{
  "type": "URL",
  "indicator": "https://microsoftonline.cdnsvc.com.lxcvc.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://microsoftonline.cdnsvc.com.lxcvc.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4123952712,
      "indicator": "https://microsoftonline.cdnsvc.com.lxcvc.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 23,
      "pulses": [
        {
          "id": "69aa0a62f94a92b5168405c2",
          "name": "fedpaypal clone Q vashti",
          "description": "",
          "modified": "2026-03-06T06:39:27.872000",
          "created": "2026-03-05T22:57:38.559000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68c5743593a4bcc81dd94b0b",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1323,
            "URL": 4360,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "45 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aa003c63c19b7be7671c65",
          "name": "re post by Q.Vashti cloned",
          "description": "",
          "modified": "2026-03-06T05:11:14.366000",
          "created": "2026-03-05T22:14:20.388000",
          "tags": [
            "filehashmd5",
            "filehashsha256",
            "ipv4",
            "filehashsha1",
            "domain",
            "types",
            "indicators show",
            "search",
            "type indicator",
            "role title",
            "added active",
            "scan",
            "iocs",
            "learn more",
            "related pulses",
            "url https",
            "url http",
            "countrycn",
            "countrycn sep",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "xtblogblockid1",
            "pulses",
            "zdata0",
            "browserie",
            "browserver8",
            "defaultie",
            "ver1360122",
            "defaultch",
            "browserver11",
            "filesize",
            "browserid1",
            "qmark",
            "methodpost"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "68ffa35cd4eefffa0ffbeae1",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 381,
            "FileHash-SHA1": 367,
            "FileHash-SHA256": 767,
            "domain": 179,
            "URL": 1615,
            "hostname": 946,
            "CVE": 1
          },
          "indicator_count": 4256,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "45 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ffa35cd4eefffa0ffbeae1",
          "name": "Liar Liar! If this were your attorney; you\u2019d pay $$$ to get hacked and they\u2019d gain full CnC of your devices and disappear\u2026",
          "description": "Sample of FAKE attorneys  Liar Liar! If this were your attorney; you\u2019d pay $$$ to get hacked, they\u2019d gain full CnC of devices & disappear into the background , stealing from cloud, spying, etc..Mafia & Government ties. https://magento.hirecar.net/\n*Unix.Dropper.Mirai-7338044\n*Virus:Win32/Virut.BO\n*Trojan:Win32/Delf.EM\n*DDoS.XOR\n*Backdoor.Win32.Shiz.ivr, *Backdoor.Win32/Simda.gen!A\n*Alf:HeraklezEval:DoS:Linux/Xorddos!rfn\n*nUFS_html\n*Trojanspy:Win32/Nivdort.CB\n*Win32/Nystprac.A *Ramnit\n*Win32:Sality  *Upatre\n*Possible_QuasarRAT_Payload\nxor_0x15_xord_javascript\ninvalid_trailer_structure\n#fp539598-VBS/LoveLetter.BT\n*Trojanspy:Win32/Nivdort.CB\n*Alf:HeraklezEval:DoS:Linux/Xorddos!rfn\n*Trojan:Win64/Gapro\n\u201cMethodology_RareEquities_Tencent_Proxy\u201d\nvad_contains_network_strings\n*Trojan:Win32/Sisproc!gmb\n*TrojanDownloader:Win32/Upatre\n*PWS:MSIL/Grmasi.YA!MTB\n*Trojan:Win32/Danabot.G\n *Virus:Win32/Virut.EPO\n* Ramnit\nConventionEngine_Term_NewFolder",
          "modified": "2025-11-26T13:01:56.367000",
          "created": "2025-10-27T16:52:44.619000",
          "tags": [
            "filehashmd5",
            "filehashsha256",
            "ipv4",
            "filehashsha1",
            "domain",
            "types",
            "indicators show",
            "search",
            "type indicator",
            "role title",
            "added active",
            "scan",
            "iocs",
            "learn more",
            "related pulses",
            "url https",
            "url http",
            "countrycn",
            "countrycn sep",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "xtblogblockid1",
            "pulses",
            "zdata0",
            "browserie",
            "browserver8",
            "defaultie",
            "ver1360122",
            "defaultch",
            "browserver11",
            "filesize",
            "browserid1",
            "qmark",
            "methodpost"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 381,
            "FileHash-SHA1": 367,
            "FileHash-SHA256": 767,
            "domain": 178,
            "URL": 1615,
            "hostname": 944
          },
          "indicator_count": 4252,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "144 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69069167e1e2a222bd7762f2",
          "name": "Palantir - Spyware",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-11-01T23:01:59.339000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "privacynotacrime",
            "id": "349346",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 57,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a6f4e35193c04401daaf",
          "name": "Emotet & VirTool Obsfuscator - Registrar abuse tracking civilians",
          "description": "",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:54:28.671000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": "68f9a1ef2dd26ec62a3c298c",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9a1ef2dd26ec62a3c298c",
          "name": "Listeners - Malicious Over the top espionage | Cyber Warfare?",
          "description": "Cyber attacks on targeted devices stored safely, separately, don\u2019t communicate with one another. PalantirFoundry.com shares IP addresses with Fastly. South African IP\u2019s and DGA domains bounce from US Denver , Co based IP and Domain addresses. Registrar Abuse: HTTP/2 404 content type: text/html content length: 2263 date: Wed 22 Oct 2025 22:32:18 GMT server: Envoy\n443 Certificate Subject: US\n443 Certificate Subject: Colorado\n443 Certificate Subject: Denver\n443 Certificate Subject: Palantir Technologies Inc.\n443 Certificate Subject: listeners.usw-19.palantirfoundry.com",
          "modified": "2025-11-22T00:01:42.464000",
          "created": "2025-10-23T03:33:03.315000",
          "tags": [
            "url https",
            "url http",
            "hostname",
            "mulweli",
            "mphomafmulweli",
            "indicator role",
            "ipv4",
            "type indicator",
            "added active",
            "related pulses",
            "united",
            "envoy error",
            "certificate",
            "urls",
            "emails",
            "active related",
            "africa",
            "span",
            "gmt server",
            "colorado",
            "denver",
            "palantir",
            "listen",
            "listen linda",
            "linda listen",
            "listeners @ dantesdragon",
            "palantir",
            "all y",
            "se referen",
            "data upload",
            "extraction",
            "extra",
            "referen data",
            "overview domain",
            "passive dns",
            "files ip",
            "address",
            "asn asnone",
            "as14618",
            "all se",
            "include review",
            "exclude sugges",
            "failed",
            "typo",
            "status",
            "search",
            "record value",
            "server",
            "domain status",
            "key identifier",
            "x509v3 subject",
            "full name",
            "registrar abuse",
            "registrar",
            "data",
            "v3 serial",
            "code",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "sha256",
            "united states",
            "power query",
            "microsoft learn",
            "ordenar por",
            "foundry",
            "input",
            "blocked",
            "error id",
            "conector",
            "por ejemplo",
            "sensitive",
            "quickstart",
            "present aug",
            "present oct",
            "unknown ns",
            "showing",
            "present sep",
            "moved",
            "title",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "asnone dns",
            "resolutions",
            "dga domain",
            "ipv4 add",
            "url analysis",
            "name servers",
            "div div",
            "expiration date",
            "page",
            "present nov",
            "present jan",
            "present dec",
            "present mar",
            "present feb",
            "virtool",
            "cryp",
            "error",
            "win32",
            "domain",
            "ip address",
            "domain add",
            "next associated",
            "pulse pulses",
            "ashburn",
            "extr referen",
            "exclude",
            "sugges",
            "pulse submit",
            "date",
            "present jul",
            "present jun",
            "fastly error",
            "please",
            "handle",
            "entity",
            "record type",
            "ttl value",
            "msms93992282",
            "read c",
            "show",
            "medium",
            "tlsv1",
            "whitelisted",
            "module load",
            "t1129",
            "execution",
            "dock",
            "write",
            "persistence",
            "next",
            "unknown",
            "connector",
            "cybercrime",
            "harassment"
          ],
          "references": [
            "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
          ],
          "public": 1,
          "adversary": "Quickstart",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Multiple Malware Attack",
              "display_name": "Multiple Malware Attack",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1211",
              "name": "Exploitation for Defense Evasion",
              "display_name": "T1211 - Exploitation for Defense Evasion"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1027.005",
              "name": "Indicator Removal from Tools",
              "display_name": "T1027.005 - Indicator Removal from Tools"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1132.002",
              "name": "Non-Standard Encoding",
              "display_name": "T1132.002 - Non-Standard Encoding"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            }
          ],
          "industries": [
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2865,
            "URL": 5728,
            "email": 11,
            "FileHash-MD5": 91,
            "FileHash-SHA1": 75,
            "FileHash-SHA256": 1713,
            "domain": 1193,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11679,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 180,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9372439f9a3973097393f",
          "name": "South African actors are criminally insane Palantir product abusers or employees",
          "description": "Attempting to wip disks and delete files. Threat actors nearby. \u2018Endgame\u2019 project typically found alongside Project Hilo , Project Helix , Palantir and Foundry. I\u2019m just researching to solve what I thought would be far less complex issues. Stop doing this. Target rarely left house after contact with \u2018watcher\u2019 \u2018MVA by a young 22 year old male also left victim in fear til the end. \nI\u2019m going to call out on anyone pretending to be some else \u2018stop making contact with targets family and associates.\u2019 No one has been pursued or paid for crimes against target. This needs to end.\n\nSouth African actors are criminally insane Palantir product users or employees \n\n#phishing + malware , dns , file deletion attacks. \n\n[OTX auto populated The following is the full text of Entrust, Inc. - for the use of the terms \"entrust\" and \"sassa.gov.za\" - in terms of terms and conditions. ]\n\nIt makes sense. I\u2019m in town. 5 blocks away heading towards SoBo. Hi! Stop",
          "modified": "2025-11-21T19:01:20.179000",
          "created": "2025-10-22T19:57:24.562000",
          "tags": [
            "passive dns",
            "urls",
            "related nids",
            "files location",
            "south africa",
            "flag south",
            "africa hostname",
            "files domain",
            "files",
            "entrust",
            "mulweli",
            "create c",
            "read c",
            "delete",
            "write",
            "search",
            "show",
            "create",
            "medium",
            "showing",
            "unicode",
            "next",
            "dock",
            "execution",
            "copy",
            "t1199",
            "relationship",
            "t1561",
            "wipe",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "t1056",
            "capture",
            "url https",
            "url http",
            "malware attacks",
            "find encrypted",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "city",
            "county",
            "otx auto",
            "title",
            "net security",
            "tags"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1561",
              "name": "Disk Wipe",
              "display_name": "T1561 - Disk Wipe"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 597,
            "domain": 78,
            "hostname": 270,
            "FileHash-SHA256": 183,
            "FileHash-MD5": 19,
            "FileHash-SHA1": 5
          },
          "indicator_count": 1152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f93b1cebf80f48450bd517",
          "name": "Yuner - File deletion and Disk Wiping / Cyberstalking ",
          "description": "",
          "modified": "2025-11-21T18:02:11.054000",
          "created": "2025-10-22T20:14:20.632000",
          "tags": [
            "server nginx",
            "date fri",
            "etag w",
            "urls",
            "passive dns",
            "acceptranges",
            "contentlength",
            "date thu",
            "gmt expires",
            "server",
            "code",
            "link",
            "script script",
            "south africa",
            "ipv4",
            "files",
            "location south",
            "accept",
            "present aug",
            "certificate",
            "hostname add",
            "domain",
            "files ip",
            "unknown a",
            "script urls",
            "ip address",
            "unknown soa",
            "unknown ns",
            "reverse dns",
            "africa flag",
            "asn as16637",
            "dns resolutions",
            "domains top",
            "level",
            "unique tld",
            "related pulses",
            "tags none",
            "indicator facts",
            "title",
            "ipv4 add",
            "opinion",
            "netacea",
            "lockbit",
            "wannacry attack",
            "nhs trusts",
            "council",
            "uk government",
            "protect",
            "cni safe",
            "acls",
            "praio",
            "prink",
            "prsc",
            "prla",
            "lg2en",
            "cti98",
            "search",
            "seiko epson",
            "corporation",
            "arc file",
            "malware",
            "delete c",
            "default",
            "show",
            "write",
            "next",
            "unknown",
            "united",
            "tlsv1",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "as15169",
            "port",
            "execution",
            "dock",
            "capture",
            "persistence",
            "yara detections",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "cabinet archive",
            "microsoft",
            "read c",
            "dynamicloader",
            "medium",
            "ltda me",
            "high",
            "write c",
            "entries",
            "checks",
            "delphi",
            "win32",
            "url pulse",
            "data upload",
            "extraction",
            "find suggested",
            "type",
            "domain hostname",
            "url add",
            "http",
            "related nids",
            "files location",
            "ireland flag",
            "files domain",
            "chrome",
            "ireland unknown",
            "pulse submit",
            "url analysis",
            "body",
            "date",
            "status",
            "name servers",
            "creation date",
            "expiration date",
            "flag united",
            "destination",
            "systemdrive",
            "html document",
            "crlf line",
            "updater",
            "copy",
            "unknown aaaa",
            "moved",
            "domain add",
            "extri data",
            "enter sc",
            "extr include",
            "review exclude",
            "sugges",
            "present jul",
            "saudi arabia",
            "present mar",
            "present oct",
            "present jun",
            "present feb",
            "present nov",
            "present may",
            "eeee",
            "eeeeeee",
            "eeeeee",
            "eefe",
            "ebeee",
            "ee eme",
            "eeheee",
            "eeefee e",
            "eeeee e",
            "vmprotect",
            "push",
            "local",
            "defender",
            "regsetvalueexa",
            "utf8 unicode"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lockbit",
              "display_name": "Lockbit",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "target": null
            },
            {
              "id": "Other Dangerous Malware",
              "display_name": "Other Dangerous Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1561",
              "name": "Disk Wipe",
              "display_name": "T1561 - Disk Wipe"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Oil"
          ],
          "TLP": "green",
          "cloned_from": "68f9288e0d98f3b44c2cb90c",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 648,
            "hostname": 1604,
            "FileHash-SHA256": 1826,
            "URL": 4153,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 60,
            "SSLCertFingerprint": 18,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 8418,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9288e0d98f3b44c2cb90c",
          "name": "Ultrasounds attack - South African criminal group-Denver, Vo affects critical infrastructure , Oil and public safety",
          "description": "South African and Ethiopian crime group with Denver , Co  presence is not only infiltrating infrastructure from banking to oil, they are human traffickers, hitmen and yes, I received this tip from team member Pheona who a \u2018sassa.gov.za\u2018 South African link recurrently as a top search suggestion in a \u2018targets\u2019  browser. The most frightening piece is that a name listed is of an Ethiopian man who attempted to force a very targeted victim to go somewhere with him,, be his girlfriend and did show up outside of her residence in a different City & County. He also knew the exact name of where she purchased specific items. If you can see this. Please help the best way you can. Something is incredibly wrong. [OTX auto populated Title: We can\u2019t rely on goodwill to protect our critical infrastructure - Help Net Security]",
          "modified": "2025-11-21T18:02:11.054000",
          "created": "2025-10-22T18:55:10.527000",
          "tags": [
            "server nginx",
            "date fri",
            "etag w",
            "urls",
            "passive dns",
            "acceptranges",
            "contentlength",
            "date thu",
            "gmt expires",
            "server",
            "code",
            "link",
            "script script",
            "south africa",
            "ipv4",
            "files",
            "location south",
            "accept",
            "present aug",
            "certificate",
            "hostname add",
            "domain",
            "files ip",
            "unknown a",
            "script urls",
            "ip address",
            "unknown soa",
            "unknown ns",
            "reverse dns",
            "africa flag",
            "asn as16637",
            "dns resolutions",
            "domains top",
            "level",
            "unique tld",
            "related pulses",
            "tags none",
            "indicator facts",
            "title",
            "ipv4 add",
            "opinion",
            "netacea",
            "lockbit",
            "wannacry attack",
            "nhs trusts",
            "council",
            "uk government",
            "protect",
            "cni safe",
            "acls",
            "praio",
            "prink",
            "prsc",
            "prla",
            "lg2en",
            "cti98",
            "search",
            "seiko epson",
            "corporation",
            "arc file",
            "malware",
            "delete c",
            "default",
            "show",
            "write",
            "next",
            "unknown",
            "united",
            "tlsv1",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "as15169",
            "port",
            "execution",
            "dock",
            "capture",
            "persistence",
            "yara detections",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "cabinet archive",
            "microsoft",
            "read c",
            "dynamicloader",
            "medium",
            "ltda me",
            "high",
            "write c",
            "entries",
            "checks",
            "delphi",
            "win32",
            "url pulse",
            "data upload",
            "extraction",
            "find suggested",
            "type",
            "domain hostname",
            "url add",
            "http",
            "related nids",
            "files location",
            "ireland flag",
            "files domain",
            "chrome",
            "ireland unknown",
            "pulse submit",
            "url analysis",
            "body",
            "date",
            "status",
            "name servers",
            "creation date",
            "expiration date",
            "flag united",
            "destination",
            "systemdrive",
            "html document",
            "crlf line",
            "updater",
            "copy",
            "unknown aaaa",
            "moved",
            "domain add",
            "extri data",
            "enter sc",
            "extr include",
            "review exclude",
            "sugges",
            "present jul",
            "saudi arabia",
            "present mar",
            "present oct",
            "present jun",
            "present feb",
            "present nov",
            "present may",
            "eeee",
            "eeeeeee",
            "eeeeee",
            "eefe",
            "ebeee",
            "ee eme",
            "eeheee",
            "eeefee e",
            "eeeee e",
            "vmprotect",
            "push",
            "local",
            "defender",
            "regsetvalueexa",
            "utf8 unicode"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lockbit",
              "display_name": "Lockbit",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "target": null
            },
            {
              "id": "Other Dangerous Malware",
              "display_name": "Other Dangerous Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1561",
              "name": "Disk Wipe",
              "display_name": "T1561 - Disk Wipe"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Oil"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 648,
            "hostname": 1604,
            "FileHash-SHA256": 1826,
            "URL": 4153,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 60,
            "SSLCertFingerprint": 18,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 8418,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "149 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f80c6bcd3fff3a4f126a68",
          "name": "Sventore \u2022 Agent Tesla Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information ",
          "description": "",
          "modified": "2025-11-20T17:00:05.377000",
          "created": "2025-10-21T22:42:51.657000",
          "tags": [
            "united",
            "urls",
            "domain",
            "files",
            "files ip",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "arial",
            "worm",
            "trojandropper",
            "meta",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "present oct",
            "present jul",
            "present sep",
            "present aug",
            "moved",
            "ip address",
            "error",
            "title",
            "ipv4 add",
            "url analysis",
            "hosting",
            "reverse dns",
            "america flag",
            "name servers",
            "body",
            "a domains",
            "passive dns",
            "welcome",
            "ok server",
            "gmt content",
            "twitter",
            "dynamicloader",
            "write c",
            "medium",
            "myapp",
            "high",
            "host",
            "delphi",
            "write",
            "code",
            "malware",
            "device driver",
            "backdoor",
            "msil",
            "present mar",
            "apanas",
            "regsetvalueexa",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "langturkish",
            "sublangdefault",
            "regdword",
            "persistence",
            "execution",
            "nids",
            "zegost",
            "trojan",
            "win32fugrafa",
            "malwarexgen att",
            "ck ids",
            "t1040",
            "sniffing",
            "location united",
            "united states",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
            "yara rule",
            "search",
            "blobx00x00x00",
            "guard",
            "encrypt",
            "afraid",
            "smartphone",
            "laptop",
            "tablet",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "show technique",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "access att",
            "t1566 phishing",
            "font",
            "pattern match",
            "general",
            "contact",
            "premium",
            "never",
            "core",
            "external system",
            "http header",
            "network traffic",
            "sample",
            "antivirus",
            "systems found",
            "ipurl artifact",
            "network related",
            "sends traffic",
            "http outbound",
            "hostname add",
            "address",
            "registrar",
            "internet ltd",
            "livedomains",
            "creation date",
            "hostname",
            "domain add",
            "modrg",
            "sincpoatia",
            "utf8",
            "appdata",
            "temp",
            "fyfdz",
            "iepgq",
            "trlew",
            "copy",
            "kentuchy",
            "oljnmrfghb",
            "powershell",
            "sabey",
            "sokolove law"
          ],
          "references": [
            "afraid.org | evergreen.afraid.org",
            "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
            "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
            "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
            "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
            "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
            "https://api.strem.io/api/addonCollectionGet%",
            "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
            "aohhpesayw.lawsonengineers.co.",
            "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
            "gitea.neconsside.com  \u2022 http://f7194.vip/login",
            "2012647\tDropbox.com Offsite File Backup in Use",
            "target.dropboxbusiness.com",
            "consolefoundry.date \u2022 http://consolefoundry.date",
            "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Neshta",
              "display_name": "Neshta",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "Zegost",
              "display_name": "Zegost",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            },
            {
              "id": "MalwareX-Gen",
              "display_name": "MalwareX-Gen",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.B",
              "display_name": "Worm:Win32/AutoRun.B",
              "target": "/malware/Worm:Win32/AutoRun.B"
            },
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "Kentuchy",
              "display_name": "Kentuchy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "68f7ced2cf17d264b49628bc",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 483,
            "hostname": 1397,
            "URL": 2874,
            "email": 2,
            "FileHash-MD5": 369,
            "FileHash-SHA1": 355,
            "FileHash-SHA256": 1534,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 7021,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "150 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f7ced2cf17d264b49628bc",
          "name": "NIDS - Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information",
          "description": "Multiple malware\u2019s targeting Dropbox & Ebay accounts. Referenced in earlier pukses. Further investigation shows link  found in apps on multiple Apple devices. Afraid. Org  still running & wreaking havoc globally. Currently targets a Music studio in Clear Creek County Co. The signal bounces from Fire station directly to studio gaining full access to everything.\n\nI am very disappointed with the abuses in f the Palantir , Gotham , Foundry products being abused by law firms and Private Investigators.\nIt is very destructive, causing loss, these firms are literally stealing and making money with other people\u2019s intellectual property and tough luck on the actual inventor, artist, writer because they even steal , cancel your insurance or back accounts leaving you unable to make a claim. \n\nGreat discretion should be used to qualify for these tools used to track, terrorize and access private information as well as tarnish the names of civilians , family ,businesses, stalking tracking  known location.",
          "modified": "2025-11-20T17:00:05.377000",
          "created": "2025-10-21T18:20:02.120000",
          "tags": [
            "united",
            "urls",
            "domain",
            "files",
            "files ip",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "arial",
            "worm",
            "trojandropper",
            "meta",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "present oct",
            "present jul",
            "present sep",
            "present aug",
            "moved",
            "ip address",
            "error",
            "title",
            "ipv4 add",
            "url analysis",
            "hosting",
            "reverse dns",
            "america flag",
            "name servers",
            "body",
            "a domains",
            "passive dns",
            "welcome",
            "ok server",
            "gmt content",
            "twitter",
            "dynamicloader",
            "write c",
            "medium",
            "myapp",
            "high",
            "host",
            "delphi",
            "write",
            "code",
            "malware",
            "device driver",
            "backdoor",
            "msil",
            "present mar",
            "apanas",
            "regsetvalueexa",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "langturkish",
            "sublangdefault",
            "regdword",
            "persistence",
            "execution",
            "nids",
            "zegost",
            "trojan",
            "win32fugrafa",
            "malwarexgen att",
            "ck ids",
            "t1040",
            "sniffing",
            "location united",
            "united states",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
            "yara rule",
            "search",
            "blobx00x00x00",
            "guard",
            "encrypt",
            "afraid",
            "smartphone",
            "laptop",
            "tablet",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "show technique",
            "refresh",
            "span",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "access att",
            "t1566 phishing",
            "font",
            "pattern match",
            "general",
            "contact",
            "premium",
            "never",
            "core",
            "external system",
            "http header",
            "network traffic",
            "sample",
            "antivirus",
            "systems found",
            "ipurl artifact",
            "network related",
            "sends traffic",
            "http outbound",
            "hostname add",
            "address",
            "registrar",
            "internet ltd",
            "livedomains",
            "creation date",
            "hostname",
            "domain add",
            "modrg",
            "sincpoatia",
            "utf8",
            "appdata",
            "temp",
            "fyfdz",
            "iepgq",
            "trlew",
            "copy",
            "kentuchy",
            "oljnmrfghb",
            "powershell",
            "sabey",
            "sokolove law"
          ],
          "references": [
            "afraid.org | evergreen.afraid.org",
            "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
            "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
            "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
            "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
            "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
            "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
            "https://api.strem.io/api/addonCollectionGet%",
            "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
            "aohhpesayw.lawsonengineers.co.",
            "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
            "gitea.neconsside.com  \u2022 http://f7194.vip/login",
            "2012647\tDropbox.com Offsite File Backup in Use",
            "target.dropboxbusiness.com",
            "consolefoundry.date \u2022 http://consolefoundry.date",
            "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "Neshta",
              "display_name": "Neshta",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski.A",
              "display_name": "Backdoor:Win32/Fynloski.A",
              "target": "/malware/Backdoor:Win32/Fynloski.A"
            },
            {
              "id": "Zegost",
              "display_name": "Zegost",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.XXY!bit",
              "display_name": "Worm:Win32/AutoRun.XXY!bit",
              "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
            },
            {
              "id": "MalwareX-Gen",
              "display_name": "MalwareX-Gen",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun.B",
              "display_name": "Worm:Win32/AutoRun.B",
              "target": "/malware/Worm:Win32/AutoRun.B"
            },
            {
              "id": "Trojan:Win32/Pariham.A",
              "display_name": "Trojan:Win32/Pariham.A",
              "target": "/malware/Trojan:Win32/Pariham.A"
            },
            {
              "id": "Kentuchy",
              "display_name": "Kentuchy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1528",
              "name": "Steal Application Access Token",
              "display_name": "T1528 - Steal Application Access Token"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 483,
            "hostname": 1397,
            "URL": 2874,
            "email": 2,
            "FileHash-MD5": 369,
            "FileHash-SHA1": 355,
            "FileHash-SHA256": 1534,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 7021,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "150 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68cf2c43f6493c55c8d08bf9",
          "name": "Executed \u2022 Installend RMS Module | .exe RMS.exe",
          "description": "Recap: Executed in Denver, Co.USA. Attacked a Newly purchased iPhone. Multi person attempt . Attacker executed via watch. . Related to Trump campaign Palantir text linked in references. \n\nCyberInt states that Remote Manipulator System (RMS) is a legitimate tool developed by Russian organization TektonIT and has been observed in campaigns conducted by TA505 as well as numerous smaller campaigns likely attributable to other, disparate, threat actors. In addition to the availability of commercial licenses, the tool is free for non-commercial use and supports the remote administration of both Microsoft Windows and Android devices.\nCreation Date\n2023-05-01 00:28:45\nLast Modification Date\n2025-09-13 22:34:36\n- by CarlosCabal (VirusTotal)\n\nInteresting. Being used in America.",
          "modified": "2025-10-20T21:03:08.498000",
          "created": "2025-09-20T22:35:47.459000",
          "tags": [
            "lowfi",
            "tektonit yara",
            "pulses otx",
            "pexe",
            "pe32",
            "intel",
            "vendor finding",
            "ms defender",
            "number",
            "install",
            "installend",
            "igor",
            "pavlov",
            "remote access tool",
            "dynamicloader",
            "medium",
            "dynamic",
            "ip address",
            "domain",
            "file name",
            "reads",
            "windows",
            "checks",
            "pehash external",
            "rms",
            "rms module",
            "private build",
            "watch",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "destination",
            "search",
            "united",
            "read c",
            "write",
            "persistence",
            "execution",
            "malware",
            "push",
            "copy",
            "next",
            "autorun",
            "unknown",
            "skykit",
            "companyname",
            "insta",
            "dod",
            "udp a83f8110",
            "encoding",
            "e1203 windows",
            "file attributes",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "f0002 polling",
            "control ob0004",
            "access ob0005",
            "defense evasion",
            "extraction",
            "data upload",
            "failed",
            "related tru",
            "unit data",
            "included review",
            "iocs",
            "suggestedloes",
            "find su",
            "type o",
            "extr",
            "references try",
            "cat antivirus",
            "com tektonit",
            "original f",
            "match info",
            "adversaries",
            "match unknown",
            "30000s",
            "info",
            "info checks",
            "taskjob t1053",
            "execution flow",
            "t1574 dll",
            "window",
            "tulach",
            "yara",
            "hallrender",
            "apple",
            "ios",
            "114.114.114.114",
            "targeted",
            "monitoring",
            "brian sabey & co",
            "tsara brashears target",
            "angry quasi",
            "pp mafia",
            "dangerous",
            "redrum",
            "nemtih"
          ],
          "references": [
            "Try LogMeIn Resolve For Free \u2014 Powerful tools for device management and remote software installs from LogMeInResolve.",
            "Installed on Tsara Brashears phone in a drive up incident in October 2024",
            "Yara: CATEGORY _7_Zip_Installer ;!@Install@! ;!@InstallEnd@!  7z Igor,Pavlov",
            "Antivirus Detections: Yara.Trojan.Remoteadmin-151 (29:30 BST) - a full list of key details:-1-2-3-4.",
            "EXE:CompanyName \u2022 TektonIT EXE:EntryPoint:0x121cf \u2022 EXE:FileDescription RMS Component",
            "TektonIT  RMS Component \u2022 6.0 Internal Name \u2022 LegalCopyright\u00a9 2014 TektonIT.",
            "Original Filename: RMS Module PrivateBuild \u2022 ProductName \u2022 RMS ProductVersion 6.0",
            "Worn as Watch \u2022 Highlighter yellow & green Large Font. Looks like a toy.  Clearly a weapon",
            "Non white or African American , black haired Middle Eastern 55+ male in non discreet Car",
            "Vehicle described as Midnight blue , attempted to hit target at a high rate of speed when target left",
            "parking spot on possibly Logan, male tried to clip target at Logan & 18th. No plates",
            "Same target l followed and observed at Metro T-mobile on Evans & Federal in Denver",
            "Described as an Opaque white skinned , non Caucasian bald male. Clearly Persian or Israeli (other) Russian?",
            "He watched a \u2018target\u2019 while buying least expensive product available. Shirt with US Flag distraction",
            "Target no longer able to provide info. Paper tags over real Co#LP on car dark colored car.",
            "Attempted, overt side swipe of family member of target in City Park , by W/M w/US Army tags",
            "Not surprisingly driving a Ford F 150  | Very disturbing incidents continue. Goal clear. Hired to K****",
            "Alerts: recon_fingerprint antisandbox_sleep dynamic_function_loading encrypted_ioc",
            "Alerts: resumethread_remote_process reads_self stealth_window uses_windows_utilities",
            "Alerts: antivm_checks_available_memory queries_keyboard_layout",
            "Alerts: stealth_timeout dll_load_uncommon_file_types antidebug_setunhandledexceptionfilter",
            "Alerts: network_icmp modifies_certificates injection_resumethread dumped_buffer",
            "Alerts:  network_cnc_http network_http creates_exe uses_windows_utilities",
            "Alerts: allocates_rwx antisandbox_foregroundwindows",
            "Related Trump pulse:  https://otx.alienvault.com/pulse/68c954a80675ccc89b0e9b63",
            "6.0.0.0 Deep Impact: +Tsara Brashears , +callmeDoris , +Merkd1904 , +scnrscnr,  likely dorkingbeauty",
            "6.0.0.0 United States AS749 DOD network information center \u2022 Historical telemetry",
            "Don\u2019t ask questions. Just terrorize. destroy equipment paid for by US citizens. What\u2019s yours is theirs.",
            "IDS: MALWARE-CNC Win.Trojan.Rfusclient outbound connection",
            "IDS: Matches rule PROTOCOL-ICMP Unusual PING detected",
            "IDS: PROTOCOL-ICMP PING Windows  PROTOCOL-ICMP PING PROTOCOL-ICMP Echo Reply",
            "IDS: PUA-OTHER RMS rmansys remote management tool cnc communication",
            "IDS: Unique rule identifier: This rule belongs to a private collection",
            "Signa: Matches rule Msiexec Quiet Installation by frack113",
            "Sigma: Matches rule Remote Access Tool Services Have Been Installed - Security by Connor Martin, Nasreddine Bencherchali (Nextron Systems)",
            "Sigma: Matches rule Compression Utility Passed Uncommon Directory (via cmdline) by SOC Prime Team",
            "Capabilities: Collection Get geographical location \u2022 Log keystrokes via polling",
            "Capabilities:  Anti-Analysis Self delete \u2022 Inspect load icon resource",
            "Capabilities: Targeting Identify system language via API",
            "Capabilities: Data-Manipulation Encode data using XOR Hash data with CRC32",
            "Capabilities: Persistence Create shortcut via IShellLink Communication \u2022 Write and execute a file",
            "Malware packed. Haven\u2019t sorted all.",
            "Continued stalking \u2022 I am of course also being targeted w/ attempts requiring surgery.",
            "Very dangerous. Has been going on for 12+ years affecting everyone who knew target.",
            "Machiavellians have already built a new world with a world. Some fear the Apocalypse they created.",
            "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/mc/challenge/brw/do/210/dd14d159",
            "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/visa/challenge/brw/get/210/d5caee55-c7ae-4b3a-8be7-b65fa5f885c9",
            "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/visa/challenge/brw/get/210/d5caee55-c7ae-4b3a-8be7-b65fa5f885c9",
            "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/visa/challenge/brw/get/220/6b180faa-7ce7-4e26-a3b0-aa241497c70f",
            "The attackers are all different races, Caucasian, African American, Asian, Indian, Persian, Ethiopian, and ambiguous",
            "I\u2019d like to make an appeal. Please stop. Your original target has gone away."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#Lowfi:HSTR:MonitoringTool:TektonIt",
              "display_name": "#Lowfi:HSTR:MonitoringTool:TektonIt",
              "target": null
            },
            {
              "id": "Win.Trojan.Remoteadmin-151",
              "display_name": "Win.Trojan.Remoteadmin-151",
              "target": null
            },
            {
              "id": "Win.Trojan.Rfusclient",
              "display_name": "Win.Trojan.Rfusclient",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "TrojanDownloader:HTML/Adodb.gen!A",
              "display_name": "TrojanDownloader:HTML/Adodb.gen!A",
              "target": "/malware/TrojanDownloader:HTML/Adodb.gen!A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1091",
              "name": "Replication Through Removable Media",
              "display_name": "T1091 - Replication Through Removable Media"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1120",
              "name": "Peripheral Device Discovery",
              "display_name": "T1120 - Peripheral Device Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 479,
            "FileHash-SHA1": 436,
            "FileHash-SHA256": 2102,
            "URL": 659,
            "domain": 162,
            "hostname": 305,
            "SSLCertFingerprint": 1,
            "email": 6
          },
          "indicator_count": 4150,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "181 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68eff833ed84ceaf611521d2",
          "name": "Tucker Carlson | AutInject \u2022 Zbot \u2022 CoinMiner \u2022 Zombie \u2022 Qbot affects his YouTube Channel (9.14.2025) ",
          "description": "",
          "modified": "2025-10-15T19:38:27.739000",
          "created": "2025-10-15T19:38:27.739000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": "68c73fbd85dfbb4d41006ad1",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "186 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c73fbd85dfbb4d41006ad1",
          "name": "Tucker Carlson Sam Altman YouTube Interview \u2022 Qbot | Malware with. Code Overlap",
          "description": "Maybe it\u2019s a network issue. The TV I viewed interview from is in Arabic the every time. It\u2019s not\nmy\ntelevision or network, didn\u2019t get link from a logged in YouTube. Not a subscriber.. I viewed using (cc) close captioning. It\u2019s the only program n YouTube using another language for this interview. The only reason I\u2019ve visited this interview several time\u2019s since it\u2019s aired is to check for the same results. Every time only this interview uses another language for (cc).\n\nThere are related pulses by a few different users, experiencing similar personal issues. I\u2019d assume I\u2019d always get these results. Unclear\n\n* At the end of interview Tucker Carlson states YouTube is trying to suppress or delete this one interview.",
          "modified": "2025-10-14T22:26:18.109000",
          "created": "2025-09-14T22:20:45.617000",
          "tags": [
            "resolved ips",
            "parent pid",
            "full path",
            "command line",
            "cname",
            "ip address",
            "port",
            "involved direct",
            "country name",
            "nxdomain",
            "tcp connections",
            "udp connections",
            "data",
            "datacrashpad",
            "edge",
            "passive dns",
            "origin trial",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "ipv4 add",
            "files",
            "title",
            "date",
            "found",
            "gmt content",
            "hostname",
            "verdict",
            "error",
            "code",
            "present aug",
            "present sep",
            "aaaa",
            "search",
            "domain",
            "present apr",
            "present jun",
            "address google",
            "safe browsing",
            "present oct",
            "match info",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "match medium",
            "icmp traffic",
            "port t1571",
            "info",
            "c0002 wininet",
            "flag",
            "markmonitor",
            "domain address",
            "contacted hosts",
            "process details",
            "size",
            "iend ihdridatx",
            "qrmf",
            "qkdi",
            "qiyay",
            "kjtn8",
            "r0x3",
            "ihdridatx",
            "yg6qp",
            "kkrz",
            "t6 ex",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "data upload",
            "extraction",
            "failed",
            "please",
            "your browser",
            "learn",
            "opera mozilla",
            "firefox google",
            "chrome remind",
            "privacy policy",
            "safety",
            "google llc",
            "youtube",
            "mozilla firefox",
            "safari google",
            "edge opera",
            "browse youtube",
            "file",
            "indicator",
            "pattern match",
            "ascii text",
            "ck id",
            "ck matrix",
            "href",
            "general",
            "local",
            "path",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "files domain",
            "files related",
            "related tags",
            "registrar",
            "files ip",
            "asn as15169",
            "address domain",
            "ip whois",
            "service address",
            "po box",
            "city hayes",
            "country gb",
            "dnssec",
            "domain name",
            "emails",
            "script urls",
            "a domains",
            "texas flyover",
            "script domains",
            "script script",
            "trojan",
            "meta",
            "window",
            "msie",
            "chrome",
            "twitter",
            "unknown aaaa",
            "record value",
            "content type",
            "united states",
            "dynamicloader",
            "medium",
            "write c",
            "high",
            "show",
            "digicert",
            "olet",
            "encrypt",
            "win64",
            "responder",
            "write",
            "next",
            "unknown",
            "install",
            "dummy",
            "entries",
            "displayname",
            "windows",
            "united",
            "tofsee",
            "copy",
            "stream",
            "malware",
            "hostile",
            "body",
            "hostile client",
            "apollo",
            "jaik",
            "code overlap",
            "sri lanka",
            "pintuck sri",
            "lanka",
            "unknown ns",
            "moved",
            "buy apparal",
            "win32",
            "trojandropper",
            "virtool",
            "susp",
            "ipv4",
            "pulse pulses",
            "urls",
            "reverse dns",
            "location united",
            "installer"
          ],
          "references": [
            "https://www.youtube.com/watch?v=5KmpT-BoVf4",
            "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
            "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
            "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
            "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
            "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
            "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
            "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
            "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
            "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
            "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Malware + Code Overlap",
              "display_name": "Malware + Code Overlap",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "Trojandownloader:Win32/Upatre",
              "display_name": "Trojandownloader:Win32/Upatre",
              "target": "/malware/Trojandownloader:Win32/Upatre"
            },
            {
              "id": "Trojan:BAT/Musecador",
              "display_name": "Trojan:BAT/Musecador",
              "target": "/malware/Trojan:BAT/Musecador"
            },
            {
              "id": "Win32:Trojan",
              "display_name": "Win32:Trojan",
              "target": null
            },
            {
              "id": "Bancos",
              "display_name": "Bancos",
              "target": null
            },
            {
              "id": "Hematite",
              "display_name": "Hematite",
              "target": null
            },
            {
              "id": "Trojanspy:Win32/Banker.LY",
              "display_name": "Trojanspy:Win32/Banker.LY",
              "target": "/malware/Trojanspy:Win32/Banker.LY"
            },
            {
              "id": "Trojan:Win32/Vflooder!rfn",
              "display_name": "Trojan:Win32/Vflooder!rfn",
              "target": "/malware/Trojan:Win32/Vflooder!rfn"
            },
            {
              "id": "Win32:MalwareX",
              "display_name": "Win32:MalwareX",
              "target": null
            },
            {
              "id": "Malwarex",
              "display_name": "Malwarex",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.AKZ!bit",
              "display_name": "Virtool:Win32/CeeInject.AKZ!bit",
              "target": "/malware/Virtool:Win32/CeeInject.AKZ!bit"
            },
            {
              "id": "Win32:Dropper",
              "display_name": "Win32:Dropper",
              "target": null
            },
            {
              "id": "Ymacco",
              "display_name": "Ymacco",
              "target": null
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Trojandownloader:Win32/Upatre.A",
              "display_name": "Trojandownloader:Win32/Upatre.A",
              "target": "/malware/Trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "Win32:Evo",
              "display_name": "Win32:Evo",
              "target": null
            },
            {
              "id": "Trojandropper:Win32/BcryptInject.B!MSR",
              "display_name": "Trojandropper:Win32/BcryptInject.B!MSR",
              "target": "/malware/Trojandropper:Win32/BcryptInject.B!MSR"
            },
            {
              "id": "Win32:TrojanX-gen\\ [Trj]",
              "display_name": "Win32:TrojanX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win32:Cleaman-K\\ [Trj]",
              "display_name": "Win32:Cleaman-K\\ [Trj]",
              "target": null
            },
            {
              "id": "Asacky",
              "display_name": "Asacky",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4746,
            "hostname": 1829,
            "domain": 913,
            "FileHash-MD5": 249,
            "FileHash-SHA1": 213,
            "FileHash-SHA256": 1765,
            "email": 3,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 9735,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "187 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c59a023815f66367c6900b",
          "name": "Virus.Injector affecting Online Payment system",
          "description": "fed.paypal.com_underground_exchange \u2022 \nYara Detections:\nConventionEngine_Keyword_Install |\nHigh Priority Alerts:\ncape_detected_threat | IDS Detections:\nWin32/Viking.GN ICMP Echo Request |\nPhilis.J ICMP Sweep (Payload Hello World)\n[FileHash SHA256 cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c]\n[Virus.Injector.ATA_virussign.com_8f3417c51a5e6b0b2241e61ef1a9eef1.exe] [File present on vx-underground.org | virus.exchange ~ vxunderground_0]\n[OTX populated] Researchers have identified and identified the source of the Viking, Philis malware, which has infected more than 1.5 million victims in the past year and is currently on the verge of being shut down.]\n#inject #install #keyword #fed.paypal #botnet #payload #grey #algorithm_manipulation #virusinstall",
          "modified": "2025-10-13T15:15:41.500000",
          "created": "2025-09-13T16:21:22.747000",
          "tags": [
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "search",
            "entries",
            "ids detections",
            "yara detections",
            "cape",
            "viking",
            "philis",
            "malware",
            "et",
            "adobe acrobat",
            "filehashsha256",
            "data upload",
            "extraction",
            "type",
            "no matching",
            "indicator",
            "failed",
            "url url",
            "samplepath",
            "samplename",
            "match info",
            "info",
            "base64",
            "ta0002 command",
            "t1059 severity",
            "modules t1129",
            "windows",
            "ta0003 modify",
            "registry t1112",
            "defense evasion",
            "encoding",
            "delete registry",
            "tree",
            "analysis ob0002",
            "control ob0004",
            "b0030 receive",
            "files",
            "ob0007 system",
            "e1082 file",
            "resolved ips",
            "sugges",
            "stop show",
            "domain",
            "hostname",
            "hostname data",
            "mitre att",
            "ip detections",
            "country"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 21,
            "FileHash-SHA1": 7,
            "FileHash-SHA256": 488,
            "URL": 758,
            "hostname": 321,
            "domain": 104
          },
          "indicator_count": 1699,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "188 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c5743593a4bcc81dd94b0b",
          "name": "Fed.PayPal.com - Ransom | Attacks via redirect",
          "description": "A monitored target, active on various payment platforms for business documented a malicious redirect event 1st seen in 2020. Follows pattern of multiple, critical and ongoing attacks beginning in 2013. In this instance target lost access to PayPal payments. If this is legal, it\u2019s been a grotesque grift. Target was financially and otherwise robbed.\n\n\n#trulymissed #paypal #advesaries #apple #twitter #backdoor #ransom #botnet #reptutationattack",
          "modified": "2025-10-13T13:27:11.277000",
          "created": "2025-09-13T13:40:05.671000",
          "tags": [
            "present sep",
            "virtool",
            "cryp",
            "win32",
            "ip address",
            "trojan",
            "ransom",
            "asn as54113",
            "passive dns",
            "msil",
            "united states",
            "dynamicloader",
            "qaeaav12",
            "high",
            "qbeipbdii",
            "write",
            "paypal",
            "medium",
            "search",
            "vmware",
            "floodfix",
            "malware",
            "united",
            "mtb apr",
            "hostname add",
            "write c",
            "read c",
            "yara detections",
            "upxoepplace",
            "next",
            "markus",
            "april",
            "ping",
            "meta http",
            "content",
            "gmt server",
            "th th",
            "443 ma2592000",
            "ipv4 add",
            "url analysis",
            "urls",
            "body",
            "title",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "t1590 gather",
            "victim network",
            "status",
            "name servers",
            "set cookie",
            "script urls",
            "present feb",
            "cookie",
            "template",
            "present oct",
            "present jul",
            "present dec",
            "present jun",
            "next associated",
            "urls show",
            "date checked",
            "present apr",
            "url hostname",
            "united kingdom",
            "unknown ns",
            "servers",
            "great britain",
            "msr aug",
            "msr apr",
            "msr nov",
            "ite o",
            "server response",
            "script script",
            "files show",
            "date hash",
            "avast avg",
            "creation date",
            "lcid1033",
            "sminnotek",
            "spnvirtualbox",
            "bvvirtualbox",
            "present mar",
            "present nov",
            "exploit",
            "error",
            "server response",
            "google safe",
            "results sep",
            "backdoor",
            "certificate",
            "mtb sep",
            "next http",
            "scans show",
            "present may",
            "results jun",
            "results jan",
            "worm",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "ids detections",
            "cape",
            "viking",
            "philis",
            "et",
            "torop",
            "des moines",
            "contacted hosts",
            "content reputation",
            "sabey type",
            "tulach type",
            "rexx type",
            "foundry type",
            "fred scherr",
            "twitter",
            "apple",
            "monitored target",
            "financial theft",
            "psalms 27: 1 - 14"
          ],
          "references": [
            "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
            "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
            "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
            "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
            "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
            "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
            "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
            "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
            "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
            "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:MalOb-BX\\ [Cryp]",
              "display_name": "Win32:MalOb-BX\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Fraudpack",
              "display_name": "Win.Trojan.Fraudpack",
              "target": null
            },
            {
              "id": "Fakeav",
              "display_name": "Fakeav",
              "target": null
            },
            {
              "id": "Ransom:MSIL/Genasom.I",
              "display_name": "Ransom:MSIL/Genasom.I",
              "target": "/malware/Ransom:MSIL/Genasom.I"
            },
            {
              "id": "Virtool:Win32/Obfuscator.KI",
              "display_name": "Virtool:Win32/Obfuscator.KI",
              "target": "/malware/Virtool:Win32/Obfuscator.KI"
            },
            {
              "id": "Toga!rfn",
              "display_name": "Toga!rfn",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Remoteadmin-7056666-0",
              "display_name": "Win.Malware.Remoteadmin-7056666-0",
              "target": null
            },
            {
              "id": "Floxif",
              "display_name": "Floxif",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Dropper.Unruy-9994363-0",
              "display_name": "Win.Dropper.Unruy-9994363-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Cycler-47",
              "display_name": "Win.Trojan.Cycler-47",
              "target": null
            },
            {
              "id": "Win.Trojan.Clicker-3506",
              "display_name": "Win.Trojan.Clicker-3506",
              "target": null
            },
            {
              "id": "Win.Downloader.Unruy-10026469-0",
              "display_name": "Win.Downloader.Unruy-10026469-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Floxif.E",
              "display_name": "Trojan:Win32/Floxif.E",
              "target": "/malware/Trojan:Win32/Floxif.E"
            },
            {
              "id": "Win.Malware.Urelas",
              "display_name": "Win.Malware.Urelas",
              "target": null
            },
            {
              "id": "Win.Malware.Zusy",
              "display_name": "Win.Malware.Zusy",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
              "target": null
            },
            {
              "id": "Win.Malware.Eclz-9953021-0",
              "display_name": "Win.Malware.Eclz-9953021-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
              "target": null
            },
            {
              "id": "Win.Dropper.Tiggre-9845940-0",
              "display_name": "Win.Dropper.Tiggre-9845940-0",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass.B!MTB",
              "display_name": "PWS:Win32/QQpass.B!MTB",
              "target": "/malware/PWS:Win32/QQpass.B!MTB"
            },
            {
              "id": "Win.Malware.Sfwx-9853337-0",
              "display_name": "Win.Malware.Sfwx-9853337-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Trojan:Win32/Kaicorn!rf",
              "display_name": "Trojan:Win32/Kaicorn!rf",
              "target": "/malware/Trojan:Win32/Kaicorn!rf"
            },
            {
              "id": "Win32:Banker",
              "display_name": "Win32:Banker",
              "target": null
            },
            {
              "id": "Worm:Win32/Cambot!rfn",
              "display_name": "Worm:Win32/Cambot!rfn",
              "target": "/malware/Worm:Win32/Cambot!rfn"
            },
            {
              "id": "Win32:Malware",
              "display_name": "Win32:Malware",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1450",
              "name": "Exploit SS7 to Track Device Location",
              "display_name": "T1450 - Exploit SS7 to Track Device Location"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1401",
              "name": "Device Administrator Permissions",
              "display_name": "T1401 - Device Administrator Permissions"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1595.002",
              "name": "Vulnerability Scanning",
              "display_name": "T1595.002 - Vulnerability Scanning"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            },
            {
              "id": "T1588.001",
              "name": "Malware",
              "display_name": "T1588.001 - Malware"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1321,
            "URL": 4356,
            "FileHash-MD5": 759,
            "FileHash-SHA1": 748,
            "FileHash-SHA256": 5148,
            "domain": 1076,
            "email": 7
          },
          "indicator_count": 13415,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "188 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68bbdb22e3d606ae8fb5cda8",
          "name": "HCPF | Department of Health Care Policy and Financing",
          "description": "Project Nemesis - Affects Department of Health Care Policy and Financing | Family representative  repeatedly told past bills aren\u2019t being paid by United Healthcare. Argus Insurance (unknown entity) was Policy on record target never had. FR was given information regarding HCPF which was being viewed by past vendor seen in (https://otx.alienvault.com/pulse/68bbb31f6d91989d7fcd9592) |  Issues with HCPF have been an issue for some time in isolated scenarios. It\u2019s unclear how at least one person keeps getting their name, bills and life pulled into this. Target PURCHASED a Healthcare policy via agent before major social engineering attacks. Same entity literally robs targets. Gift cards, phone services, cloud storage, account, insurance policies, bank account access, tax refunds, paid claims reversed & taken from target\u2019s account.\nMore research needed. Flaws  in new system could jeopardize many. \n#trulymissed #rip #techbrohell #palantir",
          "modified": "2025-10-06T05:01:18.794000",
          "created": "2025-09-06T06:56:34.649000",
          "tags": [
            "federal changes",
            "health first",
            "colorado",
            "child health",
            "plan plus",
            "newimpact",
            "medicaidour",
            "impact",
            "medicaid page",
            "medicaid",
            "beware",
            "text/html",
            "trackers",
            "iframes",
            "external-resources",
            "new relic",
            "g1gv3h3sxc0",
            "utc gcw970gh4gg",
            "android",
            "known exploited",
            "google",
            "salesloft drift",
            "sap s4hana",
            "cve202542957",
            "cisa",
            "sitecore",
            "linux",
            "france",
            "meta",
            "rokrat",
            "lizar",
            "project nemesis",
            "carbanak",
            "cobalt strike",
            "domino",
            "no expiration",
            "url https",
            "type indicator",
            "role title",
            "related pulses",
            "hostname https",
            "m4e5930",
            "hostname",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "ascii text",
            "search",
            "ogoogle trust",
            "cngts ca",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "malware",
            "roboto",
            "present feb",
            "united",
            "a domains",
            "present dec",
            "passive dns",
            "moved",
            "script domains",
            "script urls",
            "urls",
            "title",
            "date",
            "resolved ips",
            "http traffic",
            "http get",
            "match info",
            "downloads",
            "info",
            "https http",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "endgame systems"
          ],
          "references": [
            "Researched: https://hcpf.colorado.gov/",
            "www.onyx-ware.com \u2022 https://www.endgamesystems.com/",
            "millet-usgc-1.palantirfedstart.com",
            "https://securityaffairs.com/109671/hacking/50000-home-cameras-hacked.html",
            "https://passwords.google/?utm_medium=hpp&utm_source=google&utm_campaign=sid2023aunonenms",
            "https://passwords.google/?utm_medium=hpp&utm",
            "https://securityaffairs.com/181338/security/google-fixed-chrome-flaw-found-by-big-sleep-ai.html",
            "Researched publicly available information provided by representative of a target\u2019s estate",
            "System has placed affected on multiple policies cancelling private policy without notice.",
            "Paid for plan long after entity put target on a state plan. Target audited for making too much money (framed)",
            "Provided documented evidence of appealed state issued plan and disclosed financials.",
            "Won appeal. Denied stimulus until passing another audit showing taxable income and filed taxes",
            "I hope this goes smoothly. I believe will be a nightmare as witnessed. I hope I\u2019m wrong.",
            "State (or random \u2022_- hackers) erased evidence of targets insurance all paid for by target.",
            "Target also owned an online brokerage & lead company, was agent & insurance marketer for years.",
            "September began with false information, defaulted claims , denials from authorized  services rendered years prior.",
            "If someone has Medicare it\u2019s wise to check with carrier & providers to see policies generated by AI"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lizar",
              "display_name": "Lizar",
              "target": null
            },
            {
              "id": "Project Nemesis",
              "display_name": "Project Nemesis",
              "target": null
            },
            {
              "id": "Carbanak",
              "display_name": "Carbanak",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Domino",
              "display_name": "Domino",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [
            "Hospitality",
            "Financial",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1395,
            "URL": 4304,
            "CVE": 1,
            "domain": 694,
            "FileHash-SHA256": 1790,
            "FileHash-MD5": 183,
            "FileHash-SHA1": 103,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 8475,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "196 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68bbb31f6d91989d7fcd9592",
          "name": "Who is Argus Health Systems in relation to United Healthcare",
          "description": "Strange. Person/s handling a monitored targeted past accounts was contacted to have old bills paid. Told individual had Argus Health Insurance that wouldn\u2019t pay.\n\nIssues: \u2022 Individual wasn\u2019t a client of vendor in 2024\n\u2022 Was never an Argus client.\n\u2022 Social engineering type call. Angry employee demanding copy of front and back of Health Care Insurance card for UH  payments for items purchased after approved prior authorization for in past purchases. \n\u2022 Gave an incredible amount of PHI over phone w/o appropriate new (or former) HIPPA standard verification.  \u2022 Angrily refused to provide billing # or requesters name.\n*United Health Care has paid ZERO bills. \n* \n(Auto populated - Anel arauchealth cam) | https://www.argushealth.com. Argus Health Systems is a healthcare technology company based in Kansas City, MO. Specializing in pharmacy benefit management ...",
          "modified": "2025-10-06T03:04:31.707000",
          "created": "2025-09-06T04:05:50.955000",
          "tags": [
            "server",
            "date",
            "registrar abuse",
            "csc corporate",
            "domains",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "country",
            "postal code",
            "code",
            "united",
            "showing",
            "entries",
            "ip address",
            "search",
            "name servers",
            "unknown aaaa",
            "domain add",
            "pulse submit",
            "passive dns",
            "content type",
            "type content",
            "all ipv4",
            "url analysis",
            "urls",
            "files",
            "title",
            "meta",
            "certificate",
            "creation date",
            "record value",
            "hostname add",
            "domain",
            "unknown ns",
            "china unknown",
            "body",
            "please",
            "x msedge",
            "pulse pulses",
            "present aug",
            "hong kong",
            "extraction",
            "data upload",
            "levelbluelabs",
            "search otx",
            "pcap",
            "stix",
            "url or",
            "texdr",
            "failedto",
            "drop",
            "aaaa",
            "record type",
            "ttl value",
            "historical ssl",
            "certificates",
            "thumbprint",
            "present jan",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jul",
            "present jun",
            "moved",
            "gmt content",
            "a domains",
            "next http",
            "scans show",
            "error",
            "present sep",
            "present may",
            "present jul",
            "present mar",
            "present apr"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2091,
            "domain": 817,
            "URL": 7939,
            "email": 5,
            "FileHash-SHA256": 2960,
            "FileHash-SHA1": 240,
            "FileHash-MD5": 227
          },
          "indicator_count": 14279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "196 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68c54659742e10df0e2dd0ec",
          "name": "Archive.ph - Mirai",
          "description": "",
          "modified": "2025-10-03T00:01:12.616000",
          "created": "2025-09-13T10:24:25.814000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "javascript",
            "spawns",
            "united",
            "present aug",
            "div div",
            "meta",
            "fffae1",
            "xml title",
            "drag",
            "div form",
            "form div",
            "a li",
            "encrypt",
            "russia",
            "passive dns",
            "urls",
            "aaaa",
            "netherlands",
            "your ip",
            "panama",
            "russia unknown",
            "present mar",
            "present jun",
            "moved",
            "present jul",
            "present sep",
            "ip address",
            "present jan",
            "body",
            "title",
            "domain",
            "files",
            "content type",
            "body doctype",
            "as16509",
            "intel mac",
            "os x",
            "ipv4 add",
            "port",
            "destination",
            "read c",
            "medium",
            "entries",
            "et info",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "malware",
            "url analysis",
            "files ip",
            "name server",
            "domain address",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "us as15169",
            "us as396982",
            "mitre att",
            "pattern match",
            "form",
            "onload",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "verify",
            "asnone",
            "china as4134",
            "resolverror",
            "high",
            "dns query",
            "as7018 att",
            "japan as4713",
            "south korea",
            "little \u2018endian\u2019",
            "mirai",
            "dod",
            "endgame systems",
            "government overreach",
            "sabey type",
            "foundry type",
            "apple",
            "cve"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Mirai-7135858-0",
              "display_name": "Unix.Dropper.Mirai-7135858-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": "68b798c0a419c49eeb4e2a13",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "privacynotacrime",
            "id": "349346",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2069,
            "domain": 406,
            "FileHash-SHA256": 1498,
            "hostname": 811,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 138,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 5082,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 59,
          "modified_text": "199 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68b798c0a419c49eeb4e2a13",
          "name": "Archive.ph - Mirai",
          "description": "Outdated archiving domain of questionable origin     can expose or has exposed monitored target/s to\nUnix.Dropper.Mirai-7135858-0.\n\nThe domain seems to want to appear as if it originates from Russia. There is a DoD & Endgame systems relationship. Multiple archived pages have been injected and deleted.\n(Little Endian) is a name seen  often related to an innocent known to be targeted by a pro male entity who utilizes Pegasus, Palantir, Gotham, Foundry , Tulach, for silencing.\n#trulymissed #mirai #malicious",
          "modified": "2025-10-03T00:01:12.616000",
          "created": "2025-09-03T01:24:16.418000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "javascript",
            "spawns",
            "united",
            "present aug",
            "div div",
            "meta",
            "fffae1",
            "xml title",
            "drag",
            "div form",
            "form div",
            "a li",
            "encrypt",
            "russia",
            "passive dns",
            "urls",
            "aaaa",
            "netherlands",
            "your ip",
            "panama",
            "russia unknown",
            "present mar",
            "present jun",
            "moved",
            "present jul",
            "present sep",
            "ip address",
            "present jan",
            "body",
            "title",
            "domain",
            "files",
            "content type",
            "body doctype",
            "as16509",
            "intel mac",
            "os x",
            "ipv4 add",
            "port",
            "destination",
            "read c",
            "medium",
            "entries",
            "et info",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "malware",
            "url analysis",
            "files ip",
            "name server",
            "domain address",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "us as15169",
            "us as396982",
            "mitre att",
            "pattern match",
            "form",
            "onload",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "verify",
            "asnone",
            "china as4134",
            "resolverror",
            "high",
            "dns query",
            "as7018 att",
            "japan as4713",
            "south korea",
            "little \u2018endian\u2019",
            "mirai",
            "dod",
            "endgame systems",
            "government overreach",
            "sabey type",
            "foundry type",
            "apple",
            "cve"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Unix.Dropper.Mirai-7135858-0",
              "display_name": "Unix.Dropper.Mirai-7135858-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2069,
            "domain": 406,
            "FileHash-SHA256": 1498,
            "hostname": 811,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 138,
            "SSLCertFingerprint": 8,
            "CIDR": 1,
            "CVE": 1
          },
          "indicator_count": 5082,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "199 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68ae5b9ef87646927a236b61",
          "name": "Privacy - Google Videos Search - Web Applications Stack Exchange = WannaCry",
          "description": "Description: dfir.blog - A blog about Digital Forensics & Incident Response\ndfir.blog\nDigital forensics, web browsers, visualizations, & open source tools.\n#monitoring #dod(?) #chinacache #crypt #ransom#infectedsystems",
          "modified": "2025-09-26T00:01:12.214000",
          "created": "2025-08-27T01:13:02.780000",
          "tags": [
            "google",
            "mullvad browser",
            "value",
            "incognito mode",
            "mine",
            "unix time",
            "friday",
            "january",
            "does",
            "tor browser",
            "search",
            "show",
            "langchinese",
            "packing t1045",
            "t1045",
            "medium",
            "pe resource",
            "module load",
            "t1129",
            "service",
            "trojan",
            "copy",
            "dock",
            "write",
            "malware",
            "clock",
            "united",
            "passive dns",
            "urls",
            "next associated",
            "gmt cache",
            "ipv4 add",
            "pulse pulses",
            "files",
            "reverse dns",
            "win32",
            "title",
            "location united",
            "america flag",
            "america asn",
            "as15169 google",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "present aug",
            "china unknown",
            "creation date",
            "date",
            "domain",
            "ip address",
            "domain name",
            "expiration date",
            "status ok",
            "nanjing",
            "accept",
            "body",
            "div td",
            "td tr",
            "div div",
            "span span",
            "a li",
            "span p",
            "p div",
            "moved",
            "a domains",
            "open",
            "span",
            "uuupupu",
            "t1055",
            "process32nextw",
            "high",
            "windows",
            "high defense",
            "evasion",
            "delphi",
            "google gmail",
            "images sign",
            "advanced search",
            "solutions",
            "privacy",
            "store gmail",
            "delete delete",
            "report",
            "how search",
            "applying ai",
            "settings search",
            "advanced",
            "search search",
            "search help",
            "domainabuse",
            "showing",
            "hostname add",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "pulses none",
            "related tags",
            "read c",
            "tlsv1",
            "whitelisted",
            "port",
            "destination",
            "ascii text",
            "next",
            "encrypt",
            "script urls",
            "msie",
            "chrome",
            "bad gateway",
            "script domains",
            "present feb",
            "link",
            "meta",
            "digital",
            "language",
            "body doctype",
            "ghost",
            "present jun",
            "aaaa",
            "present jul",
            "present oct",
            "record value",
            "yara detections",
            "dock zone",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "code",
            "error",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "execution",
            "persistence",
            "tulach",
            "brian sabey",
            "dod network",
            "orgtechref",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "entity dnic",
            "handle",
            "whois lookup",
            "dod",
            "et trojan",
            "server header",
            "suspicious",
            "et info",
            "unknown",
            "virustotal",
            "specified",
            "download",
            "et",
            "please",
            "type size",
            "first seen",
            "loading",
            "python wheel",
            "dynamicloader",
            "intel",
            "ms windows",
            "pe32",
            "entries",
            "user agent",
            "powershell",
            "agent",
            "yara rule",
            "checks",
            "levelblue",
            "open threat",
            "observed dns",
            "query",
            "dns lookup",
            "msdos",
            "wannacry dns",
            "lookup",
            "wannacry",
            "worm",
            "explorer",
            "msil",
            "darkcomet",
            "ping",
            "tools",
            "capture",
            "hallrender",
            "dga domains",
            "unfurl sites",
            "honey net",
            "bot",
            "nxdomain",
            "potential-c2"
          ],
          "references": [
            "Don\u2019t click! https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | Infected systems",
            "DoD Network Information Center (DNIC)",
            "DoD Network Information Center disa.columbus.ns.mbx.arin-registrations@mail.mil [seen throughout}",
            "Python Wheel package",
            "https://www.google.com/search",
            "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com",
            "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Magania.DSK!MTB",
              "display_name": "Trojan:Win32/Magania.DSK!MTB",
              "target": "/malware/Trojan:Win32/Magania.DSK!MTB"
            },
            {
              "id": "Trojan:Win32/Zusy",
              "display_name": "Trojan:Win32/Zusy",
              "target": "/malware/Trojan:Win32/Zusy"
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "a variant of Win32/Kryptik.DEOA",
              "display_name": "a variant of Win32/Kryptik.DEOA",
              "target": null
            },
            {
              "id": "ALF:Exploit:Win32/gSharedInfoRef.A",
              "display_name": "ALF:Exploit:Win32/gSharedInfoRef.A",
              "target": null
            },
            {
              "id": "Wannacry",
              "display_name": "Wannacry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1054",
              "name": "Indicator Blocking",
              "display_name": "T1054 - Indicator Blocking"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [
            "Telecommunications",
            "Technology",
            "Civilian"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8221,
            "domain": 1216,
            "FileHash-SHA256": 2434,
            "FileHash-MD5": 296,
            "FileHash-SHA1": 155,
            "hostname": 2939,
            "email": 7,
            "SSLCertFingerprint": 8,
            "CIDR": 2
          },
          "indicator_count": 15278,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "206 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68accab3048f960c2012d8f3",
          "name": "Unruy Infected System | Safari browser Google Search = www2.megawebfind.com",
          "description": "Unruy affecting safari browser of a currently infected iOS system.\nDescription: The sca_esv parameter is a piece of data in the URL that's likely internal to Google's system for tracking. | \n(https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | ( First time user, I can\u2019t vouch for the safety of website above.)",
          "modified": "2025-09-24T19:02:24.695000",
          "created": "2025-08-25T20:42:27.811000",
          "tags": [
            "google search",
            "please click",
            "process32nextw",
            "read c",
            "united",
            "show",
            "entries",
            "shellexecuteexw",
            "medium",
            "module load",
            "t1129",
            "dock",
            "write",
            "suspicious",
            "malware",
            "unknown",
            "contacted",
            "ids detections",
            "forbidden yara",
            "detections",
            "domains",
            "unruy",
            "safari",
            "apple",
            "ios"
          ],
          "references": [
            "https://www.google.com/search?client=safari&sca_esv= www2.megawebfind.com webfind. com \u2022 www6.mega www.google.com",
            "IDS Detections: Win32/Unruy.C Activity",
            "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction network_http",
            "Alerts: antisandbox_sleep creates_exe dropper stealth_window injection_process_search protection_rx",
            "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com ocsp.pki.goog",
            "Domains Contacted: www.download.windowsupdate.com ifdnzact.com d38psrni17bvxu.cloudfront.net",
            "Domains Contacted:  www.microsoft.com www.bing.com www2.megawebdeals.com ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com d38psrni17bvxu.cloudfront.net www2.megawebfind.com www.google.com www6.megawebfind.com",
            "Domains Contacted: www2.megawebfind.com www.google.com www6.megawebfind.com",
            "The sca_esv parameter is a piece of data in the URL that's likely internal to Google's system for tracking, sorting, or customizing search results.",
            "A clients infected now former iOS device.",
            "https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking",
            "I can\u2019t vouch for the safety of website above. First time user.",
            "https://otx.alienvault.com/indicator/file/f3a939131ffaf473f8b1ffa0cd11d8cbce46f50dcc7e9fd2ff8404201ab5bc8e"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Unruy-6912804-0",
              "display_name": "Win.Malware.Unruy-6912804-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Civilian"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 489,
            "FileHash-MD5": 105,
            "FileHash-SHA1": 101,
            "hostname": 297,
            "URL": 942,
            "SSLCertFingerprint": 1,
            "domain": 182
          },
          "indicator_count": 2117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "207 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68abf66e97031d0ff0c04fed",
          "name": "Packed sentient.industries links to a targets business website",
          "description": "Very malicious link found in a targets business.\nPacked. Needs to be categorized.\n(FoundryPalantir rich?) Tracking, hacking, and serious espionage.\nAvailable public Information: \nSENTIENT INDUSTRIES\nsentient.industries\nSentient industries provides design and engineering services, from prototyping to small-batch manufacturing, empowering clients to overcome complex challenges. |\nMore about sentient\nMission sentient accelerates mission critical technology for\u2026\nSENTIENT INDUSTRIES\nAccelerating mission-critical tech for disaster response, defense ...\nContact Now\nAustin, tx 78758. United States. EMAIL us. info@sentient \n\nWorse than it looks. Spying on a several threat researchers.",
          "modified": "2025-09-24T04:04:05.604000",
          "created": "2025-08-25T05:36:46.327000",
          "tags": [
            "moved",
            "body",
            "x cache",
            "cloudfront x",
            "cph50 c2",
            "certificate",
            "record value",
            "title",
            "h1 center",
            "server",
            "redacted for",
            "servers",
            "name redacted",
            "for privacy",
            "name servers",
            "org data",
            "privacy city",
            "privacy country",
            "ca creation",
            "passive dns",
            "urls",
            "files",
            "ip address",
            "asn as57033",
            "less whois",
            "registrar",
            "tucows domains",
            "key identifier",
            "data",
            "v3 serial",
            "number",
            "cat ozerossl",
            "cnzerossl ecc",
            "domain secure",
            "site ca",
            "validity",
            "subject public",
            "extraction",
            "data upload",
            "extra data",
            "include review",
            "find",
            "failed",
            "typ no",
            "ms windows",
            "intel",
            "pe32",
            "united",
            "search",
            "as16509",
            "from win32bios",
            "show",
            "high",
            "medium",
            "delphi",
            "copy",
            "write",
            "launcher",
            "next",
            "present aug",
            "present jul",
            "lowfi",
            "win32",
            "a div",
            "div div",
            "learn xml",
            "babylon",
            "win64",
            "trojan",
            "colors",
            "python",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "et info",
            "tls handshake",
            "bad traffic",
            "failure",
            "date",
            "august",
            "hybrid",
            "general",
            "path",
            "starfield",
            "click",
            "strings",
            "se bethseda",
            "n bethseda",
            "n data",
            "error",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results aug",
            "read c",
            "tlsv1",
            "port",
            "destination",
            "module load",
            "execution",
            "dock",
            "persistence",
            "malware",
            "unknown",
            "cname",
            "aaaa",
            "creation date",
            "showing",
            "domain",
            "dga domains",
            "palantirfoundry",
            "foundry",
            "status",
            "unknown ns",
            "g2 tls",
            "rsa sha256",
            "italy unknown",
            "mtb may",
            "trojandropper",
            "invalid url",
            "next associated",
            "ddos",
            "body html",
            "hacktool",
            "ipv4",
            "url analysis",
            "ukraine",
            "encrypt",
            "rl add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present jun",
            "entries",
            "title error",
            "all ipv4",
            "reverse dns",
            "yara detections",
            "top source",
            "top destination",
            "source source",
            "sha256 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "entity amazon4",
            "handle",
            "canada unknown",
            "content type",
            "javascript src",
            "script script",
            "x powered",
            "ipv4 add",
            "pulse submit",
            "submit url",
            "analysis",
            "url add",
            "related nids",
            "files location",
            "canada flag",
            "canada hostname",
            "unknown aaaa",
            "ascii text",
            "user agent",
            "powershell",
            "agent",
            "czechia unknown",
            "domain add",
            "dynamicloader",
            "hostname add",
            "pentagon",
            "defense"
          ],
          "references": [
            "sentient.industries affects independent artists. Affects several others.",
            "Bethseda Map - Yara Detections Delphi ,  InnoSetupInstaller",
            "Bethseda Map - High Priority Alerts: ransomware_file_moves ransomware_appends_extensions",
            "Bethseda Map - High Priority Alerts: dumped_buffer2 antisandbox_mouse_hook",
            "Bethseda Map - High Priority Alerts: modifies_certificates ransomware_dropped_files",
            "Bethseda Map - High Priority Alerts: ransomware_mass_file_delete antivm_firmware",
            "Bethseda Map - High Priority Alerts:  antiemu_wine banker_zeus_p2p",
            "https://download.mobiledit.com/drivers/setup_cdd_apple_1_0_10_0.exe",
            "https://forensic.manuals.mobiledit.com/MM/how-to-install-correct-apple-drivers",
            "prod.foundry.tylertechai.com \u2022 qa.foundry.tylertechai.com \u2022 staging.foundry.tylertechai.com \u2022",
            "talos-staging.palantirfoundry.com \u2022 tylertechai.com \u2022 Palantir Technologies Inc.\u2022 palantirfoundry.com",
            "Affects : Kailula4 , scnrscnr, SongCulture, Tsara Brashears & associated, ScrnrScrnr , dorkingbeauty",
            "Interesting widgets:  https://myid.canon/prd/1.1.30/canonid-assets/gcid-widget.html",
            "http://link.monetizer101.com/widget/custom-2.0.2/templates/1",
            "https://widget-i18n.tiktokv.com.ttdns2.com/ \u2022  https://stella.demand-iq.com/widget",
            "widget-va.tiktokv.com.ttdns2.com \u2022 http://widget-i18n.tiktokv.com.ttdns2.com/",
            "http://link.monetizer101.com/widget/custom-2.0.3/js/load.min.js \u2022",
            "https://link.monetizer101.com/widget/code/595.js \u2022 https://link.monetizer101.com/widget/code/1343.js",
            "https://link.monetizer101.com/widget/code/1511.js \u2022 https://link.monetizer101.com/widget/code/mirror.js",
            "https://link.monetizer101.com/widget/code/dailystaruk.js",
            "https://download.mobiledit.com/drivers/setup_cdd_apple_1_0_10_0.exe",
            "https://forensic.manuals.mobiledit.com/MM/how-to-install-correct-apple-drivers (ASP.NET)",
            "Interesting Strings:  https://pro-api.coinmarketcap.com/v2/cryptocurrency/quotes/historical",
            "(Can't access file- Malware infection files)",
            "Potential reparations: Spyware ,  Trojan ,  Pegasus ,  DNS ,  Graphite ,  Paragon ,   NSO Group ,  Endgame , Cloudfront",
            "constellation.pcfrpegaservice.net (Pegasus related? idk)",
            "On behalf of pcfrpegaservice.net owner Name Servers\tNS-1477.AWSDNS-56.ORG Org\tIdentity Protection Service",
            "TrojanWin32Scoreem - CodeOverlap [616fc7047d6216f7a604fa90f2f2dd0ad5b12f1153137e43858d3421ba964ea4]",
            "I have to breakdown this enormous post over time. I\u2019m going to repost a potential hackers similar post",
            "Remotewd.com devices",
            "If you find anything interesting please research it."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "nUFS_inno",
              "display_name": "nUFS_inno",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:MSIL/Malicious",
              "display_name": "#Lowfi:HSTR:MSIL/Malicious",
              "target": null
            },
            {
              "id": "ALF:JASYP:PUA:Win32/Bibado",
              "display_name": "ALF:JASYP:PUA:Win32/Bibado",
              "target": null
            },
            {
              "id": "Trojan:Win32/Toga",
              "display_name": "Trojan:Win32/Toga",
              "target": "/malware/Trojan:Win32/Toga"
            },
            {
              "id": "Win32:Downloader-GJK\\ [Trj]",
              "display_name": "Win32:Downloader-GJK\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.109205-1",
              "display_name": "Win.Downloader.109205-1",
              "target": null
            },
            {
              "id": "Custom Malware",
              "display_name": "Custom Malware",
              "target": null
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Win32:Downloader-GJK\\ [Trj]",
              "display_name": "Win32:Downloader-GJK\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.109205-1",
              "display_name": "Win.Downloader.109205-1",
              "target": null
            },
            {
              "id": "Win.Trojan.Jorik-149",
              "display_name": "Win.Trojan.Jorik-149",
              "target": null
            },
            {
              "id": "#LowFiDetectsVmWare",
              "display_name": "#LowFiDetectsVmWare",
              "target": null
            },
            {
              "id": "Win.Trojan.Jorik-130",
              "display_name": "Win.Trojan.Jorik-130",
              "target": null
            },
            {
              "id": "Win.Trojan.Fakecodecs-119",
              "display_name": "Win.Trojan.Fakecodecs-119",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Trojan.Bulz-9860169-0",
              "display_name": "Win.Trojan.Bulz-9860169-0",
              "target": null
            },
            {
              "id": "Win.Malware.Midie-6847892-0",
              "display_name": "Win.Malware.Midie-6847892-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop.V!MTB",
              "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
              "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Win.Packed.Razy-9785185-0",
              "display_name": "Win.Packed.Razy-9785185-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.MT!MTB",
              "display_name": "Trojan:Win32/Glupteba.MT!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
            },
            {
              "id": "PWS",
              "display_name": "PWS",
              "target": null
            },
            {
              "id": "DDOS:Win32/Stormser.A",
              "display_name": "DDOS:Win32/Stormser.A",
              "target": "/malware/DDOS:Win32/Stormser.A"
            },
            {
              "id": "ALF:HSTR:DotNET",
              "display_name": "ALF:HSTR:DotNET",
              "target": null
            },
            {
              "id": "DotNET",
              "display_name": "DotNET",
              "target": null
            },
            {
              "id": "Script Exploit",
              "display_name": "Script Exploit",
              "target": null
            },
            {
              "id": "HackTool:Win32/AutoKMS",
              "display_name": "HackTool:Win32/AutoKMS",
              "target": "/malware/HackTool:Win32/AutoKMS"
            },
            {
              "id": "Xanfpezes.A",
              "display_name": "Xanfpezes.A",
              "target": null
            },
            {
              "id": "Trojan:Win32/Gandcrab",
              "display_name": "Trojan:Win32/Gandcrab",
              "target": "/malware/Trojan:Win32/Gandcrab"
            },
            {
              "id": "Win.Trojan.Generic-9862772-0",
              "display_name": "Win.Trojan.Generic-9862772-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zbot.SIBL!MTB",
              "display_name": "Trojan:Win32/Zbot.SIBL!MTB",
              "target": "/malware/Trojan:Win32/Zbot.SIBL!MTB"
            },
            {
              "id": "Win32/Nemucod",
              "display_name": "Win32/Nemucod",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:TrojanDownloader:HTML/Adodb!rfn",
              "display_name": "ALF:HeraklezEval:TrojanDownloader:HTML/Adodb!rfn",
              "target": null
            },
            {
              "id": "Trojan:Win32/Blihan.A",
              "display_name": "Trojan:Win32/Blihan.A",
              "target": "/malware/Trojan:Win32/Blihan.A"
            },
            {
              "id": "TrojanDropper:Win32/Muldrop",
              "display_name": "TrojanDropper:Win32/Muldrop",
              "target": "/malware/TrojanDropper:Win32/Muldrop"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "Win.Malware.Kolab-9885903-0",
              "display_name": "Win.Malware.Kolab-9885903-0",
              "target": null
            },
            {
              "id": "Win.Malware (30)",
              "display_name": "Win.Malware (30)",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:MSIL/Malicious.Decryption",
              "display_name": "#Lowfi:HSTR:MSIL/Malicious.Decryption",
              "target": null
            },
            {
              "id": "E5",
              "display_name": "E5",
              "target": null
            },
            {
              "id": "MyDoom",
              "display_name": "MyDoom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 6232,
            "URL": 24908,
            "hostname": 7993,
            "FileHash-SHA256": 11128,
            "email": 6,
            "FileHash-MD5": 1054,
            "FileHash-SHA1": 932,
            "SSLCertFingerprint": 14,
            "CIDR": 3,
            "CVE": 3
          },
          "indicator_count": 52273,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 146,
          "modified_text": "208 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.google.com/search?client=safari&sca_esv= www2.megawebfind.com webfind. com \u2022 www6.mega www.google.com",
        "Continued stalking \u2022 I am of course also being targeted w/ attempts requiring surgery.",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Capabilities:  Anti-Analysis Self delete \u2022 Inspect load icon resource",
        "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/mc/challenge/brw/do/210/dd14d159",
        "The sca_esv parameter is a piece of data in the URL that's likely internal to Google's system for tracking, sorting, or customizing search results.",
        "ghb.unoadsrv.com.88.1.8b13f8ac.roksit.net",
        "canary5.nycl.do.ubersmith.com \u2022 debian-test.nyc3.do.ubersmith.com",
        "Bethseda Map - High Priority Alerts:  antiemu_wine banker_zeus_p2p",
        "prod.foundry.tylertechai.com \u2022 qa.foundry.tylertechai.com \u2022 staging.foundry.tylertechai.com \u2022",
        "millet-usgc-1.palantirfedstart.com",
        "critical-failure-alert8768.70jf59844149.com-1kafl-hs0pt4m8f.trade",
        "Domains Contacted: www.microsoft.com www.bing.com www2.megawebdeals.com ocsp.pki.goog",
        "Alerts: stealth_timeout dll_load_uncommon_file_types antidebug_setunhandledexceptionfilter",
        "State (or random \u2022_- hackers) erased evidence of targets insurance all paid for by target.",
        "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com",
        "Target also owned an online brokerage & lead company, was agent & insurance marketer for years.",
        "Sigma: Matches rule Remote Access Tool Services Have Been Installed - Security by Connor Martin, Nasreddine Bencherchali (Nextron Systems)",
        "If someone has Medicare it\u2019s wise to check with carrier & providers to see policies generated by AI",
        "https://widget-i18n.tiktokv.com.ttdns2.com/ \u2022  https://stella.demand-iq.com/widget",
        "Paid for plan long after entity put target on a state plan. Target audited for making too much money (framed)",
        "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
        "I\u2019d like to make an appeal. Please stop. Your original target has gone away.",
        "Python Wheel package",
        "Bethseda Map - Yara Detections Delphi ,  InnoSetupInstaller",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Original Filename: RMS Module PrivateBuild \u2022 ProductName \u2022 RMS ProductVersion 6.0",
        "Sigma: Matches rule Compression Utility Passed Uncommon Directory (via cmdline) by SOC Prime Team",
        "DoD Network Information Center (DNIC)",
        "If you find anything interesting please research it.",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "Antivirus Detections: Yara.Trojan.Remoteadmin-151 (29:30 BST) - a full list of key details:-1-2-3-4.",
        "Alerts: antivm_checks_available_memory queries_keyboard_layout",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "I hope this goes smoothly. I believe will be a nightmare as witnessed. I hope I\u2019m wrong.",
        "DoD Network Information Center disa.columbus.ns.mbx.arin-registrations@mail.mil [seen throughout}",
        "Alerts: resumethread_remote_process reads_self stealth_window uses_windows_utilities",
        "Provided documented evidence of appealed state issued plan and disclosed financials.",
        "Alerts:  network_cnc_http network_http creates_exe uses_windows_utilities",
        "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
        "https://www.youtube.com/watch?v=5KmpT-BoVf4",
        "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/visa/challenge/brw/get/210/d5caee55-c7ae-4b3a-8be7-b65fa5f885c9",
        "Signa: Matches rule Msiexec Quiet Installation by frack113",
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy.",
        "Domains Contacted: www2.megawebfind.com www.google.com www6.megawebfind.com",
        "Related Trump pulse:  https://otx.alienvault.com/pulse/68c954a80675ccc89b0e9b63",
        "www.onyx-ware.com \u2022 https://www.endgamesystems.com/",
        "https://otx.alienvault.com/indicator/file/f3a939131ffaf473f8b1ffa0cd11d8cbce46f50dcc7e9fd2ff8404201ab5bc8e",
        "Vehicle described as Midnight blue , attempted to hit target at a high rate of speed when target left",
        "widget-va.tiktokv.com.ttdns2.com \u2022 http://widget-i18n.tiktokv.com.ttdns2.com/",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://forensic.manuals.mobiledit.com/MM/how-to-install-correct-apple-drivers (ASP.NET)",
        "https://download.mobiledit.com/drivers/setup_cdd_apple_1_0_10_0.exe",
        "Don\u2019t click! https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking | Infected systems",
        "Bethseda Map - High Priority Alerts: ransomware_mass_file_delete antivm_firmware",
        "Alerts: network_icmp persistence_autorun antivm_vmware_in_instruction network_http",
        "IDS: Matches rule PROTOCOL-ICMP Unusual PING detected",
        "IDS: MALWARE-CNC Win.Trojan.Rfusclient outbound connection",
        "IDS: Win32/Tofsee.AX google.com connectivity check Query to a *.top domain -",
        "TrojanWin32Scoreem - CodeOverlap [616fc7047d6216f7a604fa90f2f2dd0ad5b12f1153137e43858d3421ba964ea4]",
        "Very dangerous. Has been going on for 12+ years affecting everyone who knew target.",
        "https://www.google.com/search",
        "Installed on Tsara Brashears phone in a drive up incident in October 2024",
        "Remotewd.com devices",
        "EXE:CompanyName \u2022 TektonIT EXE:EntryPoint:0x121cf \u2022 EXE:FileDescription RMS Component",
        "Don\u2019t ask questions. Just terrorize. destroy equipment paid for by US citizens. What\u2019s yours is theirs.",
        "https://otx.alienvault.com/indicator/hostname/palantir.hosted-by-discourse.com",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "Alerts: recon_fingerprint antisandbox_sleep dynamic_function_loading encrypted_ioc",
        "https://forensic.manuals.mobiledit.com/MM/how-to-install-correct-apple-drivers",
        "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
        "6.0.0.0 United States AS749 DOD network information center \u2022 Historical telemetry",
        "docs-old.ubersmith.com \u2022 edgevana.trial.ubersmith.com",
        "http://www.whatbrowser.com/intl/en/ \u2022 ghb.console.adtarget.com.tr.88.1.8b13f8ac.roksit.net",
        "Target no longer able to provide info. Paper tags over real Co#LP on car dark colored car.",
        "target.dropboxbusiness.com",
        "Won appeal. Denied stimulus until passing another audit showing taxable income and filed taxes",
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "Alerts: antisandbox_sleep creates_exe dropper stealth_window injection_process_search protection_rx",
        "IDS: PROTOCOL-ICMP PING Windows  PROTOCOL-ICMP PING PROTOCOL-ICMP Echo Reply",
        "Domains Contacted:  www.microsoft.com www.bing.com www2.megawebdeals.com ocsp.pki.goog www.download.windowsupdate.com ifdnzact.com d38psrni17bvxu.cloudfront.net www2.megawebfind.com www.google.com www6.megawebfind.com",
        "Same target l followed and observed at Metro T-mobile on Evans & Federal in Denver",
        "Malware packed. Haven\u2019t sorted all.",
        "A clients infected now former iOS device.",
        "IDS: PUA-OTHER RMS rmansys remote management tool cnc communication",
        "afraid.org | evergreen.afraid.org",
        "https://webapps.stackexchange.com/questions/172215/google-videos-search-sca-esv-query-parameter-possible-tracking",
        "6.0.0.0 Deep Impact: +Tsara Brashears , +callmeDoris , +Merkd1904 , +scnrscnr,  likely dorkingbeauty",
        "consolefoundry.date \u2022 http://consolefoundry.date",
        "Yara Detections: RansomWin32Apollo \u2022 216.239.32.27",
        "http://link.monetizer101.com/widget/custom-2.0.2/templates/1",
        "Affects : Kailula4 , scnrscnr, SongCulture, Tsara Brashears & associated, ScrnrScrnr , dorkingbeauty",
        "Capabilities: Persistence Create shortcut via IShellLink Communication \u2022 Write and execute a file",
        "IDS: Unique rule identifier: This rule belongs to a private collection",
        "https://link.monetizer101.com/widget/code/1511.js \u2022 https://link.monetizer101.com/widget/code/mirror.js",
        "Alerts: network_icmp modifies_certificates injection_resumethread dumped_buffer",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "gitea.neconsside.com  \u2022 http://f7194.vip/login",
        "Not surprisingly driving a Ford F 150  | Very disturbing incidents continue. Goal clear. Hired to K****",
        "Capabilities: Collection Get geographical location \u2022 Log keystrokes via polling",
        "Researched publicly available information provided by representative of a target\u2019s estate",
        "TektonIT  RMS Component \u2022 6.0 Internal Name \u2022 LegalCopyright\u00a9 2014 TektonIT.",
        "Bethseda Map - High Priority Alerts: modifies_certificates ransomware_dropped_files",
        "(Can't access file- Malware infection files)",
        "Interesting widgets:  https://myid.canon/prd/1.1.30/canonid-assets/gcid-widget.html",
        "https://api.strem.io/api/addonCollectionGet%",
        "Bethseda Map - High Priority Alerts: dumped_buffer2 antisandbox_mouse_hook",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/",
        "aohhpesayw.lawsonengineers.co.",
        "constellation.pcfrpegaservice.net (Pegasus related? idk)",
        "Worn as Watch \u2022 Highlighter yellow & green Large Font. Looks like a toy.  Clearly a weapon",
        "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
        "https://www.youtube.com/supported_browsers?next_url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5KmpT-BoVf4",
        "malware.sale \u2022 http://virii.es/U/Using%20Entropy%20Analysis%20to%20Find%20Encrypted%20and%20Packed%20Malware.pdf",
        "Potential reparations: Spyware ,  Trojan ,  Pegasus ,  DNS ,  Graphite ,  Paragon ,   NSO Group ,  Endgame , Cloudfront",
        "Yara: CATEGORY _7_Zip_Installer ;!@Install@! ;!@InstallEnd@!  7z Igor,Pavlov",
        "I have to breakdown this enormous post over time. I\u2019m going to repost a potential hackers similar post",
        "The attackers are all different races, Caucasian, African American, Asian, Indian, Persian, Ethiopian, and ambiguous",
        "https://link.monetizer101.com/widget/code/dailystaruk.js",
        "September began with false information, defaulted claims , denials from authorized  services rendered years prior.",
        "https://passwords.google/?utm_medium=hpp&utm",
        "On behalf of pcfrpegaservice.net owner Name Servers\tNS-1477.AWSDNS-56.ORG Org\tIdentity Protection Service",
        "System has placed affected on multiple policies cancelling private policy without notice.",
        "IDS Detections: Win32/Unruy.C Activity",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://securityaffairs.com/109671/hacking/50000-home-cameras-hacked.html",
        "https://apideveloper.santander.cl/sancl/partner/transaction_authorization/v1/coordinate_card/acs/visa/challenge/brw/get/220/6b180faa-7ce7-4e26-a3b0-aa241497c70f",
        "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
        "talos-staging.palantirfoundry.com \u2022 tylertechai.com \u2022 Palantir Technologies Inc.\u2022 palantirfoundry.com",
        "http://link.monetizer101.com/widget/custom-2.0.3/js/load.min.js \u2022",
        "sentient.industries affects independent artists. Affects several others.",
        "Attempted, overt side swipe of family member of target in City Park , by W/M w/US Army tags",
        "Domains Contacted: www.download.windowsupdate.com ifdnzact.com d38psrni17bvxu.cloudfront.net",
        "https://passwords.google/?utm_medium=hpp&utm_source=google&utm_campaign=sid2023aunonenms",
        "Try LogMeIn Resolve For Free \u2014 Powerful tools for device management and remote software installs from LogMeInResolve.",
        "https://securityaffairs.com/181338/security/google-fixed-chrome-flaw-found-by-big-sleep-ai.html",
        "He watched a \u2018target\u2019 while buying least expensive product available. Shirt with US Flag distraction",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://link.monetizer101.com/widget/code/595.js \u2022 https://link.monetizer101.com/widget/code/1343.js",
        "Interesting Strings:  https://pro-api.coinmarketcap.com/v2/cryptocurrency/quotes/historical",
        "Described as an Opaque white skinned , non Caucasian bald male. Clearly Persian or Israeli (other) Russian?",
        "2012647\tDropbox.com Offsite File Backup in Use",
        "Likely Hostile Http Client Body contains pwd= in cleartext Cleartext WordPress Login",
        "Non white or African American , black haired Middle Eastern 55+ male in non discreet Car",
        "Capabilities: Targeting Identify system language via API",
        "Researched: https://hcpf.colorado.gov/",
        "parking spot on possibly Logan, male tried to clip target at Logan & 18th. No plates",
        "Capabilities: Data-Manipulation Encode data using XOR Hash data with CRC32",
        "Bethseda Map - High Priority Alerts: ransomware_file_moves ransomware_appends_extensions",
        "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
        "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "Machiavellians have already built a new world with a world. Some fear the Apocalypse they created.",
        "Alerts: allocates_rwx antisandbox_foregroundwindows",
        "I can\u2019t vouch for the safety of website above. First time user."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Quickstart"
          ],
          "malware_families": [
            "#lowfi:hstr:msil/malicious",
            "Win32/nemucod",
            "Win.malware.zusy",
            "Alf:heraklezeval:pws:win32/qqpass!rfn",
            "Trojandropper:win32/bcryptinject.b!msr",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47",
            "Worm:win32/autorun.xxy!bit",
            "Trojan:win32/vflooder!rfn",
            "Win.trojan.clicker-3506",
            "Win32:evo",
            "Ddos:win32/stormser.a",
            "Trojan:win32/zusy",
            "Bancos",
            "Backdoor:win32/fynloski.a",
            "Win32:banker",
            "Trojan:win32/blihan.a",
            "Trojan:win32/pariham.a",
            "Ransom",
            "Win.downloader.unruy-10026469-0",
            "#lowfi:suspicioussectionname",
            "Win.trojan.fraudpack",
            "Win.trojan.jorik-130",
            "Win.malware.sfwx-9853337-0",
            "Project nemesis",
            "#lowfi:hstr:msil/malicious.decryption",
            "Backdoor:win32/tofsee.t",
            "Malwarex",
            "Malwarex-gen",
            "Trojandropper:win32/muldrop",
            "#lowfidetectsvmware",
            "Win.malware.kolab-9885903-0",
            "Trojan:win32/toga",
            "Mydoom",
            "Trojan:win32/qbot.r!mtb",
            "Fakeav",
            "Win32:trojanx-gen\\ [trj]",
            "Multiple malware attack",
            "Hacktool:win32/autokms",
            "Trojan:win32/kaicorn!rf",
            "A variant of win32/kryptik.deoa",
            "Alf:hstr:trojandownloader:win32/purityscan.a!bit",
            "Carbanak",
            "Win.trojan.rfusclient",
            "Trojan:win32/gandcrab",
            "Xanfpezes.a",
            "Cobalt strike",
            "Lizar",
            "Win.packed.razy-9785185-0",
            "Trojan:win32/zbot.sibl!mtb",
            "#lowfienabledtcontinueafterunpacking",
            "Alf:jasyp:pua:win32/bibado",
            "Tofsee",
            "Win.malware.urelas",
            "Other dangerous malware",
            "Win.malware.remoteadmin-7056666-0",
            "Trojandownloader:win32/upatre",
            "Trojandropper:win32/muldrop.v!mtb",
            "Ymacco",
            "Virtool:win32/obfuscator.ki",
            "Alf:heraklezeval:pua:win32/ultradownloads",
            "Other malware",
            "Custom malware",
            "Alf:exploit:win32/gsharedinforef.a",
            "Trojan:bat/musecador",
            "Win32:trojan",
            "Unix.dropper.mirai-7135858-0",
            "Lockbit",
            "Win.dropper.tiggre-9845940-0",
            "Virtool:win32/ceeinject.akz!bit",
            "Et",
            "Trojandownloader:html/adodb.gen!a",
            "Domino",
            "Nufs_inno",
            "Worm:win32/autorun",
            "Win.trojan.cycler-47",
            "Tulach",
            "Toga!rfn",
            "Win32:dropper",
            "Trojandownloader:win32/upatre.a",
            "Script exploit",
            "Win32:malware",
            "Upatre",
            "Win32:downloader-gjk\\ [trj]",
            "#lowfi:hstr:monitoringtool:tektonit",
            "Win.malware.eclz-9953021-0",
            "Win32:malwarex",
            "Alf:heraklezeval:trojandownloader:html/adodb!rfn",
            "Win32:cleaman-k\\ [trj]",
            "Hematite",
            "Trojan:win32/glupteba.mt!mtb",
            "Malware + code overlap",
            "Asacky",
            "Wannacry",
            "Win.trojan.remoteadmin-151",
            "Trojan:win32/magania.dsk!mtb",
            "Win.trojan.fakecodecs-119",
            "Zegost",
            "Dotnet",
            "Win.trojan.jorik-149",
            "Win.malware.midie-6847892-0",
            "Win.trojan.bulz-9860169-0",
            "E5",
            "Kentuchy",
            "Win.downloader.109205-1",
            "Win.malware.jaik-9968280-0",
            "Win32:malob-bx\\ [cryp]",
            "Floxif",
            "Trojanspy:win32/banker.ly",
            "Alf:hstr:dotnet",
            "Ransom:msil/genasom.i",
            "Pws",
            "Backdoor:win32/plugx.n!dha",
            "Malware",
            "Worm:win32/autorun.b",
            "Nids",
            "Win.malware (30)",
            "Win.malware.unruy-6912804-0",
            "Trojan:win32/zombie.a",
            "Neshta",
            "Trojan:win32/floxif.e",
            "Win.trojan.generic-9862772-0",
            "Pws:win32/qqpass.b!mtb",
            "Win.dropper.unruy-9994363-0",
            "Worm:win32/cambot!rfn"
          ],
          "industries": [
            "Oil",
            "Financial",
            "Telecommunications",
            "Healthcare",
            "Media",
            "Hospitality",
            "Government",
            "Civilian",
            "Technology"
          ],
          "unique_indicators": 144280
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/lxcvc.com",
    "whois": "http://whois.domaintools.com/lxcvc.com",
    "domain": "lxcvc.com",
    "hostname": "microsoftonline.cdnsvc.com.lxcvc.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 23,
  "pulses": [
    {
      "id": "69aa0a62f94a92b5168405c2",
      "name": "fedpaypal clone Q vashti",
      "description": "",
      "modified": "2026-03-06T06:39:27.872000",
      "created": "2026-03-05T22:57:38.559000",
      "tags": [
        "present sep",
        "virtool",
        "cryp",
        "win32",
        "ip address",
        "trojan",
        "ransom",
        "asn as54113",
        "passive dns",
        "msil",
        "united states",
        "dynamicloader",
        "qaeaav12",
        "high",
        "qbeipbdii",
        "write",
        "paypal",
        "medium",
        "search",
        "vmware",
        "floodfix",
        "malware",
        "united",
        "mtb apr",
        "hostname add",
        "write c",
        "read c",
        "yara detections",
        "upxoepplace",
        "next",
        "markus",
        "april",
        "ping",
        "meta http",
        "content",
        "gmt server",
        "th th",
        "443 ma2592000",
        "ipv4 add",
        "url analysis",
        "urls",
        "body",
        "title",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "t1590 gather",
        "victim network",
        "status",
        "name servers",
        "set cookie",
        "script urls",
        "present feb",
        "cookie",
        "template",
        "present oct",
        "present jul",
        "present dec",
        "present jun",
        "next associated",
        "urls show",
        "date checked",
        "present apr",
        "url hostname",
        "united kingdom",
        "unknown ns",
        "servers",
        "great britain",
        "msr aug",
        "msr apr",
        "msr nov",
        "ite o",
        "server response",
        "script script",
        "files show",
        "date hash",
        "avast avg",
        "creation date",
        "lcid1033",
        "sminnotek",
        "spnvirtualbox",
        "bvvirtualbox",
        "present mar",
        "present nov",
        "exploit",
        "error",
        "server response",
        "google safe",
        "results sep",
        "backdoor",
        "certificate",
        "mtb sep",
        "next http",
        "scans show",
        "present may",
        "results jun",
        "results jan",
        "worm",
        "echo request",
        "sweep",
        "payload hello",
        "world",
        "ids detections",
        "cape",
        "viking",
        "philis",
        "et",
        "torop",
        "des moines",
        "contacted hosts",
        "content reputation",
        "sabey type",
        "tulach type",
        "rexx type",
        "foundry type",
        "fred scherr",
        "twitter",
        "apple",
        "monitored target",
        "financial theft",
        "psalms 27: 1 - 14"
      ],
      "references": [
        "fed.paypal.com [redirect for monitored target \u2022 1st documented 2020- still active]",
        "nr-data.net \u2022 init.ess.apple.com\t\u2022 apple-id-ifind.com \u2022 https://apple-id-ifind.com/\t\u2022 apple-lostandfound.com",
        "https://www.speakup.it/magazines/places/new-york-city-on-a-budget-big-apple-little-money_2368",
        "https://login.apple-mac.banugoker.com/cgi-sys/defaultwebpage.cgi \u2022 lsupport-apple.com",
        "login.apple-mac.banugoker.com \u2022 www.apple-mac.banugoker.com \u2022 http://apple-mac.banugoker.com/",
        "https://apple-mac.banugoker.com/ \u2022 https://login.apple-mac.banugoker.com/",
        "http://45.159.189.105/bot/regex \u2022 https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com \u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t \u2022 https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://www.mof.gov.cn.lxcvc.com/ \u2022 http://www.mohurd.gov.cn.lxcvc.\u2022 com/ \u2022 https://www.csrc.gov.cn.lxcvc.com/",
        "https://lk-prod-webcol.laika.com.co/category/bog/cat/farmacia/collares-isabelinos/todos/todo-para-mascota/1",
        "https://twitter.com/PORNO_SEXYBABES \u2022  https://megapornfreehd.com/2025/04/360",
        "https://57d5.zhanyu66.com/com.slamyugllp.strangerrun.xc.apk/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:MalOb-BX\\ [Cryp]",
          "display_name": "Win32:MalOb-BX\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Fraudpack",
          "display_name": "Win.Trojan.Fraudpack",
          "target": null
        },
        {
          "id": "Fakeav",
          "display_name": "Fakeav",
          "target": null
        },
        {
          "id": "Ransom:MSIL/Genasom.I",
          "display_name": "Ransom:MSIL/Genasom.I",
          "target": "/malware/Ransom:MSIL/Genasom.I"
        },
        {
          "id": "Virtool:Win32/Obfuscator.KI",
          "display_name": "Virtool:Win32/Obfuscator.KI",
          "target": "/malware/Virtool:Win32/Obfuscator.KI"
        },
        {
          "id": "Toga!rfn",
          "display_name": "Toga!rfn",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Remoteadmin-7056666-0",
          "display_name": "Win.Malware.Remoteadmin-7056666-0",
          "target": null
        },
        {
          "id": "Floxif",
          "display_name": "Floxif",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Dropper.Unruy-9994363-0",
          "display_name": "Win.Dropper.Unruy-9994363-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Cycler-47",
          "display_name": "Win.Trojan.Cycler-47",
          "target": null
        },
        {
          "id": "Win.Trojan.Clicker-3506",
          "display_name": "Win.Trojan.Clicker-3506",
          "target": null
        },
        {
          "id": "Win.Downloader.Unruy-10026469-0",
          "display_name": "Win.Downloader.Unruy-10026469-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Floxif.E",
          "display_name": "Trojan:Win32/Floxif.E",
          "target": "/malware/Trojan:Win32/Floxif.E"
        },
        {
          "id": "Win.Malware.Urelas",
          "display_name": "Win.Malware.Urelas",
          "target": null
        },
        {
          "id": "Win.Malware.Zusy",
          "display_name": "Win.Malware.Zusy",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "display_name": "ALF:HeraklezEval:PWS:Win32/QQPass!rfn",
          "target": null
        },
        {
          "id": "Win.Malware.Eclz-9953021-0",
          "display_name": "Win.Malware.Eclz-9953021-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "display_name": "ALF:HSTR:TrojanDownloader:Win32/PurityScan.A!bit",
          "target": null
        },
        {
          "id": "Win.Dropper.Tiggre-9845940-0",
          "display_name": "Win.Dropper.Tiggre-9845940-0",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass.B!MTB",
          "display_name": "PWS:Win32/QQpass.B!MTB",
          "target": "/malware/PWS:Win32/QQpass.B!MTB"
        },
        {
          "id": "Win.Malware.Sfwx-9853337-0",
          "display_name": "Win.Malware.Sfwx-9853337-0",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Trojan:Win32/Kaicorn!rf",
          "display_name": "Trojan:Win32/Kaicorn!rf",
          "target": "/malware/Trojan:Win32/Kaicorn!rf"
        },
        {
          "id": "Win32:Banker",
          "display_name": "Win32:Banker",
          "target": null
        },
        {
          "id": "Worm:Win32/Cambot!rfn",
          "display_name": "Worm:Win32/Cambot!rfn",
          "target": "/malware/Worm:Win32/Cambot!rfn"
        },
        {
          "id": "Win32:Malware",
          "display_name": "Win32:Malware",
          "target": null
        },
        {
          "id": "Win.Malware.Midie-6847892-0",
          "display_name": "Win.Malware.Midie-6847892-0",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1133",
          "name": "External Remote Services",
          "display_name": "T1133 - External Remote Services"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1450",
          "name": "Exploit SS7 to Track Device Location",
          "display_name": "T1450 - Exploit SS7 to Track Device Location"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1401",
          "name": "Device Administrator Permissions",
          "display_name": "T1401 - Device Administrator Permissions"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1595.002",
          "name": "Vulnerability Scanning",
          "display_name": "T1595.002 - Vulnerability Scanning"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        },
        {
          "id": "T1588.001",
          "name": "Malware",
          "display_name": "T1588.001 - Malware"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68c5743593a4bcc81dd94b0b",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1323,
        "URL": 4360,
        "FileHash-MD5": 759,
        "FileHash-SHA1": 748,
        "FileHash-SHA256": 5148,
        "domain": 1076,
        "email": 7
      },
      "indicator_count": 13421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "45 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69aa003c63c19b7be7671c65",
      "name": "re post by Q.Vashti cloned",
      "description": "",
      "modified": "2026-03-06T05:11:14.366000",
      "created": "2026-03-05T22:14:20.388000",
      "tags": [
        "filehashmd5",
        "filehashsha256",
        "ipv4",
        "filehashsha1",
        "domain",
        "types",
        "indicators show",
        "search",
        "type indicator",
        "role title",
        "added active",
        "scan",
        "iocs",
        "learn more",
        "related pulses",
        "url https",
        "url http",
        "countrycn",
        "countrycn sep",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "xtblogblockid1",
        "pulses",
        "zdata0",
        "browserie",
        "browserver8",
        "defaultie",
        "ver1360122",
        "defaultch",
        "browserver11",
        "filesize",
        "browserid1",
        "qmark",
        "methodpost"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "68ffa35cd4eefffa0ffbeae1",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 381,
        "FileHash-SHA1": 367,
        "FileHash-SHA256": 767,
        "domain": 179,
        "URL": 1615,
        "hostname": 946,
        "CVE": 1
      },
      "indicator_count": 4256,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "45 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68ffa35cd4eefffa0ffbeae1",
      "name": "Liar Liar! If this were your attorney; you\u2019d pay $$$ to get hacked and they\u2019d gain full CnC of your devices and disappear\u2026",
      "description": "Sample of FAKE attorneys  Liar Liar! If this were your attorney; you\u2019d pay $$$ to get hacked, they\u2019d gain full CnC of devices & disappear into the background , stealing from cloud, spying, etc..Mafia & Government ties. https://magento.hirecar.net/\n*Unix.Dropper.Mirai-7338044\n*Virus:Win32/Virut.BO\n*Trojan:Win32/Delf.EM\n*DDoS.XOR\n*Backdoor.Win32.Shiz.ivr, *Backdoor.Win32/Simda.gen!A\n*Alf:HeraklezEval:DoS:Linux/Xorddos!rfn\n*nUFS_html\n*Trojanspy:Win32/Nivdort.CB\n*Win32/Nystprac.A *Ramnit\n*Win32:Sality  *Upatre\n*Possible_QuasarRAT_Payload\nxor_0x15_xord_javascript\ninvalid_trailer_structure\n#fp539598-VBS/LoveLetter.BT\n*Trojanspy:Win32/Nivdort.CB\n*Alf:HeraklezEval:DoS:Linux/Xorddos!rfn\n*Trojan:Win64/Gapro\n\u201cMethodology_RareEquities_Tencent_Proxy\u201d\nvad_contains_network_strings\n*Trojan:Win32/Sisproc!gmb\n*TrojanDownloader:Win32/Upatre\n*PWS:MSIL/Grmasi.YA!MTB\n*Trojan:Win32/Danabot.G\n *Virus:Win32/Virut.EPO\n* Ramnit\nConventionEngine_Term_NewFolder",
      "modified": "2025-11-26T13:01:56.367000",
      "created": "2025-10-27T16:52:44.619000",
      "tags": [
        "filehashmd5",
        "filehashsha256",
        "ipv4",
        "filehashsha1",
        "domain",
        "types",
        "indicators show",
        "search",
        "type indicator",
        "role title",
        "added active",
        "scan",
        "iocs",
        "learn more",
        "related pulses",
        "url https",
        "url http",
        "countrycn",
        "countrycn sep",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "xtblogblockid1",
        "pulses",
        "zdata0",
        "browserie",
        "browserver8",
        "defaultie",
        "ver1360122",
        "defaultch",
        "browserver11",
        "filesize",
        "browserid1",
        "qmark",
        "methodpost"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 381,
        "FileHash-SHA1": 367,
        "FileHash-SHA256": 767,
        "domain": 178,
        "URL": 1615,
        "hostname": 944
      },
      "indicator_count": 4252,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "144 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69069167e1e2a222bd7762f2",
      "name": "Palantir - Spyware",
      "description": "",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-11-01T23:01:59.339000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": "68f9a1ef2dd26ec62a3c298c",
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "privacynotacrime",
        "id": "349346",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 57,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9a6f4e35193c04401daaf",
      "name": "Emotet & VirTool Obsfuscator - Registrar abuse tracking civilians",
      "description": "",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-10-23T03:54:28.671000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": "68f9a1ef2dd26ec62a3c298c",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9a1ef2dd26ec62a3c298c",
      "name": "Listeners - Malicious Over the top espionage | Cyber Warfare?",
      "description": "Cyber attacks on targeted devices stored safely, separately, don\u2019t communicate with one another. PalantirFoundry.com shares IP addresses with Fastly. South African IP\u2019s and DGA domains bounce from US Denver , Co based IP and Domain addresses. Registrar Abuse: HTTP/2 404 content type: text/html content length: 2263 date: Wed 22 Oct 2025 22:32:18 GMT server: Envoy\n443 Certificate Subject: US\n443 Certificate Subject: Colorado\n443 Certificate Subject: Denver\n443 Certificate Subject: Palantir Technologies Inc.\n443 Certificate Subject: listeners.usw-19.palantirfoundry.com",
      "modified": "2025-11-22T00:01:42.464000",
      "created": "2025-10-23T03:33:03.315000",
      "tags": [
        "url https",
        "url http",
        "hostname",
        "mulweli",
        "mphomafmulweli",
        "indicator role",
        "ipv4",
        "type indicator",
        "added active",
        "related pulses",
        "united",
        "envoy error",
        "certificate",
        "urls",
        "emails",
        "active related",
        "africa",
        "span",
        "gmt server",
        "colorado",
        "denver",
        "palantir",
        "listen",
        "listen linda",
        "linda listen",
        "listeners @ dantesdragon",
        "palantir",
        "all y",
        "se referen",
        "data upload",
        "extraction",
        "extra",
        "referen data",
        "overview domain",
        "passive dns",
        "files ip",
        "address",
        "asn asnone",
        "as14618",
        "all se",
        "include review",
        "exclude sugges",
        "failed",
        "typo",
        "status",
        "search",
        "record value",
        "server",
        "domain status",
        "key identifier",
        "x509v3 subject",
        "full name",
        "registrar abuse",
        "registrar",
        "data",
        "v3 serial",
        "code",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "sha256",
        "united states",
        "power query",
        "microsoft learn",
        "ordenar por",
        "foundry",
        "input",
        "blocked",
        "error id",
        "conector",
        "por ejemplo",
        "sensitive",
        "quickstart",
        "present aug",
        "present oct",
        "unknown ns",
        "showing",
        "present sep",
        "moved",
        "title",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "asnone dns",
        "resolutions",
        "dga domain",
        "ipv4 add",
        "url analysis",
        "name servers",
        "div div",
        "expiration date",
        "page",
        "present nov",
        "present jan",
        "present dec",
        "present mar",
        "present feb",
        "virtool",
        "cryp",
        "error",
        "win32",
        "domain",
        "ip address",
        "domain add",
        "next associated",
        "pulse pulses",
        "ashburn",
        "extr referen",
        "exclude",
        "sugges",
        "pulse submit",
        "date",
        "present jul",
        "present jun",
        "fastly error",
        "please",
        "handle",
        "entity",
        "record type",
        "ttl value",
        "msms93992282",
        "read c",
        "show",
        "medium",
        "tlsv1",
        "whitelisted",
        "module load",
        "t1129",
        "execution",
        "dock",
        "write",
        "persistence",
        "next",
        "unknown",
        "connector",
        "cybercrime",
        "harassment"
      ],
      "references": [
        "Products are being abused. Users are over zealous at blocking targets from basic human rights and privacy."
      ],
      "public": 1,
      "adversary": "Quickstart",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Multiple Malware Attack",
          "display_name": "Multiple Malware Attack",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1211",
          "name": "Exploitation for Defense Evasion",
          "display_name": "T1211 - Exploitation for Defense Evasion"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1027.005",
          "name": "Indicator Removal from Tools",
          "display_name": "T1027.005 - Indicator Removal from Tools"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1132.002",
          "name": "Non-Standard Encoding",
          "display_name": "T1132.002 - Non-Standard Encoding"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        }
      ],
      "industries": [
        "Technology",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2865,
        "URL": 5728,
        "email": 11,
        "FileHash-MD5": 91,
        "FileHash-SHA1": 75,
        "FileHash-SHA256": 1713,
        "domain": 1193,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11679,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 180,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9372439f9a3973097393f",
      "name": "South African actors are criminally insane Palantir product abusers or employees",
      "description": "Attempting to wip disks and delete files. Threat actors nearby. \u2018Endgame\u2019 project typically found alongside Project Hilo , Project Helix , Palantir and Foundry. I\u2019m just researching to solve what I thought would be far less complex issues. Stop doing this. Target rarely left house after contact with \u2018watcher\u2019 \u2018MVA by a young 22 year old male also left victim in fear til the end. \nI\u2019m going to call out on anyone pretending to be some else \u2018stop making contact with targets family and associates.\u2019 No one has been pursued or paid for crimes against target. This needs to end.\n\nSouth African actors are criminally insane Palantir product users or employees \n\n#phishing + malware , dns , file deletion attacks. \n\n[OTX auto populated The following is the full text of Entrust, Inc. - for the use of the terms \"entrust\" and \"sassa.gov.za\" - in terms of terms and conditions. ]\n\nIt makes sense. I\u2019m in town. 5 blocks away heading towards SoBo. Hi! Stop",
      "modified": "2025-11-21T19:01:20.179000",
      "created": "2025-10-22T19:57:24.562000",
      "tags": [
        "passive dns",
        "urls",
        "related nids",
        "files location",
        "south africa",
        "flag south",
        "africa hostname",
        "files domain",
        "files",
        "entrust",
        "mulweli",
        "create c",
        "read c",
        "delete",
        "write",
        "search",
        "show",
        "create",
        "medium",
        "showing",
        "unicode",
        "next",
        "dock",
        "execution",
        "copy",
        "t1199",
        "relationship",
        "t1561",
        "wipe",
        "t1053",
        "taskjob",
        "t1055",
        "injection",
        "t1056",
        "capture",
        "url https",
        "url http",
        "malware attacks",
        "find encrypted",
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "city",
        "county",
        "otx auto",
        "title",
        "net security",
        "tags"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1561",
          "name": "Disk Wipe",
          "display_name": "T1561 - Disk Wipe"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 597,
        "domain": 78,
        "hostname": 270,
        "FileHash-SHA256": 183,
        "FileHash-MD5": 19,
        "FileHash-SHA1": 5
      },
      "indicator_count": 1152,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f93b1cebf80f48450bd517",
      "name": "Yuner - File deletion and Disk Wiping / Cyberstalking ",
      "description": "",
      "modified": "2025-11-21T18:02:11.054000",
      "created": "2025-10-22T20:14:20.632000",
      "tags": [
        "server nginx",
        "date fri",
        "etag w",
        "urls",
        "passive dns",
        "acceptranges",
        "contentlength",
        "date thu",
        "gmt expires",
        "server",
        "code",
        "link",
        "script script",
        "south africa",
        "ipv4",
        "files",
        "location south",
        "accept",
        "present aug",
        "certificate",
        "hostname add",
        "domain",
        "files ip",
        "unknown a",
        "script urls",
        "ip address",
        "unknown soa",
        "unknown ns",
        "reverse dns",
        "africa flag",
        "asn as16637",
        "dns resolutions",
        "domains top",
        "level",
        "unique tld",
        "related pulses",
        "tags none",
        "indicator facts",
        "title",
        "ipv4 add",
        "opinion",
        "netacea",
        "lockbit",
        "wannacry attack",
        "nhs trusts",
        "council",
        "uk government",
        "protect",
        "cni safe",
        "acls",
        "praio",
        "prink",
        "prsc",
        "prla",
        "lg2en",
        "cti98",
        "search",
        "seiko epson",
        "corporation",
        "arc file",
        "malware",
        "delete c",
        "default",
        "show",
        "write",
        "next",
        "unknown",
        "united",
        "tlsv1",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "as15169",
        "port",
        "execution",
        "dock",
        "capture",
        "persistence",
        "yara detections",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "cabinet archive",
        "microsoft",
        "read c",
        "dynamicloader",
        "medium",
        "ltda me",
        "high",
        "write c",
        "entries",
        "checks",
        "delphi",
        "win32",
        "url pulse",
        "data upload",
        "extraction",
        "find suggested",
        "type",
        "domain hostname",
        "url add",
        "http",
        "related nids",
        "files location",
        "ireland flag",
        "files domain",
        "chrome",
        "ireland unknown",
        "pulse submit",
        "url analysis",
        "body",
        "date",
        "status",
        "name servers",
        "creation date",
        "expiration date",
        "flag united",
        "destination",
        "systemdrive",
        "html document",
        "crlf line",
        "updater",
        "copy",
        "unknown aaaa",
        "moved",
        "domain add",
        "extri data",
        "enter sc",
        "extr include",
        "review exclude",
        "sugges",
        "present jul",
        "saudi arabia",
        "present mar",
        "present oct",
        "present jun",
        "present feb",
        "present nov",
        "present may",
        "eeee",
        "eeeeeee",
        "eeeeee",
        "eefe",
        "ebeee",
        "ee eme",
        "eeheee",
        "eeefee e",
        "eeeee e",
        "vmprotect",
        "push",
        "local",
        "defender",
        "regsetvalueexa",
        "utf8 unicode"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lockbit",
          "display_name": "Lockbit",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "target": null
        },
        {
          "id": "Other Dangerous Malware",
          "display_name": "Other Dangerous Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1561",
          "name": "Disk Wipe",
          "display_name": "T1561 - Disk Wipe"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Oil"
      ],
      "TLP": "green",
      "cloned_from": "68f9288e0d98f3b44c2cb90c",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 648,
        "hostname": 1604,
        "FileHash-SHA256": 1826,
        "URL": 4153,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 60,
        "SSLCertFingerprint": 18,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 8418,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9288e0d98f3b44c2cb90c",
      "name": "Ultrasounds attack - South African criminal group-Denver, Vo affects critical infrastructure , Oil and public safety",
      "description": "South African and Ethiopian crime group with Denver , Co  presence is not only infiltrating infrastructure from banking to oil, they are human traffickers, hitmen and yes, I received this tip from team member Pheona who a \u2018sassa.gov.za\u2018 South African link recurrently as a top search suggestion in a \u2018targets\u2019  browser. The most frightening piece is that a name listed is of an Ethiopian man who attempted to force a very targeted victim to go somewhere with him,, be his girlfriend and did show up outside of her residence in a different City & County. He also knew the exact name of where she purchased specific items. If you can see this. Please help the best way you can. Something is incredibly wrong. [OTX auto populated Title: We can\u2019t rely on goodwill to protect our critical infrastructure - Help Net Security]",
      "modified": "2025-11-21T18:02:11.054000",
      "created": "2025-10-22T18:55:10.527000",
      "tags": [
        "server nginx",
        "date fri",
        "etag w",
        "urls",
        "passive dns",
        "acceptranges",
        "contentlength",
        "date thu",
        "gmt expires",
        "server",
        "code",
        "link",
        "script script",
        "south africa",
        "ipv4",
        "files",
        "location south",
        "accept",
        "present aug",
        "certificate",
        "hostname add",
        "domain",
        "files ip",
        "unknown a",
        "script urls",
        "ip address",
        "unknown soa",
        "unknown ns",
        "reverse dns",
        "africa flag",
        "asn as16637",
        "dns resolutions",
        "domains top",
        "level",
        "unique tld",
        "related pulses",
        "tags none",
        "indicator facts",
        "title",
        "ipv4 add",
        "opinion",
        "netacea",
        "lockbit",
        "wannacry attack",
        "nhs trusts",
        "council",
        "uk government",
        "protect",
        "cni safe",
        "acls",
        "praio",
        "prink",
        "prsc",
        "prla",
        "lg2en",
        "cti98",
        "search",
        "seiko epson",
        "corporation",
        "arc file",
        "malware",
        "delete c",
        "default",
        "show",
        "write",
        "next",
        "unknown",
        "united",
        "tlsv1",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "as15169",
        "port",
        "execution",
        "dock",
        "capture",
        "persistence",
        "yara detections",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "cabinet archive",
        "microsoft",
        "read c",
        "dynamicloader",
        "medium",
        "ltda me",
        "high",
        "write c",
        "entries",
        "checks",
        "delphi",
        "win32",
        "url pulse",
        "data upload",
        "extraction",
        "find suggested",
        "type",
        "domain hostname",
        "url add",
        "http",
        "related nids",
        "files location",
        "ireland flag",
        "files domain",
        "chrome",
        "ireland unknown",
        "pulse submit",
        "url analysis",
        "body",
        "date",
        "status",
        "name servers",
        "creation date",
        "expiration date",
        "flag united",
        "destination",
        "systemdrive",
        "html document",
        "crlf line",
        "updater",
        "copy",
        "unknown aaaa",
        "moved",
        "domain add",
        "extri data",
        "enter sc",
        "extr include",
        "review exclude",
        "sugges",
        "present jul",
        "saudi arabia",
        "present mar",
        "present oct",
        "present jun",
        "present feb",
        "present nov",
        "present may",
        "eeee",
        "eeeeeee",
        "eeeeee",
        "eefe",
        "ebeee",
        "ee eme",
        "eeheee",
        "eeefee e",
        "eeeee e",
        "vmprotect",
        "push",
        "local",
        "defender",
        "regsetvalueexa",
        "utf8 unicode"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lockbit",
          "display_name": "Lockbit",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "target": null
        },
        {
          "id": "Other Dangerous Malware",
          "display_name": "Other Dangerous Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1561",
          "name": "Disk Wipe",
          "display_name": "T1561 - Disk Wipe"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Oil"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 648,
        "hostname": 1604,
        "FileHash-SHA256": 1826,
        "URL": 4153,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 60,
        "SSLCertFingerprint": 18,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 8418,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "149 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f80c6bcd3fff3a4f126a68",
      "name": "Sventore \u2022 Agent Tesla Affecting targeted Dropbox & EBay Accounts accessing , using or deleting information ",
      "description": "",
      "modified": "2025-11-20T17:00:05.377000",
      "created": "2025-10-21T22:42:51.657000",
      "tags": [
        "united",
        "urls",
        "domain",
        "files",
        "files ip",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "arial",
        "worm",
        "trojandropper",
        "meta",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "present oct",
        "present jul",
        "present sep",
        "present aug",
        "moved",
        "ip address",
        "error",
        "title",
        "ipv4 add",
        "url analysis",
        "hosting",
        "reverse dns",
        "america flag",
        "name servers",
        "body",
        "a domains",
        "passive dns",
        "welcome",
        "ok server",
        "gmt content",
        "twitter",
        "dynamicloader",
        "write c",
        "medium",
        "myapp",
        "high",
        "host",
        "delphi",
        "write",
        "code",
        "malware",
        "device driver",
        "backdoor",
        "msil",
        "present mar",
        "apanas",
        "regsetvalueexa",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "langturkish",
        "sublangdefault",
        "regdword",
        "persistence",
        "execution",
        "nids",
        "zegost",
        "trojan",
        "win32fugrafa",
        "malwarexgen att",
        "ck ids",
        "t1040",
        "sniffing",
        "location united",
        "united states",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) ",
        "yara rule",
        "search",
        "blobx00x00x00",
        "guard",
        "encrypt",
        "afraid",
        "smartphone",
        "laptop",
        "tablet",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "ascii text",
        "size",
        "mitre att",
        "show technique",
        "refresh",
        "span",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "access att",
        "t1566 phishing",
        "font",
        "pattern match",
        "general",
        "contact",
        "premium",
        "never",
        "core",
        "external system",
        "http header",
        "network traffic",
        "sample",
        "antivirus",
        "systems found",
        "ipurl artifact",
        "network related",
        "sends traffic",
        "http outbound",
        "hostname add",
        "address",
        "registrar",
        "internet ltd",
        "livedomains",
        "creation date",
        "hostname",
        "domain add",
        "modrg",
        "sincpoatia",
        "utf8",
        "appdata",
        "temp",
        "fyfdz",
        "iepgq",
        "trlew",
        "copy",
        "kentuchy",
        "oljnmrfghb",
        "powershell",
        "sabey",
        "sokolove law"
      ],
      "references": [
        "afraid.org | evergreen.afraid.org",
        "https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1\t \twww.dropbox.com",
        "https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1",
        "https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1",
        "Interesting: i.circusslaves.com \u2022 linkupdateuser.circusslaves.com \u2022 https://rip.circusslaves.com/",
        "Interesting: demo.emaa.cl \u2022 wanndemo.de \u2022 songmeanings.net",
        "KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI",
        "https://api.strem.io/api/addonCollectionGet%",
        "http://freedns.afraid.org/safety/?host=signin.ebay.com.ws.ebayisapi.dll.signin.usingssl.www.ebay.com.fr.am",
        "aohhpesayw.lawsonengineers.co.",
        "Very Disappointing- foundry.neconsside.com  \u2022 ftp.koldunmansurov.ru",
        "gitea.neconsside.com  \u2022 http://f7194.vip/login",
        "2012647\tDropbox.com Offsite File Backup in Use",
        "target.dropboxbusiness.com",
        "consolefoundry.date \u2022 http://consolefoundry.date",
        "http://consolefoundry.date/one/gate.php \u2022 foundry.neconsside.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "NIDS",
          "display_name": "NIDS",
          "target": null
        },
        {
          "id": "Neshta",
          "display_name": "Neshta",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski.A",
          "display_name": "Backdoor:Win32/Fynloski.A",
          "target": "/malware/Backdoor:Win32/Fynloski.A"
        },
        {
          "id": "Zegost",
          "display_name": "Zegost",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.XXY!bit",
          "display_name": "Worm:Win32/AutoRun.XXY!bit",
          "target": "/malware/Worm:Win32/AutoRun.XXY!bit"
        },
        {
          "id": "MalwareX-Gen",
          "display_name": "MalwareX-Gen",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun.B",
          "display_name": "Worm:Win32/AutoRun.B",
          "target": "/malware/Worm:Win32/AutoRun.B"
        },
        {
          "id": "Trojan:Win32/Pariham.A",
          "display_name": "Trojan:Win32/Pariham.A",
          "target": "/malware/Trojan:Win32/Pariham.A"
        },
        {
          "id": "Kentuchy",
          "display_name": "Kentuchy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1528",
          "name": "Steal Application Access Token",
          "display_name": "T1528 - Steal Application Access Token"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "68f7ced2cf17d264b49628bc",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 483,
        "hostname": 1397,
        "URL": 2874,
        "email": 2,
        "FileHash-MD5": 369,
        "FileHash-SHA1": 355,
        "FileHash-SHA256": 1534,
        "SSLCertFingerprint": 7
      },
      "indicator_count": 7021,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "150 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://microsoftonline.cdnsvc.com.lxcvc.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://microsoftonline.cdnsvc.com.lxcvc.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776670409.8760056
}