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative) FormBook CnC Checkin (GET)",
        "Crypt3.BWVY \u00bb forums.girlsandtheir.webcam | http://girlsandtheir.webcam/&_=1642807476815 | http://girlsandtheir.webcam/&_=1677944772349",
        "http://girlsandtheir.webcam/&_=1678440394065 | http://girlsandtheir.webcam/&_=1678605911170 | http://girlsandtheir.webcam/&_=1678901115584",
        "http://girlsandtheir.webcam/&_=1727668914786 | http://girlsandtheir.webcam/&_=1727684361432 | http://girlsandtheir.webcam/&_=1678620676912",
        "http://girlsandtheir.webcam/&_=167922487756 | http://girlsandtheir.webcam/&_=1678764409894 | http://girlsandtheir.webcam/&_=1679002803910",
        "http://girlsandtheir.webcam/&_=1679275226198 | http://girlsandtheir.webcam/&_=1679338009770| http://girlsandtheir.webcam/&_=1679628920449 No Expira http://girlsandtheir.webcam/&_=1727448919580\t  | http://girlsandtheir.webcam/&_=1727487291351 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727511329381 No Expiration\t0\t  URL http://girlsandtheir.webcam/&_=1727586798507 | http://girlsandtheir.webcam/&_=1727595333556  | http://girlsandtheir.webcam/&_=1727665483552",
        "chatluongvn.tk - use of targeted surveillance intended to spy on members of civil society, suppress dissent, crime victims & monitor journalists.",
        "Apple ID: 17.253.142.4 | Reverse DNS www.applesports.webcam",
        "Associated w/Apple ID: http://www.ripmixburn.com/| www.ripmixburn.com | 17.253.142.4 | http://www.qttv.net |www.qttv.net | 17.253.142.4",
        "Associated w/Apple ID: http://qumoteze.apple-hk.com\tqumoteze.apple-hk.com | 17.253.142.4 | http://identity.appke.com | identity.appke.com",
        "Associated w/Apple ID: 17.253.142.4 |\thttp://xn--8mrw5wsjh2jt.top | xn--8mrw5wsjh2jt.top | 17.253.142.4 | https://www.qttv.net | www.qttv.net",
        "Associated w.Apple ID: 17.253.142.4 | https://qumoteze.apple-hk.com | http://applegiftcard.apple/ | https://identity.appke.com",
        "Win.Packed.Enigma-10023199-0: FileHash - SHA256 2753cb6cd4b034d91a1361d5d4f643e3f45abbe249a1563e2e3bf6e7b6001cd3",
        "Trojan:Win32/Mydoom | apple.com | IP Address 17.253.144.10: Yara Detections EnigmaProtector ,  xor_0x8_This_program Alerts network_bind persistence_autorun antivm_generic_diskreg",
        "Win.Malware.Midie-9950743-0 Apple IP 17.253.144.10: SHA256 8b3170934dd8efaf4335f752d4a1a1816f8be3cdba963d897b93f308fa4ab644",
        "Win.Malware.Midie Alerts: injection_inter_process injection_create_remote_thread antisandbox_sleep persistence_autorun browser_security",
        "Win.Malware.Midie Alerts: antisandbox_unhook infostealer_cookies  deletes_executed_files infostealer_bitcoin injection_createremotethread",
        "Win.Malware.Midie-9950743-0: Domains Contacted microsoft.com dropbox.com twitter.com sendspace.com etrade.com",
        "Win.Malware.Midie-9950743-0: Domains Contacted instagram.com github.com icloud.com python.org facebook.com"
      ],
      "public": 1,
      "adversary": "busybox MIORI Hackers",
      "targeted_countries": [
        "United States of America",
        "Mexico"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Bulilit",
          "display_name": "TrojanDownloader:Win32/Bulilit",
          "target": "/malware/TrojanDownloader:Win32/Bulilit"
        },
        {
          "id": "ELF:Mirai-TO\\ [Trj]",
          "display_name": "ELF:Mirai-TO\\ [Trj]",
          "target": null
        },
        {
          "id": "Backdoor:Linux/Mirai.B",
          "display_name": "Backdoor:Linux/Mirai.B",
          "target": "/malware/Backdoor:Linux/Mirai.B"
        },
        {
          "id": "TELPER:HSTR:DotCisOffer",
          "display_name": "TELPER:HSTR:DotCisOffer",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Backdoor:Win32/Bladabindi",
          "display_name": "Backdoor:Win32/Bladabindi",
          "target": "/malware/Backdoor:Win32/Bladabindi"
        },
        {
          "id": "ALF:E5",
          "display_name": "ALF:E5",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-9950743-0",
          "display_name": "Win.Malware.Midie-9950743-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.ARJ!MTB",
          "display_name": "Trojan:Win32/Emotet.ARJ!MTB",
          "target": "/malware/Trojan:Win32/Emotet.ARJ!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 459,
        "FileHash-MD5": 1228,
        "FileHash-SHA1": 1163,
        "FileHash-SHA256": 2243,
        "domain": 876,
        "hostname": 1088,
        "CIDR": 2,
        "email": 17,
        "CVE": 2,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 7083,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "535 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f38d1b2e4ef8d8db533d36",
      "name": "FormBook - moa.moe ??? Pegasus & Brian Sabey Related",
      "description": "",
      "modified": "2024-10-25T03:00:50.871000",
      "created": "2024-09-25T04:10:03.211000",
      "tags": [
        "as54113",
        "united",
        "a domains",
        "passive dns",
        "unknown",
        "mtb sep",
        "github pages",
        "request id",
        "sea x",
        "twitter",
        "accept",
        "status",
        "cookie",
        "search",
        "certificate",
        "record value",
        "showing",
        "as8075",
        "aaaa",
        "asnone united",
        "yara detections",
        "trojan",
        "show",
        "all scoreblue",
        "av detections",
        "ids detections",
        "body",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "request",
        "urls",
        "443 ma2592000",
        "encrypt",
        "germany unknown",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "ipv4",
        "main",
        "name servers",
        "redacted for",
        "for privacy",
        "servers",
        "meta",
        "homemakers",
        "as212222",
        "script domains",
        "script urls",
        "diy artikelen",
        "zo bieden",
        "class",
        "customer",
        "as16276",
        "canada unknown",
        "sigattr",
        "formbook cnc",
        "checkin",
        "win32",
        "entries",
        "bootasep apr",
        "alerts",
        "read",
        "write",
        "delete",
        "top source",
        "files",
        "location united",
        "creation date",
        "domain",
        "emails",
        "expiration date",
        "next",
        "ovhcloud meta",
        "cname",
        "as36459",
        "whitelisted ip",
        "address",
        "asn as36459",
        "registrar",
        "markmonitor",
        "related tags",
        "france unknown",
        "moved",
        "setcookie",
        "gmt contenttype",
        "refloadapihash",
        "france",
        "nxdomain",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "error",
        "backend",
        "as40065",
        "china unknown",
        "deleted site",
        "atom",
        "record type",
        "ttl value",
        "as174 cogent",
        "pulse submit",
        "url analysis",
        "hostname",
        "as64050 bgpnet",
        "x9875 x9762",
        "gmt max",
        "httponly",
        "hong kong",
        "taiwan unknown",
        "china asn",
        "server",
        "privacy tech",
        "privacy admin",
        "registrar abuse",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "data",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cnr3",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "ec oid",
        "dns replication",
        "algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "first",
        "enom"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "China",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4675,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 623,
        "FileHash-MD5": 760,
        "FileHash-SHA1": 794,
        "FileHash-SHA256": 3406,
        "domain": 1633,
        "hostname": 1037,
        "email": 17,
        "CVE": 1
      },
      "indicator_count": 8271,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "541 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aafd0e93efa420f74123c",
      "name": "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
      "description": "",
      "modified": "2024-10-12T01:00:47.836000",
      "created": "2023-12-02T04:17:20.189000",
      "tags": [
        "ssl certificate",
        "contacted",
        "threat roundup",
        "whois record",
        "communicating",
        "subdomains",
        "resolutions",
        "june",
        "july",
        "october",
        "august",
        "noname057",
        "generic malware",
        "ice fog",
        "tag count",
        "thu nov",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "generic",
        "detection list",
        "blacklist http",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "safe site",
        "million",
        "malware",
        "alexa",
        "malware site",
        "malicious site",
        "unsafe",
        "artemis",
        "fakealert",
        "exploit",
        "opencandy",
        "riskware",
        "genkryptik",
        "iframe",
        "tiggre",
        "presenoker",
        "agent",
        "conduit",
        "wacatac",
        "phishing",
        "redline stealer",
        "dropper",
        "cobalt strike",
        "acint",
        "nircmd",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "crack",
        "filetour",
        "cleaner",
        "installpack",
        "xrat",
        "fusioncore",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "blacknet rat",
        "stealer",
        "maltiverse",
        "webtoolbar",
        "trojanspy",
        "united",
        "engineering",
        "cyber threat",
        "phishing site",
        "america",
        "emotet",
        "zbot",
        "malicious",
        "steam",
        "team",
        "indonesia",
        "miner",
        "ransomware",
        "ramnit",
        "pe resource",
        "historical ssl",
        "execution",
        "hacktool",
        "metasploit",
        "relic",
        "monitoring",
        "android",
        "skynet",
        "et",
        "anonymizer",
        "trojanx",
        "back",
        "laplasclipper",
        "win64",
        "trojan",
        "ghost rat",
        "suppobox",
        "asyncrat",
        "union",
        "samples",
        "blacklist",
        "malicious url",
        "hostname",
        "hostnames",
        "tsara brashears",
        "reinsurance",
        "pinnacol insurance",
        "industry and commerce",
        "state",
        "danger",
        "warning",
        "nr-data.net",
        "apple",
        "data.net",
        "asp.net",
        "domains",
        "hashes",
        "reverse dns",
        "general full",
        "resource",
        "software",
        "asn15169",
        "google",
        "url http",
        "server",
        "hash",
        "get h2",
        "main",
        "cookie",
        "thu dec",
        "germany",
        "frankfurt",
        "netherlands",
        "asn20446",
        "highwinds3",
        "page url",
        "search live",
        "api blog",
        "docs pricing",
        "tags",
        "november",
        "us summary",
        "http",
        "google safe",
        "browsing",
        "adware",
        "xtrat",
        "firehol",
        "microsoft",
        "control server",
        "services",
        "msil",
        "hiloti",
        "asn16509",
        "amazon02",
        "fastly",
        "asn54113",
        "prague",
        "login",
        "listen live",
        "centura health",
        "colorado jobs",
        "eeo public",
        "filing url",
        "blacklist https",
        "mimikatz",
        "beach research",
        "de indicators",
        "copyright",
        "gmbh version",
        "follow",
        "softcnapp",
        "philadelphia",
        "gamehack",
        "value",
        "line",
        "variables",
        "nreum",
        "postrelease",
        "url https",
        "security tls",
        "protocol h2",
        "name value",
        "scam",
        "gesponsert url",
        "outputldjh",
        "oid2",
        "uhis2",
        "uh1200",
        "uw1600",
        "uah1200",
        "uaw1600",
        "ucd24",
        "usd1",
        "utz60",
        "no data",
        "coinminer",
        "ip address",
        "exchange",
        "http attacker",
        "states",
        "jimburkedentistry",
        "leder-family",
        "adam lee",
        "erika lee",
        "malvertizing"
      ],
      "references": [
        "http://maxwam.tk/news/top-stories/widow-penalized-for-late-husband-s-legal-marijuana-use/769762335",
        "https://www.denverpost.com/2018/07/17/marijuana-workers-compensation/amp/ Source",
        "http://jcsservices.in/gkqikjxn/index.php?pnz=jim@thejimburkefamily.com",
        "http://www.burkedentistry.com/Quarryville-Dentist-and-Staff/1567",
        "http://tracks.theleders.family",
        "photos.theleders.family",
        "http://45.159.189.105/bot/regex      (tracks Tsara Brashears)",
        "45.159.189.105                   (CNC IP \u2022 Tracking Tsara Brashears)",
        "http://mobtrack.trkclk.net",
        "https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "nr-data.net",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "103.233.208.9                    (CNC IP)",
        "apex.jquery.com             (scammer | works for who?)",
        "api.useragentswitch.com",
        "bam-cell.nr-data.net        (Apple Private Data Collection | since found, result continuously modified)",
        "dns.google                          (DNS client services - Doug Cole)",
        "https://www.9and10news.com/2021/09/17/fbi-releases-update-on-suspicious-packages-left-at-att-stores/",
        "https://api.openinstall.io/api/v2/android/otby76/init?certFinger=44:B4:38:61:15:B4:57:55:B5:BF:D1:6B:34:CC:60:72:DA:C7:40:CE&macAddress=6D:51:08:93:04:7B&serialNumber=&apiVersion=2.3.0&deviceId=&pkg=com.mobikok.ecoupon&version=8.1.0&installId=&androidId=91ed20d90734918e&versionCode=333\u00d7tamp=1684541379839",
        "apple-dns.net",
        "emails.redvue.com  (apple DNS w/amvima)",
        "142.250.180.4 (init.ess)",
        "init.ess.apple.com   (Highly malicious. Will infiltrate devices when exploited. Spyware)",
        "freeimdatingsites.thomasdobo.eu",
        "https://urlscan.io/result/07fe876e-8864-474f-8b32-ba2d50c9a242/#indicators",
        "https://urlscan.io/domain/maxwam.tk",
        "https://urlscan.io/result/e770a861-9818-4309-b31e-fd18510532a7/#indicators"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "States",
          "display_name": "States",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6562908e28e6cdc237fbf8db",
      "export_count": 107,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1956,
        "FileHash-SHA1": 867,
        "FileHash-SHA256": 3895,
        "URL": 11195,
        "domain": 2959,
        "hostname": 3575,
        "CVE": 16,
        "SSLCertFingerprint": 1,
        "email": 1
      },
      "indicator_count": 24465,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "554 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e24b157718e7ddf71765db",
      "name": "Lenovo Tablet K series  Remotely Connects & controls Devices",
      "description": "Lenovo K series Tablet resource used to connect to thermostat devices and develops full CnC of victims network. All types of malicious abuses from dumping to spyware, tracking, enabling device features, listening to room. Creates zombie devices. Zusy: Man-in-the-middle attacks, injection, stealer.\n | AutoIt_3_00_Third_Party: treat actors dependent on various environments to load maware, when exploited, user interface , scripting, malicious activity possible by hidden users",
      "modified": "2024-03-31T15:02:37.900000",
      "created": "2024-03-01T21:39:33.521000",
      "tags": [
        "url http",
        "search",
        "lenovo type",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "status",
        "united",
        "unknown",
        "creation date",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "date",
        "next",
        "meta",
        "tabx explorer",
        "urls",
        "hichina",
        "record value",
        "entries",
        "explorer",
        "target",
        "china unknown",
        "as4812 china",
        "as58461",
        "as4808 china",
        "smartchat",
        "vary",
        "accept encoding",
        "ipv4",
        "pulse submit",
        "dns replication",
        "as4837 china",
        "aaaa",
        "as9808 china",
        "whitelisted",
        "nxdomain",
        "as56047 china",
        "as58542 tianjij",
        "ns nxdomain",
        "body",
        "pe32",
        "intel",
        "ms windows",
        "windows activex",
        "control panel",
        "item",
        "win16 ne",
        "pe32 compiler",
        "exe32",
        "compiler",
        "javascript",
        "win32 exe",
        "kb file",
        "files",
        "file type",
        "javascript code",
        "windows",
        "text",
        "web open",
        "font format",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "connection",
        "date fri",
        "contacted",
        "whois record",
        "pe resource",
        "execution",
        "communicating",
        "siblings",
        "referrer",
        "whois whois",
        "bundled",
        "resolutions",
        "contacted urls",
        "siblings domain",
        "parent domain",
        "ssl certificate",
        "historical ssl",
        "whois domain",
        "set cookie",
        "gmt path",
        "url analysis",
        "find",
        "service",
        "as15169 google",
        "as9009 m247",
        "as14061",
        "as16276",
        "name servers",
        "alienvault",
        "open threat",
        "yara rule",
        "high",
        "show",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "accept",
        "copy",
        "write",
        "pecompact",
        "february",
        "packer",
        "delphi",
        "win32",
        "malware",
        "zusy",
        "local",
        "json",
        "delete c",
        "ascii text",
        "suspicious",
        "cookie",
        "jpeg image",
        "exif standard",
        "tiff image",
        "autoit",
        "markus",
        "april",
        "dropper",
        "default",
        "delete",
        "switch",
        "as20940",
        "dynamicloader",
        "medium",
        "http",
        "write c",
        "ciphersuite",
        "a li",
        "amazon ses",
        "moved",
        "pepo campaigns",
        "advanced email",
        "twitter",
        "span",
        "servers",
        "authority",
        "win32upatre feb",
        "artro",
        "apple",
        "typosquatting",
        "botnet",
        "network",
        "advertising botnet",
        "adware",
        "mining",
        "spyware",
        "cnc",
        "mbs"
      ],
      "references": [
        "http://www.tabxexplorer.com/lenovo",
        "114.80.179.242 \u2022 61.170.80.193 [malware hosting]",
        "IDS Detections Zusy Variant CnC Checkin",
        "IDS Signatures: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\t192.168.122.30\t104.18.12.173",
        "Registry:   Read - DisableUserModeCallbackFilter",
        "OTX Alerts: procmem_yara injection_inter_process \u2022 ransomware_file_modifications \u2022 stack_pivot stealth_file antiav_detectfile \u2022 deletes_self",
        "OTX Alerts: cape_extracted_content \u2022 infostealer_cookies \u2022 recon_fingerprint \u2022 suricata_alert \u2022 anomalous_deletefile dead_connect \u2022dynamic_function_loading ipc_namedpipe powershell_download createtoolhelp32snapshot_module_enumeration reads_self antidebug_ntsetinformationthread injection_rwx network_http",
        "Stack pivoting was detected when using a critical API",
        "Tracking: trackite.com \u2022 track.beanstalkdata.com \u2022 http://tracking.butterflymx.com/ls/click?upn= \u2022 sonymobilemail.com \u2022 connect.grovelfun.com",
        "apple.ios-slgn-in.com \u2022 appleid.com \u2022 apple.com  \u2022 http://apple.ddianle.com \u2022 http://write.52toolbox.com/cms/privacy_policy_lenovo.html",
        "http://desk.52toolbox.com/cms/agreement_lenovo.html \u2022 http://chat.52toolbox.com/cms/agreement_lenovo.html \u2022 www.tabxexplorer.com",
        "https://www.starbucks.com.cn/mobile-view/en/help/terms/digital-starbucks-rewards-kit?supportTel=fals \u2022 https://u.ysepay.com:8288/MobileGate/login.do",
        "https://download.tenorshare.cn/go/reiboot-for-android_2420.exe?track[banner]=home&track[mobilebanner]=ferragosto20220719&track[tslateset]=undefined&track[w]=3840&track[h]=220?linksource&track[utm_source]=awin&track[utm_medium]=affiliate&track[utm_term]=213429&track[awc]=18616_1659086165_ce9efdb1e9f159a1234acd82324b61a8&track[realMedium]=affiliate&track[cross_end_id]=-LyP4be7B42T9sbA&track[type]=2&track[page]=https://www.tenorshare.cn/guide/ios-system-recovery.html&track[sid]=118",
        "http://www.beneat.cn/mobile/index/index \u2022 http://www.beneat.cn/mobile/index/startAdv \u2022 http://www.beneat.cn/mobile/live/index",
        "http://www.beneat.cn/mobile/room/index \u2022 http://www.beneat.cn/mobile/user/cate  \u2022 http://www.tabxexplorer.com/channel/Commonapi?pid",
        "http://gahub.qijihezi.cn/outlink/others/UbisoftConnectInstaller.exe \u2022 http://zb1.baidu581.com/zhuobiao2/?nid=63047\\r\\nConnection: [location]",
        "accountchooser.com [malicious remote drive by] pop up covers screen, chooses from listed acompromised phone | no click |",
        "Multiple remotewd remotewd.com [DGA domain name changed, moved still active as]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Generickdz-9982080-0",
          "display_name": "Win.Malware.Generickdz-9982080-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zusy",
          "display_name": "Trojan:Win32/Zusy",
          "target": "/malware/Trojan:Win32/Zusy"
        },
        {
          "id": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
          "display_name": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
          "target": null
        },
        {
          "id": "Win.Malware.Autoit-7732194-0",
          "display_name": "Win.Malware.Autoit-7732194-0",
          "target": null
        },
        {
          "id": "DarkComet",
          "display_name": "DarkComet",
          "target": null
        },
        {
          "id": "!AutoIt_3_00_Third_Party",
          "display_name": "!AutoIt_3_00_Third_Party",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1463",
          "name": "Manipulate Device Communication",
          "display_name": "T1463 - Manipulate Device Communication"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1037.003",
          "name": "Network Logon Script",
          "display_name": "T1037.003 - Network Logon Script"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8359,
        "domain": 1687,
        "hostname": 1746,
        "email": 7,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 224,
        "FileHash-SHA256": 1862,
        "CVE": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 14244,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "749 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e24b1cd80668c22e7e1c7a",
      "name": "Lenovo Tablet K series  Remotely Connects & controls Devices",
      "description": "Lenovo K series Tablet resource used to connect to thermostat devices and develops full CnC of victims network. All types of malicious abuses from dumping to spyware, tracking, enabling device features, listening to room. Creates zombie devices. Zusy: Man-in-the-middle attacks, injection, stealer.\n | AutoIt_3_00_Third_Party: treat actors dependent on various environments to load maware, when exploited, user interface , scripting, malicious activity possible by hidden users",
      "modified": "2024-03-31T15:02:37.900000",
      "created": "2024-03-01T21:39:40.078000",
      "tags": [
        "url http",
        "search",
        "lenovo type",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "status",
        "united",
        "unknown",
        "creation date",
        "scan endpoints",
        "all octoseek",
        "domain",
        "pulse pulses",
        "passive dns",
        "date",
        "next",
        "meta",
        "tabx explorer",
        "urls",
        "hichina",
        "record value",
        "entries",
        "explorer",
        "target",
        "china unknown",
        "as4812 china",
        "as58461",
        "as4808 china",
        "smartchat",
        "vary",
        "accept encoding",
        "ipv4",
        "pulse submit",
        "dns replication",
        "as4837 china",
        "aaaa",
        "as9808 china",
        "whitelisted",
        "nxdomain",
        "as56047 china",
        "as58542 tianjij",
        "ns nxdomain",
        "body",
        "pe32",
        "intel",
        "ms windows",
        "windows activex",
        "control panel",
        "item",
        "win16 ne",
        "pe32 compiler",
        "exe32",
        "compiler",
        "javascript",
        "win32 exe",
        "kb file",
        "files",
        "file type",
        "javascript code",
        "windows",
        "text",
        "web open",
        "font format",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "connection",
        "date fri",
        "contacted",
        "whois record",
        "pe resource",
        "execution",
        "communicating",
        "siblings",
        "referrer",
        "whois whois",
        "bundled",
        "resolutions",
        "contacted urls",
        "siblings domain",
        "parent domain",
        "ssl certificate",
        "historical ssl",
        "whois domain",
        "set cookie",
        "gmt path",
        "url analysis",
        "find",
        "service",
        "as15169 google",
        "as9009 m247",
        "as14061",
        "as16276",
        "name servers",
        "alienvault",
        "open threat",
        "yara rule",
        "high",
        "show",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "accept",
        "copy",
        "write",
        "pecompact",
        "february",
        "packer",
        "delphi",
        "win32",
        "malware",
        "zusy",
        "local",
        "json",
        "delete c",
        "ascii text",
        "suspicious",
        "cookie",
        "jpeg image",
        "exif standard",
        "tiff image",
        "autoit",
        "markus",
        "april",
        "dropper",
        "default",
        "delete",
        "switch",
        "as20940",
        "dynamicloader",
        "medium",
        "http",
        "write c",
        "ciphersuite",
        "a li",
        "amazon ses",
        "moved",
        "pepo campaigns",
        "advanced email",
        "twitter",
        "span",
        "servers",
        "authority",
        "win32upatre feb",
        "artro",
        "apple",
        "typosquatting",
        "botnet",
        "network",
        "advertising botnet",
        "adware",
        "mining",
        "spyware",
        "cnc",
        "mbs"
      ],
      "references": [
        "http://www.tabxexplorer.com/lenovo",
        "114.80.179.242 \u2022 61.170.80.193 [malware hosting]",
        "IDS Detections Zusy Variant CnC Checkin",
        "IDS Signatures: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\t192.168.122.30\t104.18.12.173",
        "Registry:   Read - DisableUserModeCallbackFilter",
        "OTX Alerts: procmem_yara injection_inter_process \u2022 ransomware_file_modifications \u2022 stack_pivot stealth_file antiav_detectfile \u2022 deletes_self",
        "OTX Alerts: cape_extracted_content \u2022 infostealer_cookies \u2022 recon_fingerprint \u2022 suricata_alert \u2022 anomalous_deletefile dead_connect \u2022dynamic_function_loading ipc_namedpipe powershell_download createtoolhelp32snapshot_module_enumeration reads_self antidebug_ntsetinformationthread injection_rwx network_http",
        "Stack pivoting was detected when using a critical API",
        "Tracking: trackite.com \u2022 track.beanstalkdata.com \u2022 http://tracking.butterflymx.com/ls/click?upn= \u2022 sonymobilemail.com \u2022 connect.grovelfun.com",
        "apple.ios-slgn-in.com \u2022 appleid.com \u2022 apple.com  \u2022 http://apple.ddianle.com \u2022 http://write.52toolbox.com/cms/privacy_policy_lenovo.html",
        "http://desk.52toolbox.com/cms/agreement_lenovo.html \u2022 http://chat.52toolbox.com/cms/agreement_lenovo.html \u2022 www.tabxexplorer.com",
        "https://www.starbucks.com.cn/mobile-view/en/help/terms/digital-starbucks-rewards-kit?supportTel=fals \u2022 https://u.ysepay.com:8288/MobileGate/login.do",
        "https://download.tenorshare.cn/go/reiboot-for-android_2420.exe?track[banner]=home&track[mobilebanner]=ferragosto20220719&track[tslateset]=undefined&track[w]=3840&track[h]=220?linksource&track[utm_source]=awin&track[utm_medium]=affiliate&track[utm_term]=213429&track[awc]=18616_1659086165_ce9efdb1e9f159a1234acd82324b61a8&track[realMedium]=affiliate&track[cross_end_id]=-LyP4be7B42T9sbA&track[type]=2&track[page]=https://www.tenorshare.cn/guide/ios-system-recovery.html&track[sid]=118",
        "http://www.beneat.cn/mobile/index/index \u2022 http://www.beneat.cn/mobile/index/startAdv \u2022 http://www.beneat.cn/mobile/live/index",
        "http://www.beneat.cn/mobile/room/index \u2022 http://www.beneat.cn/mobile/user/cate  \u2022 http://www.tabxexplorer.com/channel/Commonapi?pid",
        "http://gahub.qijihezi.cn/outlink/others/UbisoftConnectInstaller.exe \u2022 http://zb1.baidu581.com/zhuobiao2/?nid=63047\\r\\nConnection: [location]",
        "accountchooser.com [malicious remote drive by] pop up covers screen, chooses from listed acompromised phone | no click |",
        "Multiple remotewd remotewd.com [DGA domain name changed, moved still active as]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Generickdz-9982080-0",
          "display_name": "Win.Malware.Generickdz-9982080-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zusy",
          "display_name": "Trojan:Win32/Zusy",
          "target": "/malware/Trojan:Win32/Zusy"
        },
        {
          "id": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
          "display_name": "#Lowfi:HSTR:AutoitItV3ModGUIDMark",
          "target": null
        },
        {
          "id": "Win.Malware.Autoit-7732194-0",
          "display_name": "Win.Malware.Autoit-7732194-0",
          "target": null
        },
        {
          "id": "DarkComet",
          "display_name": "DarkComet",
          "target": null
        },
        {
          "id": "!AutoIt_3_00_Third_Party",
          "display_name": "!AutoIt_3_00_Third_Party",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1463",
          "name": "Manipulate Device Communication",
          "display_name": "T1463 - Manipulate Device Communication"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1037.003",
          "name": "Network Logon Script",
          "display_name": "T1037.003 - Network Logon Script"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8359,
        "domain": 1687,
        "hostname": 1746,
        "email": 7,
        "FileHash-MD5": 357,
        "FileHash-SHA1": 224,
        "FileHash-SHA256": 1862,
        "CVE": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 14244,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "749 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776617087.175167
}