{
  "type": "URL",
  "indicator": "https://msoid.arnotts.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://msoid.arnotts.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4086035798,
      "indicator": "https://msoid.arnotts.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "687f33a5ddf830e2f3e5acac",
          "name": "Trojan Dropper | Espionage | Keylogger affecting medical centers",
          "description": "PII and PHI at risk. Highest access spyware available infiltrates a small niche medical center. \ntrojandropper, keyloggers, advanced spyware, monitored rooms , mitre att, ||\nIDS: PROTOCOL-ICMP PATH MTU denial of service attempt \u2022  PROTOCOL-ICMP Destination Unreachable Fragmentation Needed and DF bit was set\n\n\u2022   https://foundry2sdbl.dvr.dn2.n-helix.com/\n\u2022 https://www.pegasustech.net/products/mobility-barcode-scanning/Data-collector-mobile-computer\n\n\u2022 \nrobloxlogger.com\n\u2022\n\nhttps://video.welnext.com\n\u2022\nhttps://app1.oceantg.com/sta40/views/personnelscreenview.aspx",
          "modified": "2025-08-21T06:00:20.607000",
          "created": "2025-07-22T06:45:57.499000",
          "tags": [
            "pegasus",
            "report spam",
            "gotham foundry",
            "espionage",
            "spinal cord",
            "injured created",
            "minutes ago",
            "strange",
            "foundry",
            "palantir",
            "alexa",
            "service",
            "url http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "ipv4",
            "united",
            "germany",
            "singapore",
            "netherlands",
            "iran",
            "india",
            "search",
            "domain",
            "hostname",
            "filehashmd5",
            "filehashsha1",
            "extraction",
            "data upload",
            "sc type",
            "dren aeu",
            "extr source",
            "ur data",
            "include",
            "review exclude",
            "sugges",
            "mtu denial",
            "matches rule",
            "needed",
            "df bit",
            "unique rule",
            "catalog tree",
            "c0002 wininet",
            "ta0005 command",
            "control ta0011",
            "get http",
            "resolved ips",
            "dns resolutions",
            "cloudflare",
            "flag",
            "server",
            "date",
            "contacted hosts",
            "ip address",
            "process details",
            "t1158",
            "hidden",
            "t1031",
            "modify existing",
            "t1053",
            "taskjob",
            "t1060",
            "run keys",
            "startup",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "command",
            "found",
            "itre att",
            "show process",
            "prefetch8",
            "mitre att",
            "show technique",
            "ck matrix",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "april",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "entries",
            "unknown ns",
            "creation date",
            "record value",
            "showing",
            "gmt content",
            "accept encoding",
            "encrypt",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present jan"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2628,
            "domain": 472,
            "hostname": 880,
            "FileHash-SHA256": 805,
            "FileHash-MD5": 151,
            "FileHash-SHA1": 128,
            "CIDR": 1,
            "SSLCertFingerprint": 3,
            "email": 1
          },
          "indicator_count": 5069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "241 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d18d829739be014393c59",
          "name": "SoundCloud - Hear the world\u2019s sounds",
          "description": "Social engineering included lots of contact via Facebook, Twitter, SoundCloud, Victims website, iCloud.. iCloud was erased and the hacker left the man \u2018deadmau5\u2018 .  deadmau5 was used threatening posts emails and whoever they are sent photos and became overly interested in victims music. 1st to report music was not showing up on YouTube. Statements show victim had millions of views redirected. Hackers would often thank artistss for another million views. Songs pirated. Jansky on SoundCloud contacted victims daughter often, sent a photo and said he was from Great Britain. \n\u2022 ALFPER:PUA:Win32/InstallCore\n\u2022 TrojanDropper:Win32/VB.IL\n\u2022 Win.Trojan.Agent-\n|| blog.jpcert.or.jp \n\n\u2022 Registrant Org: Japan Computer Emergency Response Team Coordination Center\n\nI feel like this is very dangerous. These people are in Colorado no matter where they say they are.",
          "modified": "2025-08-19T14:03:11.976000",
          "created": "2025-07-20T16:27:04.872000",
          "tags": [
            "read c",
            "search",
            "medium",
            "entries",
            "show",
            "unicode",
            "tls handshake",
            "memcommit",
            "delete",
            "crlf line",
            "next",
            "dock",
            "write",
            "execution",
            "malware",
            "copy",
            "no expiration",
            "filehashmd5",
            "filehashsha256",
            "showing",
            "urls",
            "passive dns",
            "http",
            "unique",
            "l add",
            "pulse pulses",
            "ip address",
            "related nids",
            "files location",
            "united",
            "code",
            "present jul",
            "present showing",
            "title error",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jul",
            "next associated",
            "files show",
            "win32",
            "date",
            "urls show",
            "error",
            "creation date",
            "name servers",
            "value emails",
            "name eric",
            "wahlforss name",
            "org soundcloud",
            "city berlin",
            "country de",
            "dnssec unsigned",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "asn as16509",
            "less",
            "results nov",
            "associated urls",
            "results jan",
            "present feb",
            "related tags",
            "none indicator",
            "facts domain",
            "present",
            "akamai external",
            "resources whois",
            "urlvoid",
            "related",
            "png image",
            "rgba",
            "alfper",
            "ipv4 add",
            "trojandropper",
            "present may",
            "present jun",
            "cname",
            "emails",
            "status",
            "servers",
            "less whois",
            "body",
            "fastly error",
            "please",
            "sea p",
            "america flag",
            "america asn",
            "trojan",
            "accept",
            "url add",
            "ip related",
            "pulses none",
            "cdhc",
            "oxq xr8w1",
            "fv5hc9a2l",
            "s showing",
            "next related",
            "domains domain",
            "script urls",
            "present sep",
            "cookie",
            "hostname add"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6020,
            "hostname": 1865,
            "FileHash-SHA256": 676,
            "FileHash-MD5": 106,
            "FileHash-SHA1": 86,
            "domain": 990,
            "email": 5
          },
          "indicator_count": 9748,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "243 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d18de7177474b759ab2b7",
          "name": "SoundCloud - Hear the world\u2019s sounds",
          "description": "Social engineering included lots of contact via Facebook, Twitter, SoundCloud, Victims website, iCloud.. iCloud was erased and the hacker left the man \u2018deadmau5\u2018 .  deadmau5 was used threatening posts emails and whoever they are sent photos and became overly interested in victims music. 1st to report music was not showing up on YouTube. Statements show victim had millions of views redirected. Hackers would often thank artistss for another million views. Songs pirated. Jansky on SoundCloud contacted victims daughter often, sent a photo and said he was from Great Britain. \n\u2022 ALFPER:PUA:Win32/InstallCore\n\u2022 TrojanDropper:Win32/VB.IL\n\u2022 Win.Trojan.Agent-\n|| blog.jpcert.or.jp \n\n\u2022 Registrant Org: Japan Computer Emergency Response Team Coordination Center\n\nI feel like this is very dangerous. These people are in Colorado no matter where they say they are.",
          "modified": "2025-08-19T14:03:11.976000",
          "created": "2025-07-20T16:27:10.608000",
          "tags": [
            "read c",
            "search",
            "medium",
            "entries",
            "show",
            "unicode",
            "tls handshake",
            "memcommit",
            "delete",
            "crlf line",
            "next",
            "dock",
            "write",
            "execution",
            "malware",
            "copy",
            "no expiration",
            "filehashmd5",
            "filehashsha256",
            "showing",
            "urls",
            "passive dns",
            "http",
            "unique",
            "l add",
            "pulse pulses",
            "ip address",
            "related nids",
            "files location",
            "united",
            "code",
            "present jul",
            "present showing",
            "title error",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results jul",
            "next associated",
            "files show",
            "win32",
            "date",
            "urls show",
            "error",
            "creation date",
            "name servers",
            "value emails",
            "name eric",
            "wahlforss name",
            "org soundcloud",
            "city berlin",
            "country de",
            "dnssec unsigned",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "asn as16509",
            "less",
            "results nov",
            "associated urls",
            "results jan",
            "present feb",
            "related tags",
            "none indicator",
            "facts domain",
            "present",
            "akamai external",
            "resources whois",
            "urlvoid",
            "related",
            "png image",
            "rgba",
            "alfper",
            "ipv4 add",
            "trojandropper",
            "present may",
            "present jun",
            "cname",
            "emails",
            "status",
            "servers",
            "less whois",
            "body",
            "fastly error",
            "please",
            "sea p",
            "america flag",
            "america asn",
            "trojan",
            "accept",
            "url add",
            "ip related",
            "pulses none",
            "cdhc",
            "oxq xr8w1",
            "fv5hc9a2l",
            "s showing",
            "next related",
            "domains domain",
            "script urls",
            "present sep",
            "cookie",
            "hostname add"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6020,
            "hostname": 1865,
            "FileHash-SHA256": 676,
            "FileHash-MD5": 106,
            "FileHash-SHA1": 86,
            "domain": 990,
            "email": 5
          },
          "indicator_count": 9748,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "243 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6875e98438889e51b3fdd18f",
          "name": "Critical \u2022 Schedule system process - Mirai | Foundry Overwatch",
          "description": "",
          "modified": "2025-08-14T05:04:16.839000",
          "created": "2025-07-15T05:39:16.652000",
          "tags": [
            "win32 exe",
            "country",
            "include review",
            "exclude",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "impact ob0008",
            "file system",
            "system oc0008",
            "match unknown",
            "adversaries",
            "match info",
            "info",
            "execution flow",
            "t1574 dll",
            "tries",
            "registry",
            "modify system",
            "process t1543",
            "unknown",
            "window",
            "ob0009 install",
            "ob0012 install",
            "insecure",
            "b0047 modify",
            "registry e1112",
            "hidden files",
            "registry run",
            "keys",
            "startup folder",
            "f0012 file",
            "critical",
            "united",
            "as15169",
            "delete c",
            "as16509",
            "show",
            "search",
            "intel",
            "ms windows",
            "entries",
            "medium",
            "worm",
            "copy",
            "write",
            "explorer",
            "malware",
            "next",
            "present jul",
            "status",
            "date",
            "ip address",
            "domain",
            "servers",
            "showing",
            "unknown ns",
            "related pulses",
            "pulses",
            "tags",
            "related tags",
            "more file",
            "type",
            "date april",
            "am size",
            "sha1 sha256",
            "as14618",
            "united kingdom",
            "as54113",
            "as15133 verizon",
            "top source",
            "top destination",
            "status domain",
            "ip whitelisted",
            "whitelisted",
            "tcp include",
            "source source",
            "oamazon",
            "cnamazon rsa",
            "odigicert inc",
            "sweden as20940",
            "as20940",
            "entries tls",
            "ip destination",
            "encrypt",
            "aaaa",
            "found",
            "certificate",
            "next associated",
            "urls show",
            "date checked",
            "error",
            "windows",
            "high",
            "yara detections",
            "installs",
            "checks",
            "filehash",
            "sha256 add",
            "themida",
            "data upload",
            "extraction",
            "md5 add",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "win32",
            "ddos",
            "passive dns",
            "activity",
            "checkin",
            "win64",
            "mtb jan",
            "lowfi",
            "trojan",
            "ransom",
            "trojandropper",
            "yara",
            "nsis",
            "nss bv",
            "su data",
            "windo alerts",
            "andariel",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "id deadhost",
            "connects",
            "andariel high",
            "richhash",
            "external",
            "virustotal api",
            "screenshots",
            "failed",
            "auurtonany data",
            "themida andarie",
            "present may",
            "japan unknown",
            "unknown cname",
            "domain add",
            "urls",
            "files",
            "http headers",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "wget command",
            "devices home",
            "execution",
            "foundry",
            "home networks",
            "mirai",
            "x.com",
            "porn",
            "monitored target",
            "d link",
            "targets"
          ],
          "references": [
            "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
            "Crowdsourced Signa: Schedule system process by Joe Security",
            "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
            "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
            "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
            "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
            "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
            "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
            "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
            "*Themida_2xx. Oreans,Technologies",
            "*Andariel Backdoor Activity (Checkin)",
            "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
            "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
            "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
            "Devices remotely connected, tracked , monitored"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Win.Malware.Ursu-9856871-0",
              "display_name": "Win.Malware.Ursu-9856871-0",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 448,
            "FileHash-SHA1": 435,
            "FileHash-SHA256": 5851,
            "hostname": 2580,
            "domain": 1176,
            "URL": 7133,
            "SSLCertFingerprint": 30,
            "email": 3,
            "CVE": 3
          },
          "indicator_count": 17659,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "248 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
        "*Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
        "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
        "Devices remotely connected, tracked , monitored",
        "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
        "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
        "*Themida_2xx. Oreans,Technologies",
        "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
        "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
        "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
        "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
        "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
        "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
        "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "Crowdsourced Signa: Schedule system process by Joe Security"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Elf:ddos-y\\ [trj]",
            "Unix.trojan.mirai-6981169-0",
            "Win.malware.ursu-9856871-0",
            "Worm:win32/mofksys.rnd!mtb"
          ],
          "industries": [
            "Healthcare",
            "Technology"
          ],
          "unique_indicators": 31758
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/arnotts.com",
    "whois": "http://whois.domaintools.com/arnotts.com",
    "domain": "arnotts.com",
    "hostname": "msoid.arnotts.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "687f33a5ddf830e2f3e5acac",
      "name": "Trojan Dropper | Espionage | Keylogger affecting medical centers",
      "description": "PII and PHI at risk. Highest access spyware available infiltrates a small niche medical center. \ntrojandropper, keyloggers, advanced spyware, monitored rooms , mitre att, ||\nIDS: PROTOCOL-ICMP PATH MTU denial of service attempt \u2022  PROTOCOL-ICMP Destination Unreachable Fragmentation Needed and DF bit was set\n\n\u2022   https://foundry2sdbl.dvr.dn2.n-helix.com/\n\u2022 https://www.pegasustech.net/products/mobility-barcode-scanning/Data-collector-mobile-computer\n\n\u2022 \nrobloxlogger.com\n\u2022\n\nhttps://video.welnext.com\n\u2022\nhttps://app1.oceantg.com/sta40/views/personnelscreenview.aspx",
      "modified": "2025-08-21T06:00:20.607000",
      "created": "2025-07-22T06:45:57.499000",
      "tags": [
        "pegasus",
        "report spam",
        "gotham foundry",
        "espionage",
        "spinal cord",
        "injured created",
        "minutes ago",
        "strange",
        "foundry",
        "palantir",
        "alexa",
        "service",
        "url http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "ipv4",
        "united",
        "germany",
        "singapore",
        "netherlands",
        "iran",
        "india",
        "search",
        "domain",
        "hostname",
        "filehashmd5",
        "filehashsha1",
        "extraction",
        "data upload",
        "sc type",
        "dren aeu",
        "extr source",
        "ur data",
        "include",
        "review exclude",
        "sugges",
        "mtu denial",
        "matches rule",
        "needed",
        "df bit",
        "unique rule",
        "catalog tree",
        "c0002 wininet",
        "ta0005 command",
        "control ta0011",
        "get http",
        "resolved ips",
        "dns resolutions",
        "cloudflare",
        "flag",
        "server",
        "date",
        "contacted hosts",
        "ip address",
        "process details",
        "t1158",
        "hidden",
        "t1031",
        "modify existing",
        "t1053",
        "taskjob",
        "t1060",
        "run keys",
        "startup",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "command",
        "found",
        "itre att",
        "show process",
        "prefetch8",
        "mitre att",
        "show technique",
        "ck matrix",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "april",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "entries",
        "unknown ns",
        "creation date",
        "record value",
        "showing",
        "gmt content",
        "accept encoding",
        "encrypt",
        "checked url",
        "hostname server",
        "response ip",
        "address google",
        "safe browsing",
        "present jan"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2628,
        "domain": 472,
        "hostname": 880,
        "FileHash-SHA256": 805,
        "FileHash-MD5": 151,
        "FileHash-SHA1": 128,
        "CIDR": 1,
        "SSLCertFingerprint": 3,
        "email": 1
      },
      "indicator_count": 5069,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "241 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687d18d829739be014393c59",
      "name": "SoundCloud - Hear the world\u2019s sounds",
      "description": "Social engineering included lots of contact via Facebook, Twitter, SoundCloud, Victims website, iCloud.. iCloud was erased and the hacker left the man \u2018deadmau5\u2018 .  deadmau5 was used threatening posts emails and whoever they are sent photos and became overly interested in victims music. 1st to report music was not showing up on YouTube. Statements show victim had millions of views redirected. Hackers would often thank artistss for another million views. Songs pirated. Jansky on SoundCloud contacted victims daughter often, sent a photo and said he was from Great Britain. \n\u2022 ALFPER:PUA:Win32/InstallCore\n\u2022 TrojanDropper:Win32/VB.IL\n\u2022 Win.Trojan.Agent-\n|| blog.jpcert.or.jp \n\n\u2022 Registrant Org: Japan Computer Emergency Response Team Coordination Center\n\nI feel like this is very dangerous. These people are in Colorado no matter where they say they are.",
      "modified": "2025-08-19T14:03:11.976000",
      "created": "2025-07-20T16:27:04.872000",
      "tags": [
        "read c",
        "search",
        "medium",
        "entries",
        "show",
        "unicode",
        "tls handshake",
        "memcommit",
        "delete",
        "crlf line",
        "next",
        "dock",
        "write",
        "execution",
        "malware",
        "copy",
        "no expiration",
        "filehashmd5",
        "filehashsha256",
        "showing",
        "urls",
        "passive dns",
        "http",
        "unique",
        "l add",
        "pulse pulses",
        "ip address",
        "related nids",
        "files location",
        "united",
        "code",
        "present jul",
        "present showing",
        "title error",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jul",
        "next associated",
        "files show",
        "win32",
        "date",
        "urls show",
        "error",
        "creation date",
        "name servers",
        "value emails",
        "name eric",
        "wahlforss name",
        "org soundcloud",
        "city berlin",
        "country de",
        "dnssec unsigned",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "asn as16509",
        "less",
        "results nov",
        "associated urls",
        "results jan",
        "present feb",
        "related tags",
        "none indicator",
        "facts domain",
        "present",
        "akamai external",
        "resources whois",
        "urlvoid",
        "related",
        "png image",
        "rgba",
        "alfper",
        "ipv4 add",
        "trojandropper",
        "present may",
        "present jun",
        "cname",
        "emails",
        "status",
        "servers",
        "less whois",
        "body",
        "fastly error",
        "please",
        "sea p",
        "america flag",
        "america asn",
        "trojan",
        "accept",
        "url add",
        "ip related",
        "pulses none",
        "cdhc",
        "oxq xr8w1",
        "fv5hc9a2l",
        "s showing",
        "next related",
        "domains domain",
        "script urls",
        "present sep",
        "cookie",
        "hostname add"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6020,
        "hostname": 1865,
        "FileHash-SHA256": 676,
        "FileHash-MD5": 106,
        "FileHash-SHA1": 86,
        "domain": 990,
        "email": 5
      },
      "indicator_count": 9748,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "243 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687d18de7177474b759ab2b7",
      "name": "SoundCloud - Hear the world\u2019s sounds",
      "description": "Social engineering included lots of contact via Facebook, Twitter, SoundCloud, Victims website, iCloud.. iCloud was erased and the hacker left the man \u2018deadmau5\u2018 .  deadmau5 was used threatening posts emails and whoever they are sent photos and became overly interested in victims music. 1st to report music was not showing up on YouTube. Statements show victim had millions of views redirected. Hackers would often thank artistss for another million views. Songs pirated. Jansky on SoundCloud contacted victims daughter often, sent a photo and said he was from Great Britain. \n\u2022 ALFPER:PUA:Win32/InstallCore\n\u2022 TrojanDropper:Win32/VB.IL\n\u2022 Win.Trojan.Agent-\n|| blog.jpcert.or.jp \n\n\u2022 Registrant Org: Japan Computer Emergency Response Team Coordination Center\n\nI feel like this is very dangerous. These people are in Colorado no matter where they say they are.",
      "modified": "2025-08-19T14:03:11.976000",
      "created": "2025-07-20T16:27:10.608000",
      "tags": [
        "read c",
        "search",
        "medium",
        "entries",
        "show",
        "unicode",
        "tls handshake",
        "memcommit",
        "delete",
        "crlf line",
        "next",
        "dock",
        "write",
        "execution",
        "malware",
        "copy",
        "no expiration",
        "filehashmd5",
        "filehashsha256",
        "showing",
        "urls",
        "passive dns",
        "http",
        "unique",
        "l add",
        "pulse pulses",
        "ip address",
        "related nids",
        "files location",
        "united",
        "code",
        "present jul",
        "present showing",
        "title error",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results jul",
        "next associated",
        "files show",
        "win32",
        "date",
        "urls show",
        "error",
        "creation date",
        "name servers",
        "value emails",
        "name eric",
        "wahlforss name",
        "org soundcloud",
        "city berlin",
        "country de",
        "dnssec unsigned",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "asn as16509",
        "less",
        "results nov",
        "associated urls",
        "results jan",
        "present feb",
        "related tags",
        "none indicator",
        "facts domain",
        "present",
        "akamai external",
        "resources whois",
        "urlvoid",
        "related",
        "png image",
        "rgba",
        "alfper",
        "ipv4 add",
        "trojandropper",
        "present may",
        "present jun",
        "cname",
        "emails",
        "status",
        "servers",
        "less whois",
        "body",
        "fastly error",
        "please",
        "sea p",
        "america flag",
        "america asn",
        "trojan",
        "accept",
        "url add",
        "ip related",
        "pulses none",
        "cdhc",
        "oxq xr8w1",
        "fv5hc9a2l",
        "s showing",
        "next related",
        "domains domain",
        "script urls",
        "present sep",
        "cookie",
        "hostname add"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6020,
        "hostname": 1865,
        "FileHash-SHA256": 676,
        "FileHash-MD5": 106,
        "FileHash-SHA1": 86,
        "domain": 990,
        "email": 5
      },
      "indicator_count": 9748,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "243 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6875e98438889e51b3fdd18f",
      "name": "Critical \u2022 Schedule system process - Mirai | Foundry Overwatch",
      "description": "",
      "modified": "2025-08-14T05:04:16.839000",
      "created": "2025-07-15T05:39:16.652000",
      "tags": [
        "win32 exe",
        "country",
        "include review",
        "exclude",
        "defense evasion",
        "access ta0006",
        "command",
        "control ta0011",
        "impact ta0040",
        "impact ob0008",
        "file system",
        "system oc0008",
        "match unknown",
        "adversaries",
        "match info",
        "info",
        "execution flow",
        "t1574 dll",
        "tries",
        "registry",
        "modify system",
        "process t1543",
        "unknown",
        "window",
        "ob0009 install",
        "ob0012 install",
        "insecure",
        "b0047 modify",
        "registry e1112",
        "hidden files",
        "registry run",
        "keys",
        "startup folder",
        "f0012 file",
        "critical",
        "united",
        "as15169",
        "delete c",
        "as16509",
        "show",
        "search",
        "intel",
        "ms windows",
        "entries",
        "medium",
        "worm",
        "copy",
        "write",
        "explorer",
        "malware",
        "next",
        "present jul",
        "status",
        "date",
        "ip address",
        "domain",
        "servers",
        "showing",
        "unknown ns",
        "related pulses",
        "pulses",
        "tags",
        "related tags",
        "more file",
        "type",
        "date april",
        "am size",
        "sha1 sha256",
        "as14618",
        "united kingdom",
        "as54113",
        "as15133 verizon",
        "top source",
        "top destination",
        "status domain",
        "ip whitelisted",
        "whitelisted",
        "tcp include",
        "source source",
        "oamazon",
        "cnamazon rsa",
        "odigicert inc",
        "sweden as20940",
        "as20940",
        "entries tls",
        "ip destination",
        "encrypt",
        "aaaa",
        "found",
        "certificate",
        "next associated",
        "urls show",
        "date checked",
        "error",
        "windows",
        "high",
        "yara detections",
        "installs",
        "checks",
        "filehash",
        "sha256 add",
        "themida",
        "data upload",
        "extraction",
        "md5 add",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "win32",
        "ddos",
        "passive dns",
        "activity",
        "checkin",
        "win64",
        "mtb jan",
        "lowfi",
        "trojan",
        "ransom",
        "trojandropper",
        "yara",
        "nsis",
        "nss bv",
        "su data",
        "windo alerts",
        "andariel",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "id deadhost",
        "connects",
        "andariel high",
        "richhash",
        "external",
        "virustotal api",
        "screenshots",
        "failed",
        "auurtonany data",
        "themida andarie",
        "present may",
        "japan unknown",
        "unknown cname",
        "domain add",
        "urls",
        "files",
        "http headers",
        "msie",
        "windows nt",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "wget command",
        "devices home",
        "execution",
        "foundry",
        "home networks",
        "mirai",
        "x.com",
        "porn",
        "monitored target",
        "d link",
        "targets"
      ],
      "references": [
        "TJprojMain.exe {79c7303a1a49b85569245a8ca1c1a26be720387845af9391fa1e4677308bd6b6}",
        "Crowdsourced Signa: Schedule system process by Joe Security",
        "Sigma \u2022 Suspicious Process Masquerading As SvcHost.EXE by Swachchhanda Shrawan Poudel",
        "Sigma \u2022 System File Execution Location Anomaly by Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)",
        "Yara \u2022  NSIS from ruleset NSIS by kevoreilly",
        "Yara \u2022 rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "Yara \u2022 Windows_Generic_Threat_7526f106 from ruleset Windows_Generic_Threat by Elastic Security",
        "Alerts: persistence_autorun \u2022 persistence_autorun_tasks stealth_hiddenreg \u2022 suspicious_command",
        "IDS : Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI",
        "Mirai - ]1.0.0.0 - Unix.Trojan.Mirai-6981169-0",
        "*Themida_2xx. Oreans,Technologies",
        "*Andariel Backdoor Activity (Checkin)",
        "Alert: dead_host nids_malware_alert network_icmp nolookup_communication",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "foundry2-lbl.dvr.dn2.n-helix.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://foundry2sdbl",
        "https://xn--72c9abh1f8ad1lzc.com/video_tag/pornthai/ \u2022 https://ro.theskinnyfoodco.com/en-fr/blogs/recipes/pornstar-martini-recipe \u2022 m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "x.com \u2022 nr-data.net \u2022 apple.k8s.joewa.com",
        "http://apple.cc.lvlid.com/ \u2022 http://apple.cc.lvlid.com/ios/ \u2022 http://www.apple.cc.lvlid.com/ios",
        "Devices remotely connected, tracked , monitored"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Win.Malware.Ursu-9856871-0",
          "display_name": "Win.Malware.Ursu-9856871-0",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1512",
          "name": "Capture Camera",
          "display_name": "T1512 - Capture Camera"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [
        "Healthcare",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 448,
        "FileHash-SHA1": 435,
        "FileHash-SHA256": 5851,
        "hostname": 2580,
        "domain": 1176,
        "URL": 7133,
        "SSLCertFingerprint": 30,
        "email": 3,
        "CVE": 3
      },
      "indicator_count": 17659,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "248 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://msoid.arnotts.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://msoid.arnotts.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641436.4414575
}