{
  "type": "URL",
  "indicator": "https://mipo7.live.fiba3x3vs.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://mipo7.live.fiba3x3vs.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4165830633,
      "indicator": "https://mipo7.live.fiba3x3vs.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "6958780c8479a9d69920c3d8",
          "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
          "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
          "modified": "2026-02-02T01:02:46.327000",
          "created": "2026-01-03T01:59:40.530000",
          "tags": [
            "united",
            "moved",
            "title",
            "passive dns",
            "ipv4 add",
            "urls",
            "files",
            "hosting",
            "reverse dns",
            "location united",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "read c",
            "create c",
            "medium",
            "search",
            "memcommit",
            "high",
            "checks",
            "windows",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "local",
            "ref b",
            "wed may",
            "backdoor",
            "mtb aug",
            "next associated",
            "mtb dec",
            "twitter",
            "smoke loader",
            "malware",
            "virtool",
            "hacktool",
            "data upload",
            "present dec",
            "mtb apr",
            "win32",
            "trojan",
            "worm",
            "lowfi",
            "cybota",
            "expiration date",
            "name servers",
            "ipv4",
            "url analysis",
            "port",
            "destination",
            "telnet login",
            "bad login",
            "gpl telnet",
            "suspicious path",
            "busybox",
            "tcp syn",
            "et telnet",
            "path",
            "mirai",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "america",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "learn",
            "t1179 hooking",
            "installs",
            "t1035 service",
            "adversaries",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "y013",
            "flag",
            "span",
            "accept",
            "core",
            "february",
            "hybrid",
            "malicious",
            "general",
            "click",
            "strings",
            "roboto",
            "next",
            "usa windows",
            "finished",
            "queueprogress",
            "timestamp input",
            "threat level",
            "october",
            "september",
            "hwp support",
            "fresh",
            "win64",
            "khtml",
            "gecko",
            "brand",
            "microsoft edge",
            "programfiles",
            "comspec",
            "model",
            "iframe",
            "form",
            "listeners",
            "initial access",
            "t1590 gather",
            "victim network",
            "ssl certificate",
            "quasi government",
            "jeffrey reimer",
            "palantir",
            "Regis university",
            "otx hp",
            "apple",
            "pegasus",
            "h5 data center",
            "florence colorado",
            "brian sabey",
            "target : Tsara Brasheaers",
            "aig",
            "industry and commerce",
            "united states",
            "State of Colorado.",
            "date",
            "status",
            "domain",
            "hostname add",
            "pulse pulses",
            "files ip",
            "address",
            "url https",
            "url http",
            "hostname",
            "show",
            "type indicator",
            "source hostname",
            "entries",
            "Prometheus Intelligence Technology",
            "pulse submit",
            "america flag",
            "body",
            "dynamicloader",
            "microsoft azure",
            "tls issuing",
            "named pipe",
            "json",
            "ascii text",
            "lredmond",
            "Apple",
            "Telnet",
            "BusyBox",
            "Pegasus",
            "Colorado State Fixer: Christopher P. Ahmann",
            "Hijacker: Brian Sabey",
            "For: Concentra",
            "Protecting Assaulter: Jeffrey Reimer",
            "For: AIG",
            "For Industry and Commerce",
            "For: Quasi Government",
            "For: Workers Compensation",
            "Authorities",
            "Law Enforcement Dark",
            "Silencing",
            "Tampering with a Victim",
            "Meta",
            "Palantir",
            "Google",
            "Bing",
            "Microsoft",
            "ColoCrossing",
            "Associates",
            "hit men"
          ],
          "references": [
            "ET Telnet |  https://www.colocrossing.com | velocity servers",
            "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
            "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
            "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
            "(legitimate services will remain up-and-running usually) High |  ID dead_host",
            "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
            "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
            "Yara Detections is__elf",
            "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
            "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
            "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
            "https://www.colocrossing.com/",
            "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
            "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
            "104.21.51.140, 172.67.181.41",
            "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
            "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
            "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
            "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
            "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
            "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
            "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
            "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
            "This is hard to comprehend or put into indelible words."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "HackTool:MSIL/Boilod.C!bit",
              "display_name": "HackTool:MSIL/Boilod.C!bit",
              "target": "/malware/HackTool:MSIL/Boilod.C!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1204.002",
              "name": "Malicious File",
              "display_name": "T1204.002 - Malicious File"
            },
            {
              "id": "T1462",
              "name": "Malicious Software Development Tools",
              "display_name": "T1462 - Malicious Software Development Tools"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Technology",
            "Healthcare",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6390,
            "domain": 723,
            "hostname": 1978,
            "FileHash-SHA256": 1912,
            "FileHash-MD5": 410,
            "FileHash-SHA1": 306,
            "email": 3,
            "SSLCertFingerprint": 28,
            "CVE": 3
          },
          "indicator_count": 11753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "76 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "694dc80ac6e7fd5474b316a1",
          "name": "Malicious DDOS attacks targeting Brand New 2025 | Updated Apple Products affecting IRS payment portal",
          "description": "Malicious actors continue to target certain users attempting to pay the IRS. Victim is redirected to : http://sa.www4.irs.gov/ola/payment_options/create_long_term_plan after typing in IRS.gov (w/ secure header \u2018https\u2019 )\nOnce information is input it is payment is rejected, levy against bank accounts and assets and other threats. There is social engineering as one victim is communicating with someone allegedly from the IRS? \nAlthough malicious entities contacted , malicious behavior continues. Adversaries in the Middle attack. US hacker group. Denver, Iowa, Arizona, NY and abroad. \n\n*Targets: https://build.webkit.org/results/Apple-Sequoia-Safer-CPP-Checks/301548@main |",
          "modified": "2026-01-24T22:05:13.068000",
          "created": "2025-12-25T23:26:02.712000",
          "tags": [
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "url http",
            "url https",
            "zipcode",
            "active related",
            "cage01195 dec",
            "passports",
            "ipv4",
            "active",
            "irs",
            "apple",
            "role title",
            "indicator role",
            "malware attacks",
            "find encrypted",
            "lumen",
            "fastly",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "medium",
            "rgba",
            "dock",
            "execution",
            "xport",
            "united",
            "passive dns",
            "urls",
            "expiration date",
            "unknown ns",
            "unknown aaaa",
            "pulse pulses",
            "merit",
            "dod network",
            "type indicator",
            "related pulses",
            "name",
            "name servers",
            "ffffff",
            "ip address",
            "emails",
            "object",
            "clsid6bf52a52",
            "cookie",
            "meta",
            "united kingdom",
            "germany",
            "russia",
            "search",
            "added active",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "href",
            "pattern match",
            "ascii text",
            "ck id",
            "mitre att",
            "ck matrix",
            "t1071",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "beginstring",
            "segoe ui",
            "null",
            "refresh",
            "span",
            "hybrid",
            "strings",
            "error",
            "tools",
            "title",
            "look",
            "verify",
            "restart",
            "data upload",
            "extraction",
            "failed",
            "include data",
            "entries",
            "unicode",
            "high",
            "memcommit",
            "next",
            "flag",
            "process details",
            "path expiresthu",
            "moved",
            "gmt set",
            "domain",
            "httponly path",
            "encrypt",
            "leaseweb",
            "iowa",
            "title added",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "command decode",
            "suricata stream",
            "circle",
            "f5f8fa",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "development att",
            "suricata http",
            "windows nt",
            "date",
            "ips initial",
            "prefetch8",
            "localappdata",
            "prefetch1",
            "programfiles",
            "edge",
            "access att",
            "t1566 phishing",
            "initial access",
            "show process",
            "show technique",
            "process",
            "t1057",
            "contacted",
            "ck techniques",
            "evasion att",
            "body",
            "report spam",
            "apple",
            "ddos",
            "irs created",
            "hours ago",
            "white",
            "apple user",
            "industries",
            "government",
            "finance",
            "trojandropper",
            "appleservice",
            "mirai",
            "trojan",
            "next associated",
            "fastly error",
            "please",
            "sea p",
            "mozilla",
            "accept",
            "alerts",
            "filehash",
            "md5 add",
            "av detections",
            "ids detections",
            "yara detections",
            "analysis date",
            "file score",
            "medium risk",
            "copy",
            "richhash",
            "finding notes",
            "clamav malware",
            "files matching",
            "number",
            "sample analysis",
            "samples show",
            "date hash",
            "yara rule",
            "msie",
            "t1063",
            "windows",
            "malware",
            "detected",
            "https domain",
            "tls sni",
            "markus",
            "smartassembly",
            "win64",
            "exif data",
            "present dec",
            "status",
            "showing",
            "show",
            "icmp traffic",
            "pdb path",
            "crlf line",
            "mutex",
            "ms defender",
            "mtb malware",
            "hide samples",
            "rootkit",
            "apple webkit",
            "macbook pro",
            "apple ios"
          ],
          "references": [
            "sa.www4.irs.gov \u2022 sa1.www4.irs.gov \u2022 sa2.www4.irs.gov \u2022 apps.irs.gov \u2022 freetaxassistance.for.irs.gov \u2022 home.treasury.gov \u2022",
            "132.3.48.38 \u2022 Description: CC=US ASN=AS721 dod network information center",
            "154.35.132.70\t\u2022 Description:  CC=US ASN=AS14987 rethem hosting llc",
            "165.206.254.134 \u2022 Description: CC=US ASN=AS6122",
            "192.85.127.130 \u2022 Description:  CC=US ASN=AS2173 hewlett-packard company",
            "195.128.76.205 \u2022 Description: CC=RU ASN=AS8470 jsc macomnet",
            "205.181.242.243 \u2022  Description: CC=US ASN=AS3738 state street bank and trust company",
            "207.75.164.17 \u2022 Description:  CC=US ASN=AS237 merit network",
            "207.75.164.210 \u2022 Description:  CC=US ASN=AS237 merit network",
            "214.25.9.149 \u2022 Description:  CC=US ASN=AS344 dod network information center",
            "216.252.199.59 \u2022 Description:  CC=US ASN=AS31827 biz net technologies",
            "78.46.218.253 \u2022 Description: CC=DE ASN=AS24940 hetzner online gmbh",
            "95.211.7.168 \u2022Description:  CC=NL ASN=AS60781 leaseweb netherlands b.v.",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t- Adult Content",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing - Adult Content",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears - Adult Content",
            "https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ - Adult Content",
            "http://www.anyxxxtube.net/search-porn/ - Adult Content",
            "https://eliyporasa.life/uelbu/5/151504-harleyxwest-porn - Adult Content",
            "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t- Adult Content",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net - Adult Content",
            "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t- Adult Content",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io\t- Adult Content",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io - Adult Content",
            "http://sissy.com/default - Adult Content",
            "https://eliyporasa - Adult Content",
            "64.38.232.180  - Adult Content IP",
            "www.anyxxxtube.net  - Adult Content",
            "www.anyxxxtube.net - Adult Content IP",
            "http://www.iranianporn.com/ \u2022 iranianporn.com  - Adult Content",
            "http://www.italianporn.com/ \u2022 italianporn.com - Adult Content IP",
            "jamaicansex.com \u2022 onlinesexmags.com \u2022 sexbible.com \u2022 bestsex.com - Adult Content IP",
            "https://www.anyxxxtube.net/video/2241/big-titted-sexy-chick-august-ames/ - Adult Content IP",
            "http://geometry.ru/articles/blinkovsexcircle.pdf- Adult Content IP",
            "http://www.onlinesexmags.com/members/gent/current/ - Adult Content IP",
            "http://sissy.com/default.php?qry=xinb0NVH3vxGQfarWy4r54j5FWwjyNsIfAXqPpjmSCTYnrY20orAEt5QcaKNVYpHM3.AFndEsyGlSb_SXAGpMTdue0rkjANJ3fQ0wH3yzmI9qKCDJp39iCno_V.ci7VYf_I4t_Y2ibuGhE_rlOAs3FGeaahClLHQmyX30MRH5AfpY6B5N9LDoau6dxnMaf3qGZEX_xCRYTdVAigxUMX2qRyl16DvSb9DohTpdet4E_v0QjzIjDwGGS4PYEDpjmzIeKlCSItsv09pHL84QDb6V_fvuFw0jX8tfoI8VQmpnaeudPhO0nDmV3c5G7HjNNcF&tgt=NO+TOKEN&searchKey=free+porn&wp=1&skp=3_2402  - Adult Content IP",
            "httpssa.www4.irs.gov \u2022 jobs.irs.gov \u2022 https://sa.www4.irs.gov/ \u2022 https://sa.www4.irs.gov \u2022 www.directfile.irs.gov \u2022",
            "http://sa.www4.irs.gov/ola/payment_options/create_long_term_plan \u2022 www4.irs.gov \u2022 www.drupal.org",
            "asp.bet",
            "apple.co \u2022 apple.com \u2022 apple.info \u2022 apple.net",
            "https://www.freeiconspng.com/thumbs/icloud-logo/icloud-drive-mac-mail-cloud-apple-pc-works-c",
            "https://build.webkit.org/results/Apple-Sequoia-Safer-CPP-Checks/301548@main",
            "http://usw2.apple.com/ \u2022 https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
            "applefilmmaker.com \u2022 appleid.com \u2022 appleiservices.com",
            "jobs.lumen.com \u2022 lumen.com \u2022  msradc.lumen.com \u2022 voip.lumen.com \u2022 www.lumen.com",
            "https://otx.alienvault.com/pulse/694d7d426afd8c1c816ddb9e",
            "Information gathered equals 2 pulses. Pulse (1) included",
            "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d/694d9e6a07ba5e76e203a672",
            "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d",
            "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3",
            "https://hybrid-analysis.com/sample/270e6924ee7b824b615813b00654f282accd5c649920f143e4f1c47862de4676",
            "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3/694d9a33a2febcb826005ed5",
            "https://hybrid-analysis.com/sample/270e6924ee7b824b615813b00654f282accd5c649920f143e4f1c47862de4676",
            "Follow up need. This is a serious financial crime following the victims.",
            "Victims have lost financial assets, jobs, vehicles",
            "Persistent. Is Christopher P. Ahmann, Brian Sabey, State of Colorado",
            "After an attack a different victim had awe , tax refund seized, Insurance became Medicaid, Was audited by the IRs and  there was  attempts on life w/ bad outcome"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Msilperseus-6989564-0",
              "display_name": "Win.Malware.Msilperseus-6989564-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Win.Trojan.Ramnit-1847",
              "display_name": "Win.Trojan.Ramnit-1847",
              "target": null
            },
            {
              "id": "Win.Trojan.Fenomengame-14",
              "display_name": "Win.Trojan.Fenomengame-14",
              "target": null
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Pandex!gen1",
              "display_name": "Pandex!gen1",
              "target": null
            },
            {
              "id": "Mirai Sim Swap",
              "display_name": "Mirai Sim Swap",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Lumen IP",
              "display_name": "Lumen IP",
              "target": null
            },
            {
              "id": "Unknown Malware \u2018Can't access file\u2019",
              "display_name": "Unknown Malware \u2018Can't access file\u2019",
              "target": null
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "Win.Trojan.Fenomengame-8",
              "display_name": "Win.Trojan.Fenomengame-8",
              "target": null
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/Adialer",
              "display_name": "ALF:JASYP:Trojan:Win32/Adialer",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop",
              "display_name": "TrojanDropper:Win32/Muldrop",
              "target": "/malware/TrojanDropper:Win32/Muldrop"
            },
            {
              "id": "Appleservice",
              "display_name": "Appleservice",
              "target": null
            },
            {
              "id": "ELF:DDoS-S\\ [Trj]",
              "display_name": "ELF:DDoS-S\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981154-0",
              "display_name": "Unix.Trojan.Gafgyt-6981154-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [
            "Financial",
            "Government",
            "Technology",
            "IRS"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 363,
            "FileHash-SHA1": 360,
            "FileHash-SHA256": 3009,
            "URL": 3504,
            "domain": 879,
            "email": 15,
            "hostname": 1487,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 9620,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "84 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6949930871afea435a774daa",
          "name": "HomeASAP | Emotet CnC Activity - Bot Network",
          "description": "https://HomeASAP.com is affected by Emotet CnC Activity. While I\u2019ve never  heard of this app , I receive a tip re: infected devices I\u2019m currently researching and the infected search result from infected search engine.  \n\nDevices infected with Pegasus and other more stealth than Pegasus, undetectable (for now) services. .",
          "modified": "2026-01-21T18:00:43.637000",
          "created": "2025-12-22T18:50:48.514000",
          "tags": [
            "per7cgvxw6k8m",
            "right",
            "left",
            "zqwfztj",
            "luptdaizzl",
            "qchrk",
            "brkzmji",
            "igpsfvjnu",
            "ibwavcm",
            "uwlusjb",
            "false",
            "template",
            "malware",
            "win64",
            "project",
            "write",
            "number",
            "thu sep",
            "yara detections",
            "none alerts",
            "contacted",
            "less",
            "related tags",
            "title",
            "emotet cnc activity",
            "brian sabey",
            "traps",
            "christopher p. ahmann",
            "united",
            "czech republic",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "belgium belgium",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "spawns",
            "botnet",
            "network",
            "bad traffic",
            "malicious email",
            "pattern match",
            "mitre att",
            "show technique",
            "ck matrix",
            "ogoogle trust",
            "file",
            "show process",
            "hybrid",
            "general",
            "local",
            "path",
            "encrypt",
            "click",
            "pe",
            "executable"
          ],
          "references": [
            "https://about.homeasap.com",
            "Bot network",
            "\"vgkw.maillist-manage.com\" is probably a mail server",
            "IDS Detections: Win32/Emotet CnC Activity (POST) M10",
            "Suspicious EXE download from WordPress folder",
            "PE EXE or DLL Windows file download HTTP",
            "Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download EXE - Served Attached HTTP"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Doc.Trojan.Agent-9765752-0",
              "display_name": "Doc.Trojan.Agent-9765752-0",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1078.004",
              "name": "Cloud Accounts",
              "display_name": "T1078.004 - Cloud Accounts"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            },
            {
              "id": "T1087.003",
              "name": "Email Account",
              "display_name": "T1087.003 - Email Account"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1560,
            "domain": 426,
            "hostname": 655,
            "FileHash-SHA1": 21,
            "email": 1,
            "FileHash-SHA256": 598,
            "FileHash-MD5": 20,
            "SSLCertFingerprint": 18,
            "CVE": 2
          },
          "indicator_count": 3301,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "87 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6946fdbb4a22dc28d60d6ca2",
          "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
          "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
          "modified": "2026-01-19T19:04:41.997000",
          "created": "2025-12-20T19:49:15.713000",
          "tags": [
            "doomscroller",
            "browsehappy",
            "xpirat",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "united",
            "tlsv1",
            "execution",
            "dock",
            "write",
            "persistence",
            "encrypt",
            "meta",
            "browse happy",
            "worry",
            "body doctype",
            "online",
            "gmt server",
            "a domains",
            "ipv4 add",
            "win32",
            "trojandropper",
            "title",
            "date",
            "unknown",
            "post http",
            "cryptexportkey",
            "cryptgenkey",
            "calgrc4",
            "expiro",
            "temple",
            "xserver",
            "adversaries",
            "worry wordpress"
          ],
          "references": [
            "Xpirat = doomscroller.io"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Xpirat",
              "display_name": "Xpirat",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5576,
            "domain": 1502,
            "FileHash-MD5": 116,
            "FileHash-SHA1": 73,
            "FileHash-SHA256": 1041,
            "SSLCertFingerprint": 1,
            "hostname": 1951
          },
          "indicator_count": 10260,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "89 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "195.128.76.205 \u2022 Description: CC=RU ASN=AS8470 jsc macomnet",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3/694d9a33a2febcb826005ed5",
        "https://www.colocrossing.com/",
        "https://eliyporasa.life/uelbu/5/151504-harleyxwest-porn - Adult Content",
        "This is hard to comprehend or put into indelible words.",
        "132.3.48.38 \u2022 Description: CC=US ASN=AS721 dod network information center",
        "https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ - Adult Content",
        "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d/694d9e6a07ba5e76e203a672",
        "http://sa.www4.irs.gov/ola/payment_options/create_long_term_plan \u2022 www4.irs.gov \u2022 www.drupal.org",
        "165.206.254.134 \u2022 Description: CC=US ASN=AS6122",
        "78.46.218.253 \u2022 Description: CC=DE ASN=AS24940 hetzner online gmbh",
        "https://build.webkit.org/results/Apple-Sequoia-Safer-CPP-Checks/301548@main",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t- Adult Content",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing - Adult Content",
        "https://www.freeiconspng.com/thumbs/icloud-logo/icloud-drive-mac-mail-cloud-apple-pc-works-c",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "jobs.lumen.com \u2022 lumen.com \u2022  msradc.lumen.com \u2022 voip.lumen.com \u2022 www.lumen.com",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "PE EXE or DLL Windows file download HTTP",
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "http://www.onlinesexmags.com/members/gent/current/ - Adult Content IP",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "64.38.232.180  - Adult Content IP",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "\"vgkw.maillist-manage.com\" is probably a mail server",
        "Follow up need. This is a serious financial crime following the victims.",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "192.85.127.130 \u2022 Description:  CC=US ASN=AS2173 hewlett-packard company",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net - Adult Content",
        "Bot network",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "http://www.anyxxxtube.net/search-porn/ - Adult Content",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d",
        "Yara Detections is__elf",
        "After an attack a different victim had awe , tax refund seized, Insurance became Medicaid, Was audited by the IRs and  there was  attempts on life w/ bad outcome",
        "Information gathered equals 2 pulses. Pulse (1) included",
        "Xpirat = doomscroller.io",
        "apple.co \u2022 apple.com \u2022 apple.info \u2022 apple.net",
        "http://usw2.apple.com/ \u2022 https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
        "Persistent. Is Christopher P. Ahmann, Brian Sabey, State of Colorado",
        "Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download EXE - Served Attached HTTP",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t- Adult Content",
        "207.75.164.210 \u2022 Description:  CC=US ASN=AS237 merit network",
        "www.anyxxxtube.net  - Adult Content",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "applefilmmaker.com \u2022 appleid.com \u2022 appleiservices.com",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io - Adult Content",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "154.35.132.70\t\u2022 Description:  CC=US ASN=AS14987 rethem hosting llc",
        "http://geometry.ru/articles/blinkovsexcircle.pdf- Adult Content IP",
        "httpssa.www4.irs.gov \u2022 jobs.irs.gov \u2022 https://sa.www4.irs.gov/ \u2022 https://sa.www4.irs.gov \u2022 www.directfile.irs.gov \u2022",
        "https://eliyporasa - Adult Content",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears - Adult Content",
        "jamaicansex.com \u2022 onlinesexmags.com \u2022 sexbible.com \u2022 bestsex.com - Adult Content IP",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io\t- Adult Content",
        "http://www.italianporn.com/ \u2022 italianporn.com - Adult Content IP",
        "http://sissy.com/default.php?qry=xinb0NVH3vxGQfarWy4r54j5FWwjyNsIfAXqPpjmSCTYnrY20orAEt5QcaKNVYpHM3.AFndEsyGlSb_SXAGpMTdue0rkjANJ3fQ0wH3yzmI9qKCDJp39iCno_V.ci7VYf_I4t_Y2ibuGhE_rlOAs3FGeaahClLHQmyX30MRH5AfpY6B5N9LDoau6dxnMaf3qGZEX_xCRYTdVAigxUMX2qRyl16DvSb9DohTpdet4E_v0QjzIjDwGGS4PYEDpjmzIeKlCSItsv09pHL84QDb6V_fvuFw0jX8tfoI8VQmpnaeudPhO0nDmV3c5G7HjNNcF&tgt=NO+TOKEN&searchKey=free+porn&wp=1&skp=3_2402  - Adult Content IP",
        "205.181.242.243 \u2022  Description: CC=US ASN=AS3738 state street bank and trust company",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "asp.bet",
        "sa.www4.irs.gov \u2022 sa1.www4.irs.gov \u2022 sa2.www4.irs.gov \u2022 apps.irs.gov \u2022 freetaxassistance.for.irs.gov \u2022 home.treasury.gov \u2022",
        "207.75.164.17 \u2022 Description:  CC=US ASN=AS237 merit network",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "https://hybrid-analysis.com/sample/270e6924ee7b824b615813b00654f282accd5c649920f143e4f1c47862de4676",
        "https://www.anyxxxtube.net/video/2241/big-titted-sexy-chick-august-ames/ - Adult Content IP",
        "Victims have lost financial assets, jobs, vehicles",
        "216.252.199.59 \u2022 Description:  CC=US ASN=AS31827 biz net technologies",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "https://about.homeasap.com",
        "www.anyxxxtube.net - Adult Content IP",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "104.21.51.140, 172.67.181.41",
        "IDS Detections: Win32/Emotet CnC Activity (POST) M10",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "214.25.9.149 \u2022 Description:  CC=US ASN=AS344 dod network information center",
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "http://sissy.com/default - Adult Content",
        "Suspicious EXE download from WordPress folder",
        "95.211.7.168 \u2022Description:  CC=NL ASN=AS60781 leaseweb netherlands b.v.",
        "http://www.iranianporn.com/ \u2022 iranianporn.com  - Adult Content",
        "https://otx.alienvault.com/pulse/694d7d426afd8c1c816ddb9e",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Expiro",
            "Mirai sim swap",
            "Win.trojan.ramnit-1847",
            "Appleservice",
            "Pandex!gen1",
            "Alf:jasyp:trojan:win32/adialer",
            "Emotet",
            "Hacktool:msil/boilod.c!bit",
            "Win.trojan.fenomengame-14",
            "Xpirat",
            "Unix.trojan.darknexus-7679166-0",
            "Mirai",
            "Et",
            "Unknown malware \u2018can't access file\u2019",
            "Trojandropper:win32/muldrop",
            "Elf:ddos-s\\ [trj]",
            "Win.malware.msilperseus-6989564-0",
            "Doc.trojan.agent-9765752-0",
            "Lumen ip",
            "Unix.trojan.gafgyt-6981154-0",
            "Win.trojan.fenomengame-8"
          ],
          "industries": [
            "Civil society",
            "Technology",
            "Financial",
            "Healthcare",
            "Government",
            "Irs",
            "Insurance"
          ],
          "unique_indicators": 34066
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/fiba3x3vs.com",
    "whois": "http://whois.domaintools.com/fiba3x3vs.com",
    "domain": "fiba3x3vs.com",
    "hostname": "mipo7.live.fiba3x3vs.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "6958780c8479a9d69920c3d8",
      "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
      "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
      "modified": "2026-02-02T01:02:46.327000",
      "created": "2026-01-03T01:59:40.530000",
      "tags": [
        "united",
        "moved",
        "title",
        "passive dns",
        "ipv4 add",
        "urls",
        "files",
        "hosting",
        "reverse dns",
        "location united",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "read c",
        "create c",
        "medium",
        "search",
        "memcommit",
        "high",
        "checks",
        "windows",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "local",
        "ref b",
        "wed may",
        "backdoor",
        "mtb aug",
        "next associated",
        "mtb dec",
        "twitter",
        "smoke loader",
        "malware",
        "virtool",
        "hacktool",
        "data upload",
        "present dec",
        "mtb apr",
        "win32",
        "trojan",
        "worm",
        "lowfi",
        "cybota",
        "expiration date",
        "name servers",
        "ipv4",
        "url analysis",
        "port",
        "destination",
        "telnet login",
        "bad login",
        "gpl telnet",
        "suspicious path",
        "busybox",
        "tcp syn",
        "et telnet",
        "path",
        "mirai",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "america",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "learn",
        "t1179 hooking",
        "installs",
        "t1035 service",
        "adversaries",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "y013",
        "flag",
        "span",
        "accept",
        "core",
        "february",
        "hybrid",
        "malicious",
        "general",
        "click",
        "strings",
        "roboto",
        "next",
        "usa windows",
        "finished",
        "queueprogress",
        "timestamp input",
        "threat level",
        "october",
        "september",
        "hwp support",
        "fresh",
        "win64",
        "khtml",
        "gecko",
        "brand",
        "microsoft edge",
        "programfiles",
        "comspec",
        "model",
        "iframe",
        "form",
        "listeners",
        "initial access",
        "t1590 gather",
        "victim network",
        "ssl certificate",
        "quasi government",
        "jeffrey reimer",
        "palantir",
        "Regis university",
        "otx hp",
        "apple",
        "pegasus",
        "h5 data center",
        "florence colorado",
        "brian sabey",
        "target : Tsara Brasheaers",
        "aig",
        "industry and commerce",
        "united states",
        "State of Colorado.",
        "date",
        "status",
        "domain",
        "hostname add",
        "pulse pulses",
        "files ip",
        "address",
        "url https",
        "url http",
        "hostname",
        "show",
        "type indicator",
        "source hostname",
        "entries",
        "Prometheus Intelligence Technology",
        "pulse submit",
        "america flag",
        "body",
        "dynamicloader",
        "microsoft azure",
        "tls issuing",
        "named pipe",
        "json",
        "ascii text",
        "lredmond",
        "Apple",
        "Telnet",
        "BusyBox",
        "Pegasus",
        "Colorado State Fixer: Christopher P. Ahmann",
        "Hijacker: Brian Sabey",
        "For: Concentra",
        "Protecting Assaulter: Jeffrey Reimer",
        "For: AIG",
        "For Industry and Commerce",
        "For: Quasi Government",
        "For: Workers Compensation",
        "Authorities",
        "Law Enforcement Dark",
        "Silencing",
        "Tampering with a Victim",
        "Meta",
        "Palantir",
        "Google",
        "Bing",
        "Microsoft",
        "ColoCrossing",
        "Associates",
        "hit men"
      ],
      "references": [
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "Yara Detections is__elf",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "https://www.colocrossing.com/",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "104.21.51.140, 172.67.181.41",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "This is hard to comprehend or put into indelible words."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "HackTool:MSIL/Boilod.C!bit",
          "display_name": "HackTool:MSIL/Boilod.C!bit",
          "target": "/malware/HackTool:MSIL/Boilod.C!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1204.002",
          "name": "Malicious File",
          "display_name": "T1204.002 - Malicious File"
        },
        {
          "id": "T1462",
          "name": "Malicious Software Development Tools",
          "display_name": "T1462 - Malicious Software Development Tools"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Technology",
        "Healthcare",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6390,
        "domain": 723,
        "hostname": 1978,
        "FileHash-SHA256": 1912,
        "FileHash-MD5": 410,
        "FileHash-SHA1": 306,
        "email": 3,
        "SSLCertFingerprint": 28,
        "CVE": 3
      },
      "indicator_count": 11753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "76 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "694dc80ac6e7fd5474b316a1",
      "name": "Malicious DDOS attacks targeting Brand New 2025 | Updated Apple Products affecting IRS payment portal",
      "description": "Malicious actors continue to target certain users attempting to pay the IRS. Victim is redirected to : http://sa.www4.irs.gov/ola/payment_options/create_long_term_plan after typing in IRS.gov (w/ secure header \u2018https\u2019 )\nOnce information is input it is payment is rejected, levy against bank accounts and assets and other threats. There is social engineering as one victim is communicating with someone allegedly from the IRS? \nAlthough malicious entities contacted , malicious behavior continues. Adversaries in the Middle attack. US hacker group. Denver, Iowa, Arizona, NY and abroad. \n\n*Targets: https://build.webkit.org/results/Apple-Sequoia-Safer-CPP-Checks/301548@main |",
      "modified": "2026-01-24T22:05:13.068000",
      "created": "2025-12-25T23:26:02.712000",
      "tags": [
        "hash avast",
        "avg clamav",
        "msdefender feb",
        "url http",
        "url https",
        "zipcode",
        "active related",
        "cage01195 dec",
        "passports",
        "ipv4",
        "active",
        "irs",
        "apple",
        "role title",
        "indicator role",
        "malware attacks",
        "find encrypted",
        "lumen",
        "fastly",
        "create c",
        "read c",
        "delete",
        "write",
        "default",
        "medium",
        "rgba",
        "dock",
        "execution",
        "xport",
        "united",
        "passive dns",
        "urls",
        "expiration date",
        "unknown ns",
        "unknown aaaa",
        "pulse pulses",
        "merit",
        "dod network",
        "type indicator",
        "related pulses",
        "name",
        "name servers",
        "ffffff",
        "ip address",
        "emails",
        "object",
        "clsid6bf52a52",
        "cookie",
        "meta",
        "united kingdom",
        "germany",
        "russia",
        "search",
        "added active",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "href",
        "pattern match",
        "ascii text",
        "ck id",
        "mitre att",
        "ck matrix",
        "t1071",
        "general",
        "local",
        "path",
        "iframe",
        "click",
        "beginstring",
        "segoe ui",
        "null",
        "refresh",
        "span",
        "hybrid",
        "strings",
        "error",
        "tools",
        "title",
        "look",
        "verify",
        "restart",
        "data upload",
        "extraction",
        "failed",
        "include data",
        "entries",
        "unicode",
        "high",
        "memcommit",
        "next",
        "flag",
        "process details",
        "path expiresthu",
        "moved",
        "gmt set",
        "domain",
        "httponly path",
        "encrypt",
        "leaseweb",
        "iowa",
        "title added",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "command decode",
        "suricata stream",
        "circle",
        "f5f8fa",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "development att",
        "suricata http",
        "windows nt",
        "date",
        "ips initial",
        "prefetch8",
        "localappdata",
        "prefetch1",
        "programfiles",
        "edge",
        "access att",
        "t1566 phishing",
        "initial access",
        "show process",
        "show technique",
        "process",
        "t1057",
        "contacted",
        "ck techniques",
        "evasion att",
        "body",
        "report spam",
        "apple",
        "ddos",
        "irs created",
        "hours ago",
        "white",
        "apple user",
        "industries",
        "government",
        "finance",
        "trojandropper",
        "appleservice",
        "mirai",
        "trojan",
        "next associated",
        "fastly error",
        "please",
        "sea p",
        "mozilla",
        "accept",
        "alerts",
        "filehash",
        "md5 add",
        "av detections",
        "ids detections",
        "yara detections",
        "analysis date",
        "file score",
        "medium risk",
        "copy",
        "richhash",
        "finding notes",
        "clamav malware",
        "files matching",
        "number",
        "sample analysis",
        "samples show",
        "date hash",
        "yara rule",
        "msie",
        "t1063",
        "windows",
        "malware",
        "detected",
        "https domain",
        "tls sni",
        "markus",
        "smartassembly",
        "win64",
        "exif data",
        "present dec",
        "status",
        "showing",
        "show",
        "icmp traffic",
        "pdb path",
        "crlf line",
        "mutex",
        "ms defender",
        "mtb malware",
        "hide samples",
        "rootkit",
        "apple webkit",
        "macbook pro",
        "apple ios"
      ],
      "references": [
        "sa.www4.irs.gov \u2022 sa1.www4.irs.gov \u2022 sa2.www4.irs.gov \u2022 apps.irs.gov \u2022 freetaxassistance.for.irs.gov \u2022 home.treasury.gov \u2022",
        "132.3.48.38 \u2022 Description: CC=US ASN=AS721 dod network information center",
        "154.35.132.70\t\u2022 Description:  CC=US ASN=AS14987 rethem hosting llc",
        "165.206.254.134 \u2022 Description: CC=US ASN=AS6122",
        "192.85.127.130 \u2022 Description:  CC=US ASN=AS2173 hewlett-packard company",
        "195.128.76.205 \u2022 Description: CC=RU ASN=AS8470 jsc macomnet",
        "205.181.242.243 \u2022  Description: CC=US ASN=AS3738 state street bank and trust company",
        "207.75.164.17 \u2022 Description:  CC=US ASN=AS237 merit network",
        "207.75.164.210 \u2022 Description:  CC=US ASN=AS237 merit network",
        "214.25.9.149 \u2022 Description:  CC=US ASN=AS344 dod network information center",
        "216.252.199.59 \u2022 Description:  CC=US ASN=AS31827 biz net technologies",
        "78.46.218.253 \u2022 Description: CC=DE ASN=AS24940 hetzner online gmbh",
        "95.211.7.168 \u2022Description:  CC=NL ASN=AS60781 leaseweb netherlands b.v.",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t- Adult Content",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/\tphishing - Adult Content",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears - Adult Content",
        "https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/ - Adult Content",
        "http://www.anyxxxtube.net/search-porn/ - Adult Content",
        "https://eliyporasa.life/uelbu/5/151504-harleyxwest-porn - Adult Content",
        "http://www.anyxxxtube.net/search-porn/tsara-brashears-denies-jeffrey-scott-reimer-sex\t- Adult Content",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net - Adult Content",
        "https://wallpapers-nature.com/ tsara-brashears/urlscan-io\t- Adult Content",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io\t- Adult Content",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io - Adult Content",
        "http://sissy.com/default - Adult Content",
        "https://eliyporasa - Adult Content",
        "64.38.232.180  - Adult Content IP",
        "www.anyxxxtube.net  - Adult Content",
        "www.anyxxxtube.net - Adult Content IP",
        "http://www.iranianporn.com/ \u2022 iranianporn.com  - Adult Content",
        "http://www.italianporn.com/ \u2022 italianporn.com - Adult Content IP",
        "jamaicansex.com \u2022 onlinesexmags.com \u2022 sexbible.com \u2022 bestsex.com - Adult Content IP",
        "https://www.anyxxxtube.net/video/2241/big-titted-sexy-chick-august-ames/ - Adult Content IP",
        "http://geometry.ru/articles/blinkovsexcircle.pdf- Adult Content IP",
        "http://www.onlinesexmags.com/members/gent/current/ - Adult Content IP",
        "http://sissy.com/default.php?qry=xinb0NVH3vxGQfarWy4r54j5FWwjyNsIfAXqPpjmSCTYnrY20orAEt5QcaKNVYpHM3.AFndEsyGlSb_SXAGpMTdue0rkjANJ3fQ0wH3yzmI9qKCDJp39iCno_V.ci7VYf_I4t_Y2ibuGhE_rlOAs3FGeaahClLHQmyX30MRH5AfpY6B5N9LDoau6dxnMaf3qGZEX_xCRYTdVAigxUMX2qRyl16DvSb9DohTpdet4E_v0QjzIjDwGGS4PYEDpjmzIeKlCSItsv09pHL84QDb6V_fvuFw0jX8tfoI8VQmpnaeudPhO0nDmV3c5G7HjNNcF&tgt=NO+TOKEN&searchKey=free+porn&wp=1&skp=3_2402  - Adult Content IP",
        "httpssa.www4.irs.gov \u2022 jobs.irs.gov \u2022 https://sa.www4.irs.gov/ \u2022 https://sa.www4.irs.gov \u2022 www.directfile.irs.gov \u2022",
        "http://sa.www4.irs.gov/ola/payment_options/create_long_term_plan \u2022 www4.irs.gov \u2022 www.drupal.org",
        "asp.bet",
        "apple.co \u2022 apple.com \u2022 apple.info \u2022 apple.net",
        "https://www.freeiconspng.com/thumbs/icloud-logo/icloud-drive-mac-mail-cloud-apple-pc-works-c",
        "https://build.webkit.org/results/Apple-Sequoia-Safer-CPP-Checks/301548@main",
        "http://usw2.apple.com/ \u2022 https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
        "applefilmmaker.com \u2022 appleid.com \u2022 appleiservices.com",
        "jobs.lumen.com \u2022 lumen.com \u2022  msradc.lumen.com \u2022 voip.lumen.com \u2022 www.lumen.com",
        "https://otx.alienvault.com/pulse/694d7d426afd8c1c816ddb9e",
        "Information gathered equals 2 pulses. Pulse (1) included",
        "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d/694d9e6a07ba5e76e203a672",
        "https://hybrid-analysis.com/sample/ec4a41028de0fb099e6f14c8507ba98d2215872688a955db015ca2dafc2baa3d",
        "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3",
        "https://hybrid-analysis.com/sample/270e6924ee7b824b615813b00654f282accd5c649920f143e4f1c47862de4676",
        "https://hybrid-analysis.com/sample/d9a2ab3260e7202336bef383bd97b323c616e0857623a30339ef285058a16ca3/694d9a33a2febcb826005ed5",
        "https://hybrid-analysis.com/sample/270e6924ee7b824b615813b00654f282accd5c649920f143e4f1c47862de4676",
        "Follow up need. This is a serious financial crime following the victims.",
        "Victims have lost financial assets, jobs, vehicles",
        "Persistent. Is Christopher P. Ahmann, Brian Sabey, State of Colorado",
        "After an attack a different victim had awe , tax refund seized, Insurance became Medicaid, Was audited by the IRs and  there was  attempts on life w/ bad outcome"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada",
        "United Kingdom of Great Britain and Northern Ireland"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Msilperseus-6989564-0",
          "display_name": "Win.Malware.Msilperseus-6989564-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Win.Trojan.Ramnit-1847",
          "display_name": "Win.Trojan.Ramnit-1847",
          "target": null
        },
        {
          "id": "Win.Trojan.Fenomengame-14",
          "display_name": "Win.Trojan.Fenomengame-14",
          "target": null
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Pandex!gen1",
          "display_name": "Pandex!gen1",
          "target": null
        },
        {
          "id": "Mirai Sim Swap",
          "display_name": "Mirai Sim Swap",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Lumen IP",
          "display_name": "Lumen IP",
          "target": null
        },
        {
          "id": "Unknown Malware \u2018Can't access file\u2019",
          "display_name": "Unknown Malware \u2018Can't access file\u2019",
          "target": null
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "Win.Trojan.Fenomengame-8",
          "display_name": "Win.Trojan.Fenomengame-8",
          "target": null
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/Adialer",
          "display_name": "ALF:JASYP:Trojan:Win32/Adialer",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Muldrop",
          "display_name": "TrojanDropper:Win32/Muldrop",
          "target": "/malware/TrojanDropper:Win32/Muldrop"
        },
        {
          "id": "Appleservice",
          "display_name": "Appleservice",
          "target": null
        },
        {
          "id": "ELF:DDoS-S\\ [Trj]",
          "display_name": "ELF:DDoS-S\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981154-0",
          "display_name": "Unix.Trojan.Gafgyt-6981154-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [
        "Financial",
        "Government",
        "Technology",
        "IRS"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 363,
        "FileHash-SHA1": 360,
        "FileHash-SHA256": 3009,
        "URL": 3504,
        "domain": 879,
        "email": 15,
        "hostname": 1487,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 9620,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "84 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6949930871afea435a774daa",
      "name": "HomeASAP | Emotet CnC Activity - Bot Network",
      "description": "https://HomeASAP.com is affected by Emotet CnC Activity. While I\u2019ve never  heard of this app , I receive a tip re: infected devices I\u2019m currently researching and the infected search result from infected search engine.  \n\nDevices infected with Pegasus and other more stealth than Pegasus, undetectable (for now) services. .",
      "modified": "2026-01-21T18:00:43.637000",
      "created": "2025-12-22T18:50:48.514000",
      "tags": [
        "per7cgvxw6k8m",
        "right",
        "left",
        "zqwfztj",
        "luptdaizzl",
        "qchrk",
        "brkzmji",
        "igpsfvjnu",
        "ibwavcm",
        "uwlusjb",
        "false",
        "template",
        "malware",
        "win64",
        "project",
        "write",
        "number",
        "thu sep",
        "yara detections",
        "none alerts",
        "contacted",
        "less",
        "related tags",
        "title",
        "emotet cnc activity",
        "brian sabey",
        "traps",
        "christopher p. ahmann",
        "united",
        "czech republic",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "belgium belgium",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "ssl certificate",
        "spawns",
        "botnet",
        "network",
        "bad traffic",
        "malicious email",
        "pattern match",
        "mitre att",
        "show technique",
        "ck matrix",
        "ogoogle trust",
        "file",
        "show process",
        "hybrid",
        "general",
        "local",
        "path",
        "encrypt",
        "click",
        "pe",
        "executable"
      ],
      "references": [
        "https://about.homeasap.com",
        "Bot network",
        "\"vgkw.maillist-manage.com\" is probably a mail server",
        "IDS Detections: Win32/Emotet CnC Activity (POST) M10",
        "Suspicious EXE download from WordPress folder",
        "PE EXE or DLL Windows file download HTTP",
        "Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download EXE - Served Attached HTTP"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Doc.Trojan.Agent-9765752-0",
          "display_name": "Doc.Trojan.Agent-9765752-0",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1078.004",
          "name": "Cloud Accounts",
          "display_name": "T1078.004 - Cloud Accounts"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        },
        {
          "id": "T1087.003",
          "name": "Email Account",
          "display_name": "T1087.003 - Email Account"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1548",
          "name": "Abuse Elevation Control Mechanism",
          "display_name": "T1548 - Abuse Elevation Control Mechanism"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1560,
        "domain": 426,
        "hostname": 655,
        "FileHash-SHA1": 21,
        "email": 1,
        "FileHash-SHA256": 598,
        "FileHash-MD5": 20,
        "SSLCertFingerprint": 18,
        "CVE": 2
      },
      "indicator_count": 3301,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "87 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6946fdbb4a22dc28d60d6ca2",
      "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
      "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
      "modified": "2026-01-19T19:04:41.997000",
      "created": "2025-12-20T19:49:15.713000",
      "tags": [
        "doomscroller",
        "browsehappy",
        "xpirat",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "united",
        "tlsv1",
        "execution",
        "dock",
        "write",
        "persistence",
        "encrypt",
        "meta",
        "browse happy",
        "worry",
        "body doctype",
        "online",
        "gmt server",
        "a domains",
        "ipv4 add",
        "win32",
        "trojandropper",
        "title",
        "date",
        "unknown",
        "post http",
        "cryptexportkey",
        "cryptgenkey",
        "calgrc4",
        "expiro",
        "temple",
        "xserver",
        "adversaries",
        "worry wordpress"
      ],
      "references": [
        "Xpirat = doomscroller.io"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Xpirat",
          "display_name": "Xpirat",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1423",
          "name": "Network Service Scanning",
          "display_name": "T1423 - Network Service Scanning"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5576,
        "domain": 1502,
        "FileHash-MD5": 116,
        "FileHash-SHA1": 73,
        "FileHash-SHA256": 1041,
        "SSLCertFingerprint": 1,
        "hostname": 1951
      },
      "indicator_count": 10260,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "89 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://mipo7.live.fiba3x3vs.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://mipo7.live.fiba3x3vs.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776618343.460488
}