{
  "type": "URL",
  "indicator": "https://mtl100.websitehostserver.net",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://mtl100.websitehostserver.net",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3736814311,
      "indicator": "https://mtl100.websitehostserver.net",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "65c4a099f6a2c8fc2bb85d4b",
          "name": "Cyber espionage & ransomware attacks Denver Recording Studio",
          "description": "GoldMax is used by UNC2452 as a command-and-control backdoor. It is written in the Go programming language. To hide its activities, it generates dummy traffic.\n\nSibot is a VBScript-based malware that allows attackers to download and run payloads from a remote command-and-control server. It uses file names that are similar to those used in Windows for masquerading. The VBScript is executed through a scheduled task.\n\nGoldFinder is another Go malware used by attackers to access a hardcoded command-and-control (C2) server by logging the route or hops that a packet takes like an HTTP tracer tool.",
          "modified": "2024-03-09T09:02:09.950000",
          "created": "2024-02-08T09:36:25.114000",
          "tags": [
            "ssl certificate",
            "contacted",
            "historical ssl",
            "february",
            "referrer",
            "threat roundup",
            "apple ios",
            "goldfinder",
            "sibot",
            "goldmax",
            "hacktool",
            "malicious",
            "formbook",
            "contacted urls",
            "resolutions",
            "malware",
            "njrat",
            "ransomware",
            "open",
            "cyber criminal",
            "record type",
            "ttl value",
            "dropped",
            "execution",
            "hashes hashes",
            "hashes",
            "network",
            "communicating",
            "maui ransomware",
            "type name",
            "jpeg",
            "ms word",
            "document",
            "whois record",
            "january",
            "october",
            "december",
            "april",
            "august",
            "crypto",
            "awful",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "march",
            "urls http",
            "threat network",
            "problems",
            "whois whois",
            "probe",
            "startpage",
            "premium",
            "snatch",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "gvb gelimed",
            "com laude",
            "mb super",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "twitter",
            "united",
            "as20940",
            "aaaa",
            "as714 apple",
            "as16625 akamai",
            "win32mydoom feb",
            "name servers",
            "trojan",
            "as6185 apple",
            "creation date",
            "virtool",
            "worm",
            "date",
            "win32",
            "urls",
            "search",
            "servers",
            "targeting",
            "target",
            "tsara brashears",
            "united kingdom",
            "whitelisted",
            "as6453 tata",
            "passive dns",
            "domain",
            "as46606",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "as54113",
            "entries",
            "moved",
            "body",
            "unknown",
            "found",
            "files",
            "backdoor",
            "expiration date",
            "hallrender",
            "tulach",
            "all octoseek",
            "url http",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "as62597 nsone",
            "as62729",
            "showing",
            "next",
            "as2914 ntt",
            "ireland unknown",
            "germany unknown",
            "as6461 zayo",
            "as7843 charter",
            "as3257 gtt",
            "ip address",
            "location united",
            "for privacy",
            "record value",
            "as54990",
            "bouvet island",
            "encrypt",
            "show",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "as15169 google",
            "domains ii",
            "sality",
            "ck id",
            "ck matrix",
            "intellectual property theft",
            "malicious file transfers",
            "scheme",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "urls url",
            "j490s6lkpppw",
            "lfqprnkje8dni0"
          ],
          "references": [
            "https://side3.com/",
            "https://www.side3.com",
            "http://koshishmarketing.com/mo8igygw3uv/t4z68181/ [malware_hosting]",
            "http://l2filesget.com/horyuclassic/updater/Launcher_Horyu_Classic.exe  [malware_hosting]",
            "http://fillmark.net/index.php [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/    [phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/   [phishing]",
            "www-temp.metrobyt-mobile.com [malicious | data collection]",
            "www.icloud.com [wp-login.php]",
            "webdisk.thehomemakers.nl [spyware | tracking]",
            "https://tulach.cc/ [phishing - malware engineers. Malware commonly associated with m.brian sabey of hallrender.(.)com [malware hosting/attacking legal team]",
            "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [OS & iOS password cracker] | 136-186.pornhub.org",
            "cs9.wac.phicdn.net.1.1.e64a8639.roksit.net",
            "www.anyxxxtube.net [malicious data collection]",
            "s3.amazonaws.com [targeting data collection]",
            "https://twitter.com/PORNO_SEXYBABES | https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/",
            "nr-data.net [Apple Private Data Collection] | 67.199.248.12 [apple data collection IP]",
            "api.utah.edu [access apple]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [access to vulnerable or targeted devices via media]",
            "tv.apple.com",
            "104.92.250.162 [Apple image scanning IP] || appleid.com [insecure. other users]",
            "andrewka6.pythonanywhere.com [python connection - apple]",
            "http://l2filesget.com/horyuclassic/updater/system-eu/EnchantStatBonus_Classic.dat.lzma",
            "https://www.picussecurity.com/resource/unc2452-nobelium-threat-group-attack-campaign",
            "sonymobilemail.com",
            "https://onhimalayas.com/ckfinder/userfiles/files/jafufedopegagedolabib.pdf",
            "pegahpouraseflaw.info",
            "http://mouthgrave.net/index.php",
            "ransomed.vc",
            "Intellectual property accessed and distributed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "Cyber Criminal",
              "display_name": "Cyber Criminal",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax",
              "display_name": "GoldMax",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom",
              "display_name": "Worm:Win32/Mydoom",
              "target": "/malware/Worm:Win32/Mydoom"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1215",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1215 - Kernel Modules and Extensions"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology",
            "Telecommunications",
            "Recording Industry",
            "Entertainers",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 49,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5271,
            "FileHash-MD5": 899,
            "FileHash-SHA1": 881,
            "FileHash-SHA256": 5609,
            "domain": 2199,
            "hostname": 3205,
            "CVE": 1,
            "email": 9
          },
          "indicator_count": 18074,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "771 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c4a1c74cf5f1af5be6464e",
          "name": " authsmtp.sabeydatacenters.com | tulach gained access to Side3 Studios Denver\t\t",
          "description": "",
          "modified": "2024-03-09T09:02:09.950000",
          "created": "2024-02-08T09:41:27.252000",
          "tags": [
            "ssl certificate",
            "contacted",
            "historical ssl",
            "february",
            "referrer",
            "threat roundup",
            "apple ios",
            "goldfinder",
            "sibot",
            "goldmax",
            "hacktool",
            "malicious",
            "formbook",
            "contacted urls",
            "resolutions",
            "malware",
            "njrat",
            "ransomware",
            "open",
            "cyber criminal",
            "record type",
            "ttl value",
            "dropped",
            "execution",
            "hashes hashes",
            "hashes",
            "network",
            "communicating",
            "maui ransomware",
            "type name",
            "jpeg",
            "ms word",
            "document",
            "whois record",
            "january",
            "october",
            "december",
            "april",
            "august",
            "crypto",
            "awful",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "self",
            "march",
            "urls http",
            "threat network",
            "problems",
            "whois whois",
            "probe",
            "startpage",
            "premium",
            "snatch",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "gvb gelimed",
            "com laude",
            "mb super",
            "optimizer",
            "amazonaes",
            "summary iocs",
            "twitter",
            "united",
            "as20940",
            "aaaa",
            "as714 apple",
            "as16625 akamai",
            "win32mydoom feb",
            "name servers",
            "trojan",
            "as6185 apple",
            "creation date",
            "virtool",
            "worm",
            "date",
            "win32",
            "urls",
            "search",
            "servers",
            "targeting",
            "target",
            "tsara brashears",
            "united kingdom",
            "whitelisted",
            "as6453 tata",
            "passive dns",
            "domain",
            "as46606",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "as54113",
            "entries",
            "moved",
            "body",
            "unknown",
            "found",
            "files",
            "backdoor",
            "expiration date",
            "hallrender",
            "tulach",
            "all octoseek",
            "url http",
            "pulse pulses",
            "http",
            "related pulses",
            "none related",
            "tags none",
            "file type",
            "as62597 nsone",
            "as62729",
            "showing",
            "next",
            "as2914 ntt",
            "ireland unknown",
            "germany unknown",
            "as6461 zayo",
            "as7843 charter",
            "as3257 gtt",
            "ip address",
            "location united",
            "for privacy",
            "record value",
            "as54990",
            "bouvet island",
            "encrypt",
            "show",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "june",
            "copy",
            "as15169 google",
            "domains ii",
            "sality",
            "ck id",
            "ck matrix",
            "intellectual property theft",
            "malicious file transfers",
            "scheme",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "urls url",
            "j490s6lkpppw",
            "lfqprnkje8dni0"
          ],
          "references": [
            "https://side3.com/",
            "https://www.side3.com",
            "http://koshishmarketing.com/mo8igygw3uv/t4z68181/ [malware_hosting]",
            "http://l2filesget.com/horyuclassic/updater/Launcher_Horyu_Classic.exe  [malware_hosting]",
            "http://fillmark.net/index.php [phishing]",
            "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/    [phishing]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/   [phishing]",
            "www-temp.metrobyt-mobile.com [malicious | data collection]",
            "www.icloud.com [wp-login.php]",
            "webdisk.thehomemakers.nl [spyware | tracking]",
            "https://tulach.cc/ [phishing - malware engineers. Malware commonly associated with m.brian sabey of hallrender.(.)com [malware hosting/attacking legal team]",
            "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [OS & iOS password cracker] | 136-186.pornhub.org",
            "cs9.wac.phicdn.net.1.1.e64a8639.roksit.net",
            "www.anyxxxtube.net [malicious data collection]",
            "s3.amazonaws.com [targeting data collection]",
            "https://twitter.com/PORNO_SEXYBABES | https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/",
            "nr-data.net [Apple Private Data Collection] | 67.199.248.12 [apple data collection IP]",
            "api.utah.edu [access apple]",
            "https://applemusic-spotlight.myunidays.com/US/en-US? [access to vulnerable or targeted devices via media]",
            "tv.apple.com",
            "104.92.250.162 [Apple image scanning IP] || appleid.com [insecure. other users]",
            "andrewka6.pythonanywhere.com [python connection - apple]",
            "http://l2filesget.com/horyuclassic/updater/system-eu/EnchantStatBonus_Classic.dat.lzma",
            "https://www.picussecurity.com/resource/unc2452-nobelium-threat-group-attack-campaign",
            "sonymobilemail.com",
            "https://onhimalayas.com/ckfinder/userfiles/files/jafufedopegagedolabib.pdf",
            "pegahpouraseflaw.info",
            "http://mouthgrave.net/index.php",
            "ransomed.vc",
            "Intellectual property accessed and distributed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "Cyber Criminal",
              "display_name": "Cyber Criminal",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax",
              "display_name": "GoldMax",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "NjRAT",
              "display_name": "NjRAT",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Maui Ransomware",
              "display_name": "Maui Ransomware",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom",
              "display_name": "Worm:Win32/Mydoom",
              "target": "/malware/Worm:Win32/Mydoom"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1215",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1215 - Kernel Modules and Extensions"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [
            "Entertainment",
            "Technology",
            "Telecommunications",
            "Recording Industry",
            "Entertainers",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": "65c4a099f6a2c8fc2bb85d4b",
          "export_count": 44,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5271,
            "FileHash-MD5": 899,
            "FileHash-SHA1": 881,
            "FileHash-SHA256": 5609,
            "domain": 2199,
            "hostname": 3205,
            "CVE": 1,
            "email": 9
          },
          "indicator_count": 18074,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "771 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64d56620fb6845e22b859e75",
          "name": "Who is ENOM (DREAMHOST)",
          "description": "",
          "modified": "2023-09-11T00:03:40.398000",
          "created": "2023-08-10T22:35:12.322000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64d31d52d54a9591dd717e17",
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2544,
            "domain": 2507,
            "URL": 2757,
            "email": 26,
            "CVE": 25,
            "FileHash-SHA256": 61,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 12
          },
          "indicator_count": 7941,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 85,
          "modified_text": "951 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "s3.amazonaws.com [targeting data collection]",
        "104.92.250.162 [Apple image scanning IP] || appleid.com [insecure. other users]",
        "sonymobilemail.com",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [access to vulnerable or targeted devices via media]",
        "www-temp.metrobyt-mobile.com [malicious | data collection]",
        "http://l2filesget.com/horyuclassic/updater/Launcher_Horyu_Classic.exe  [malware_hosting]",
        "https://side3.com/",
        "Intellectual property accessed and distributed",
        "nr-data.net [Apple Private Data Collection] | 67.199.248.12 [apple data collection IP]",
        "https://tulach.cc/ [phishing - malware engineers. Malware commonly associated with m.brian sabey of hallrender.(.)com [malware hosting/attacking legal team]",
        "webdisk.thehomemakers.nl [spyware | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/   [phishing]",
        "www.anyxxxtube.net [malicious data collection]",
        "tv.apple.com",
        "https://onhimalayas.com/ckfinder/userfiles/files/jafufedopegagedolabib.pdf",
        "https://twitter.com/PORNO_SEXYBABES | https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/",
        "http://l2filesget.com/horyuclassic/updater/system-eu/EnchantStatBonus_Classic.dat.lzma",
        "andrewka6.pythonanywhere.com [python connection - apple]",
        "pegahpouraseflaw.info",
        "api.utah.edu [access apple]",
        "http://koshishmarketing.com/mo8igygw3uv/t4z68181/ [malware_hosting]",
        "http://mouthgrave.net/index.php",
        "www.icloud.com [wp-login.php]",
        "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [OS & iOS password cracker] | 136-186.pornhub.org",
        "cs9.wac.phicdn.net.1.1.e64a8639.roksit.net",
        "https://www.side3.com",
        "ransomed.vc",
        "https://www.picussecurity.com/resource/unc2452-nobelium-threat-group-attack-campaign",
        "http://fillmark.net/index.php [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/    [phishing]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Tulach",
            "Goldmax",
            "Ransomware",
            "Hacktool",
            "Cyber criminal",
            "Worm:win32/mydoom",
            "Maui ransomware",
            "Sibot",
            "Goldfinder",
            "Njrat",
            "Formbook",
            "Sality"
          ],
          "industries": [
            "Civil society",
            "Entertainers",
            "Technology",
            "Recording industry",
            "Entertainment",
            "Telecommunications"
          ],
          "unique_indicators": 24960
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/websitehostserver.net",
    "whois": "http://whois.domaintools.com/websitehostserver.net",
    "domain": "websitehostserver.net",
    "hostname": "mtl100.websitehostserver.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "65c4a099f6a2c8fc2bb85d4b",
      "name": "Cyber espionage & ransomware attacks Denver Recording Studio",
      "description": "GoldMax is used by UNC2452 as a command-and-control backdoor. It is written in the Go programming language. To hide its activities, it generates dummy traffic.\n\nSibot is a VBScript-based malware that allows attackers to download and run payloads from a remote command-and-control server. It uses file names that are similar to those used in Windows for masquerading. The VBScript is executed through a scheduled task.\n\nGoldFinder is another Go malware used by attackers to access a hardcoded command-and-control (C2) server by logging the route or hops that a packet takes like an HTTP tracer tool.",
      "modified": "2024-03-09T09:02:09.950000",
      "created": "2024-02-08T09:36:25.114000",
      "tags": [
        "ssl certificate",
        "contacted",
        "historical ssl",
        "february",
        "referrer",
        "threat roundup",
        "apple ios",
        "goldfinder",
        "sibot",
        "goldmax",
        "hacktool",
        "malicious",
        "formbook",
        "contacted urls",
        "resolutions",
        "malware",
        "njrat",
        "ransomware",
        "open",
        "cyber criminal",
        "record type",
        "ttl value",
        "dropped",
        "execution",
        "hashes hashes",
        "hashes",
        "network",
        "communicating",
        "maui ransomware",
        "type name",
        "jpeg",
        "ms word",
        "document",
        "whois record",
        "january",
        "october",
        "december",
        "april",
        "august",
        "crypto",
        "awful",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "self",
        "march",
        "urls http",
        "threat network",
        "problems",
        "whois whois",
        "probe",
        "startpage",
        "premium",
        "snatch",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "gvb gelimed",
        "com laude",
        "mb super",
        "optimizer",
        "amazonaes",
        "summary iocs",
        "twitter",
        "united",
        "as20940",
        "aaaa",
        "as714 apple",
        "as16625 akamai",
        "win32mydoom feb",
        "name servers",
        "trojan",
        "as6185 apple",
        "creation date",
        "virtool",
        "worm",
        "date",
        "win32",
        "urls",
        "search",
        "servers",
        "targeting",
        "target",
        "tsara brashears",
        "united kingdom",
        "whitelisted",
        "as6453 tata",
        "passive dns",
        "domain",
        "as46606",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "as54113",
        "entries",
        "moved",
        "body",
        "unknown",
        "found",
        "files",
        "backdoor",
        "expiration date",
        "hallrender",
        "tulach",
        "all octoseek",
        "url http",
        "pulse pulses",
        "http",
        "related pulses",
        "none related",
        "tags none",
        "file type",
        "as62597 nsone",
        "as62729",
        "showing",
        "next",
        "as2914 ntt",
        "ireland unknown",
        "germany unknown",
        "as6461 zayo",
        "as7843 charter",
        "as3257 gtt",
        "ip address",
        "location united",
        "for privacy",
        "record value",
        "as54990",
        "bouvet island",
        "encrypt",
        "show",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "june",
        "copy",
        "as15169 google",
        "domains ii",
        "sality",
        "ck id",
        "ck matrix",
        "intellectual property theft",
        "malicious file transfers",
        "scheme",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "urls url",
        "j490s6lkpppw",
        "lfqprnkje8dni0"
      ],
      "references": [
        "https://side3.com/",
        "https://www.side3.com",
        "http://koshishmarketing.com/mo8igygw3uv/t4z68181/ [malware_hosting]",
        "http://l2filesget.com/horyuclassic/updater/Launcher_Horyu_Classic.exe  [malware_hosting]",
        "http://fillmark.net/index.php [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/    [phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/   [phishing]",
        "www-temp.metrobyt-mobile.com [malicious | data collection]",
        "www.icloud.com [wp-login.php]",
        "webdisk.thehomemakers.nl [spyware | tracking]",
        "https://tulach.cc/ [phishing - malware engineers. Malware commonly associated with m.brian sabey of hallrender.(.)com [malware hosting/attacking legal team]",
        "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [OS & iOS password cracker] | 136-186.pornhub.org",
        "cs9.wac.phicdn.net.1.1.e64a8639.roksit.net",
        "www.anyxxxtube.net [malicious data collection]",
        "s3.amazonaws.com [targeting data collection]",
        "https://twitter.com/PORNO_SEXYBABES | https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/",
        "nr-data.net [Apple Private Data Collection] | 67.199.248.12 [apple data collection IP]",
        "api.utah.edu [access apple]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [access to vulnerable or targeted devices via media]",
        "tv.apple.com",
        "104.92.250.162 [Apple image scanning IP] || appleid.com [insecure. other users]",
        "andrewka6.pythonanywhere.com [python connection - apple]",
        "http://l2filesget.com/horyuclassic/updater/system-eu/EnchantStatBonus_Classic.dat.lzma",
        "https://www.picussecurity.com/resource/unc2452-nobelium-threat-group-attack-campaign",
        "sonymobilemail.com",
        "https://onhimalayas.com/ckfinder/userfiles/files/jafufedopegagedolabib.pdf",
        "pegahpouraseflaw.info",
        "http://mouthgrave.net/index.php",
        "ransomed.vc",
        "Intellectual property accessed and distributed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [
        {
          "id": "Cyber Criminal",
          "display_name": "Cyber Criminal",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax",
          "display_name": "GoldMax",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom",
          "display_name": "Worm:Win32/Mydoom",
          "target": "/malware/Worm:Win32/Mydoom"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Sality",
          "display_name": "Sality",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1215",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1215 - Kernel Modules and Extensions"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology",
        "Telecommunications",
        "Recording Industry",
        "Entertainers",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 49,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5271,
        "FileHash-MD5": 899,
        "FileHash-SHA1": 881,
        "FileHash-SHA256": 5609,
        "domain": 2199,
        "hostname": 3205,
        "CVE": 1,
        "email": 9
      },
      "indicator_count": 18074,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "771 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c4a1c74cf5f1af5be6464e",
      "name": " authsmtp.sabeydatacenters.com | tulach gained access to Side3 Studios Denver\t\t",
      "description": "",
      "modified": "2024-03-09T09:02:09.950000",
      "created": "2024-02-08T09:41:27.252000",
      "tags": [
        "ssl certificate",
        "contacted",
        "historical ssl",
        "february",
        "referrer",
        "threat roundup",
        "apple ios",
        "goldfinder",
        "sibot",
        "goldmax",
        "hacktool",
        "malicious",
        "formbook",
        "contacted urls",
        "resolutions",
        "malware",
        "njrat",
        "ransomware",
        "open",
        "cyber criminal",
        "record type",
        "ttl value",
        "dropped",
        "execution",
        "hashes hashes",
        "hashes",
        "network",
        "communicating",
        "maui ransomware",
        "type name",
        "jpeg",
        "ms word",
        "document",
        "whois record",
        "january",
        "october",
        "december",
        "april",
        "august",
        "crypto",
        "awful",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "self",
        "march",
        "urls http",
        "threat network",
        "problems",
        "whois whois",
        "probe",
        "startpage",
        "premium",
        "snatch",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "gvb gelimed",
        "com laude",
        "mb super",
        "optimizer",
        "amazonaes",
        "summary iocs",
        "twitter",
        "united",
        "as20940",
        "aaaa",
        "as714 apple",
        "as16625 akamai",
        "win32mydoom feb",
        "name servers",
        "trojan",
        "as6185 apple",
        "creation date",
        "virtool",
        "worm",
        "date",
        "win32",
        "urls",
        "search",
        "servers",
        "targeting",
        "target",
        "tsara brashears",
        "united kingdom",
        "whitelisted",
        "as6453 tata",
        "passive dns",
        "domain",
        "as46606",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "as54113",
        "entries",
        "moved",
        "body",
        "unknown",
        "found",
        "files",
        "backdoor",
        "expiration date",
        "hallrender",
        "tulach",
        "all octoseek",
        "url http",
        "pulse pulses",
        "http",
        "related pulses",
        "none related",
        "tags none",
        "file type",
        "as62597 nsone",
        "as62729",
        "showing",
        "next",
        "as2914 ntt",
        "ireland unknown",
        "germany unknown",
        "as6461 zayo",
        "as7843 charter",
        "as3257 gtt",
        "ip address",
        "location united",
        "for privacy",
        "record value",
        "as54990",
        "bouvet island",
        "encrypt",
        "show",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "june",
        "copy",
        "as15169 google",
        "domains ii",
        "sality",
        "ck id",
        "ck matrix",
        "intellectual property theft",
        "malicious file transfers",
        "scheme",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "urls url",
        "j490s6lkpppw",
        "lfqprnkje8dni0"
      ],
      "references": [
        "https://side3.com/",
        "https://www.side3.com",
        "http://koshishmarketing.com/mo8igygw3uv/t4z68181/ [malware_hosting]",
        "http://l2filesget.com/horyuclassic/updater/Launcher_Horyu_Classic.exe  [malware_hosting]",
        "http://fillmark.net/index.php [phishing]",
        "https://rmy1o3xp-d182-v9.klinika-rekonstruktivnoj-kosmetologii-na-ulitse-lenina.ru/    [phishing]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/   [phishing]",
        "www-temp.metrobyt-mobile.com [malicious | data collection]",
        "www.icloud.com [wp-login.php]",
        "webdisk.thehomemakers.nl [spyware | tracking]",
        "https://tulach.cc/ [phishing - malware engineers. Malware commonly associated with m.brian sabey of hallrender.(.)com [malware hosting/attacking legal team]",
        "URL https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [OS & iOS password cracker] | 136-186.pornhub.org",
        "cs9.wac.phicdn.net.1.1.e64a8639.roksit.net",
        "www.anyxxxtube.net [malicious data collection]",
        "s3.amazonaws.com [targeting data collection]",
        "https://twitter.com/PORNO_SEXYBABES | https://otx.alienvault.com/indicator/url/https://www.anyxxxtube.net/search-porn/a-m-c-ate-xxx-videos/",
        "nr-data.net [Apple Private Data Collection] | 67.199.248.12 [apple data collection IP]",
        "api.utah.edu [access apple]",
        "https://applemusic-spotlight.myunidays.com/US/en-US? [access to vulnerable or targeted devices via media]",
        "tv.apple.com",
        "104.92.250.162 [Apple image scanning IP] || appleid.com [insecure. other users]",
        "andrewka6.pythonanywhere.com [python connection - apple]",
        "http://l2filesget.com/horyuclassic/updater/system-eu/EnchantStatBonus_Classic.dat.lzma",
        "https://www.picussecurity.com/resource/unc2452-nobelium-threat-group-attack-campaign",
        "sonymobilemail.com",
        "https://onhimalayas.com/ckfinder/userfiles/files/jafufedopegagedolabib.pdf",
        "pegahpouraseflaw.info",
        "http://mouthgrave.net/index.php",
        "ransomed.vc",
        "Intellectual property accessed and distributed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [
        {
          "id": "Cyber Criminal",
          "display_name": "Cyber Criminal",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax",
          "display_name": "GoldMax",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "NjRAT",
          "display_name": "NjRAT",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Maui Ransomware",
          "display_name": "Maui Ransomware",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom",
          "display_name": "Worm:Win32/Mydoom",
          "target": "/malware/Worm:Win32/Mydoom"
        },
        {
          "id": "Tulach",
          "display_name": "Tulach",
          "target": null
        },
        {
          "id": "Sality",
          "display_name": "Sality",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1215",
          "name": "Kernel Modules and Extensions",
          "display_name": "T1215 - Kernel Modules and Extensions"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        }
      ],
      "industries": [
        "Entertainment",
        "Technology",
        "Telecommunications",
        "Recording Industry",
        "Entertainers",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": "65c4a099f6a2c8fc2bb85d4b",
      "export_count": 44,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5271,
        "FileHash-MD5": 899,
        "FileHash-SHA1": 881,
        "FileHash-SHA256": 5609,
        "domain": 2199,
        "hostname": 3205,
        "CVE": 1,
        "email": 9
      },
      "indicator_count": 18074,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "771 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "64d56620fb6845e22b859e75",
      "name": "Who is ENOM (DREAMHOST)",
      "description": "",
      "modified": "2023-09-11T00:03:40.398000",
      "created": "2023-08-10T22:35:12.322000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "64d31d52d54a9591dd717e17",
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ellenmmm",
        "id": "233693",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 2544,
        "domain": 2507,
        "URL": 2757,
        "email": 26,
        "CVE": 25,
        "FileHash-SHA256": 61,
        "FileHash-MD5": 9,
        "FileHash-SHA1": 12
      },
      "indicator_count": 7941,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 85,
      "modified_text": "951 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://mtl100.websitehostserver.net",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://mtl100.websitehostserver.net",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776639676.9364297
}