{
  "type": "URL",
  "indicator": "https://n.location.search/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://n.location.search/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3857668493,
      "indicator": "https://n.location.search/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 32,
      "pulses": [
        {
          "id": "69a3c685d4b7c139ffe62930",
          "name": "Clone Pulse Reference",
          "description": "",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-03-01T04:54:29.384000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6906bd99cadbd4140014c6af",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 454,
            "hostname": 1404,
            "URL": 3557,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 6754,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "698037098c99c37cb91037c2",
          "name": "Busy Box MITM Attacks via Drive-by-Compromise | Facebook | Apple",
          "description": "Busy Box - MITM Attack\n\nDrive-by-Compromise | Facebook | Jamie Oliver Recipes | My sister-in-law made this once and I couldn\u2019t stop eating it. \nAdversarial Facebook pop up posts. .\n\n|| Pykspa.C Check in. \"Pykspa is a type of Remote Access Trojan (RAT). A powerful  a worm that spreads via social media or via DGA algorithms. Parking crews are fond of these types of attacks. Christopher Ahmann",
          "modified": "2026-03-04T04:07:14.513000",
          "created": "2026-02-02T05:32:57.303000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "ipv4",
            "url http",
            "domain",
            "hostname",
            "filehashmd5",
            "filehashsha1",
            "iocs",
            "url https",
            "search",
            "type indicator",
            "review iocs",
            "role title",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "extraction",
            "sc data",
            "extre data",
            "include review",
            "exclude sugges",
            "data upload",
            "failed",
            "find s",
            "oo data",
            "enter source",
            "url or",
            "text drag",
            "expiration",
            "showing",
            "entries",
            "protect",
            "pulse show",
            "email abuse",
            "related pulses",
            "indicator role",
            "returnurl no",
            "drop",
            "pulse provide",
            "public tlp",
            "green",
            "adversary tags",
            "buzz",
            "x8664",
            "add tag",
            "groups add",
            "add industry",
            "trojan",
            "tags"
          ],
          "references": [
            "https://www.facebook.com/groups/378607181955796/posts/773093455840498/?hpir=1&http_ref=eyJ0cyI6MTc2OTk2MDkxOTAwMCwiciI6IiJ9",
            "www.crazyfrost.com IPv4 104.21.5.49 IPv4 172.67.132.250",
            "Antivirus Detections: Trojan:Win32/Dorv.A",
            "IDS Detections: Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host)",
            "IDS Detections: IP Check Domain (showmyipaddress .com in HTTP Host) External IP Lookup",
            "IDS Detections: Domain in DNS Lookup (whatismyipaddress .com) IP Check",
            "IDS Detections: Domain (whatismyipaddress .com in HTTP Host)",
            "Yara Detections XOR_embeded_exefile_xored_with_round_256_bytes_key",
            "Alerts: antiav_servicestop antisandbox_sleep process_creation_suspicious_location",
            "Alerts: network_bind persistence_autorun binary_yara procmem_yara suricata_alert",
            "Alerts: disables_uac infostealer_keylog modify_uac_prompt anomalous_deletefile",
            "Alerts: mouse_movement_detect dead_connect  enumerates_running_processes process_needed",
            "Alerts: dynamic_function_loading reads_memory_remote_process packer_entropy network_http",
            "IP\u2019s Contacted: 188.223.42.134 78.57.88.30  84.73.234.83  78.84.44.225  89.252.203.80",
            "IP\u2019s Contacted: 77.76.39.110 104.156.155.94  77.77.13.89  78.61.87.173  78.63.104.75",
            "Domains Contacted: www.whatismyip.com www.showmyipaddress.com www.whatismyip.ca",
            "Domains Contacted: whatismyipaddress.com whatismyip.everdot.org www.facebook.com",
            "Domains Contacted: fexexwjehud.org lxclombt.net jpnzlsaqogv.com esccuyigsy.org",
            "Antivirus Detections: Win.Malware.Pits-10035540-0",
            "Yara: Detections Delphi",
            "Alerts: infostealer_cookies antiav_detectfile",
            "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "nigger.cat \u2022 http://a.nigger.cat/ \u2022 http://a.nigger.cat/imrred.exe \u2022 http://a.nigger.cat/iwzptk.pdf \u2022",
            "http://a.nigger.cat/ltbexb.jpg \u2022 http://a.nigger.cat/ocnxdv.exe \u2022 http://a.nigger.cat/ocnxdv.exe/",
            "http://a.nigger.cat/ovefvy.html \u2022 http://a.nigger.cat/snkikb.rar \u2022 http://a.nigger.cat/unipms.exe",
            "http://a.nigger.cat/ypphgg.exe \u2022 http://u.nigger.cat/ \u2022 https://a.nigger.cat/",
            "http://www.a.nigger.cat/ocnxdv.exe \u2022 https://a.nigger.cat/pwzbrt.txt",
            "output.228572717.txt [fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f]",
            "https://www.virustotal.com/gui/file/fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f/summary",
            "https://hybrid-analysis.com/sample/3aaca21b3918eecd127867bdd724611398cf897a0686fedfde1d424b7ad6130a",
            "https://hybrid-analysis.com/sample/e4999984a69a65a69bec9fef1200f7ec36a10bc401cdd15db3510fdc87ec5008/697fb0fec4a9bda3410454cf",
            "https://hybrid-analysis.com/sample/f6ccff8dec08334fab98d4f6cb9b2774acd00e98d1afabd219c2634d5b3e2147/697faa178cc598cfb90b0423",
            "https://hybrid-analysis.com/sample/01a1a2106bcddc591cab08d31c13966bd0413fe312bce9be396e964e114631a6/697f8c04475b90e7fb0d7ff9",
            "apple4you.it \u2022 https://www.apple4you.it/ \u2022 cpcalendars.apple4you.it \u2022 ftp.apple4you.it \u2022",
            "https://ftp.apple4you.it \u2022 http://cpcalendars.apple4you.it \u2022 http://cpcontacts.apple4you.it \u2022",
            "http://ftp.apple4you.it \u2022 http://www.apple4you.it/ \u2022https://cpcalendars.apple4you.it \u2022",
            "https://cpcontacts.apple4you.it",
            "AppleWebKit Christopher P. \u2018BUZZ\u2019 Ahmann interference",
            "adsparkahz.shop \u2022 https://adsparkahz.shop/ \u2022 parkedbits.com",
            "https://parkedbits.com \u2022 spiritzuridgerunelahubcloudgusparkx.rest",
            "https://fs25.mygamesteam.com/download/underground-parking/",
            "http://spiritzuridgerunelahubcloudgusparkx.rest/",
            "127.0.0.1 Private IP Address  \u2022  http://facebook.com/iWebTechnologies",
            "9e8c2f9e77b4b6a7538e4136d3bda379c560dc1a5931643da119da2f28881e4d\tELF:DDoS-S\\ [Trj]\t\tUnix.Trojan.Gafgyt-6981154-0\tDDoS:Linux/Gafgyt.YA!MTB",
            "ELF:DDoS-S\\ [Trj] ,  Unix.Trojan.Gafgyt-6981154-0 ,  DDoS:Linux/Gafgyt.YA!MTB",
            "IDS Detections: Suspicious Activity potential UPnProxy",
            "Yara Detections: is__elf ,  ECHOBOT",
            "Alerts: dead_host network_icmp tcp_by",
            "Unix.Dropper.Mirai-7135925-0 ,  DDoS:Linux/Gafgyt.YA!MTB Yara Detections is__elf ,  ECHOBOT",
            "TAGS: aaaa accept activity address adversaries aes128gcm ahmann all hostname all ipv4 as15169",
            "TAGS: as29278 deninet as29728 cottage as47325 ascii text asn as29278 asn as29728 asn13335",
            "TAGS: av detections av exploit belgium belgium unknown binbusybox bits body canada unknown",
            "TAGS: christopher p christopher p. \u2018buzz\u2019 ahmann ck id ck matrix ck techniques clare click cloud",
            "TAGS: cloudflare cloudflarenet command config connection copy crazyfrost cyber attacks",
            "TAGS: data upload date date hash ddos dead connection default defense evasion delphi destination",
            "TAGS:  detection detections detections name development att direct dirty dns resolutions domain",
            "TAGS: add dynamicloader ecdsa echobot echobot related encrypt entries error evasion att",
            "TAGS: expiration date explorer extraction facebook facebook failed february filehash files files ip",
            "TAGS: flag gecko general general full general info generator geo hungary guard hackers hash hide",
            "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passiv",
            "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections",
            "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passive dns path pattern match pink screen port possible prefetch8 present dec present feb present jan",
            "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver",
            "TAGS: json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey",
            "TAGS: macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec",
            "TAGS: mtb yara name servers name tactics network traffic new browser next associated next",
            "TAGS: yara niggercat none file null object os x outbound passive dns path pattern match",
            "TAGS: pink screen port possible prefetch8 present program protocol h3 ptr record none push",
            "TAGS: pyspark python python initiated quic ransom recipes record value redacted for",
            "TAGS. redirect refresh related tags remoteIPAddress resource restart reverse dns route runner",
            "TAGS: sample analysis se domains search security quic add source level span spawns spy",
            "TAGS: state of colorado stream strings suspicious t1590 gather tcp syn title tools tr trex triangulation",
            "TAGS: trojan trojandropper trojanspy united unknown unknown aaaa unknown ns updater",
            "TAGS: upnproxy url analysis url https url text urls verified verify veryhigh victim network vubbuv win32 win64 windows windows nt windows server worm write write c yara detections yara rule"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Hungary"
          ],
          "malware_families": [
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "DDos:Linux/Gafgyt.YA!MTB",
              "display_name": "DDos:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDos:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "ELF:DDoS-S\\ [Trj]",
              "display_name": "ELF:DDoS-S\\ [Trj]",
              "target": null
            },
            {
              "id": "Pykspa.C",
              "display_name": "Pykspa.C",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dorv.A",
              "display_name": "Trojan:Win32/Dorv.A",
              "target": "/malware/Trojan:Win32/Dorv.A"
            },
            {
              "id": "Unix.Trojan.Gafgyt-698115",
              "display_name": "Unix.Trojan.Gafgyt-698115",
              "target": null
            },
            {
              "id": "4-0 Win.Malware.Pits-10035540-0",
              "display_name": "4-0 Win.Malware.Pits-10035540-0",
              "target": null
            },
            {
              "id": "Win.Packed.Usteal-7531303-0",
              "display_name": "Win.Packed.Usteal-7531303-0",
              "target": null
            },
            {
              "id": "tR",
              "display_name": "tR",
              "target": null
            },
            {
              "id": "DeathHiddenTear (Large&Small HT)   >",
              "display_name": "DeathHiddenTear (Large&Small HT)   >",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1586,
            "FileHash-SHA1": 1479,
            "FileHash-SHA256": 1938,
            "URL": 4548,
            "domain": 1052,
            "hostname": 2501,
            "email": 9,
            "SSLCertFingerprint": 7,
            "CIDR": 2
          },
          "indicator_count": 13122,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6940b852c28f2a2c6abb4aad",
          "name": "FRITZ!Box \u2026.Connecting to Apple devices",
          "description": "Connecting to targeted Apple\ndevices overnight. \n\nHow to connect to the FRITZ!Box, how to access all of the product's functions, and what to do with the device if you are not connected to it in your home network.",
          "modified": "2026-01-15T01:02:47.757000",
          "created": "2025-12-16T01:39:30.381000",
          "tags": [
            "fritz",
            "strong",
            "main navigation",
            "deutsch",
            "englisch",
            "funktionen der",
            "verbindung zur",
            "wifi",
            "ip address",
            "box avm",
            "lowfi",
            "win32",
            "susp",
            "urls",
            "files",
            "asn as44716",
            "related tags",
            "indicator facts",
            "germany unknown",
            "a domains",
            "meta",
            "typo3",
            "body doctype",
            "kasper skaarhoj",
            "gmt server",
            "pragma",
            "a nxdomain",
            "nxdomain",
            "whitelisted",
            "present aug",
            "present jul",
            "present oct",
            "present jun",
            "united",
            "present sep",
            "present nov",
            "next http",
            "scans show",
            "title",
            "div div",
            "a li",
            "wir suchen",
            "li ul",
            "avm karriere",
            "dich a",
            "reverse dns",
            "berlin",
            "germany asn",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "related pulses",
            "none related",
            "passive dns",
            "ipv4",
            "url analysis",
            "present dec",
            "moved",
            "certificate",
            "vertriebs gmbh",
            "aaaa",
            "as12732 gutcon",
            "domain",
            "hostname",
            "verdict",
            "files ip",
            "address",
            "germany",
            "as13335",
            "as8220 colt",
            "present may",
            "united kingdom",
            "regsetvalueexa",
            "regdword",
            "regbinary",
            "show",
            "yara detections",
            "regsetvalueexw",
            "regsz",
            "medium",
            "suspicious",
            "delphi",
            "malware",
            "write",
            "as6878",
            "msie",
            "chrome",
            "gmt content",
            "germany showing",
            "createobject",
            "set http",
            "search",
            "high",
            "read c",
            "et trojan",
            "jfif",
            "ascii text",
            "detected",
            "trojan generic",
            "checkin",
            "pony downloader",
            "http library",
            "virustotal",
            "riskware",
            "mcafee",
            "drweb",
            "vipre",
            "trojan",
            "panda",
            "next",
            "unknown",
            "as15169 google",
            "status",
            "name servers",
            "record value",
            "emails",
            "error",
            "trojandropper",
            "results dec",
            "ddos",
            "worm",
            "mtb trojan",
            "mtb apr",
            "exev2e",
            "ia256",
            "extraction",
            "get http",
            "post http",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "germany germany",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "show technique",
            "ck matrix",
            "show process",
            "network traffic",
            "t1057",
            "t1071",
            "hybrid",
            "local",
            "path",
            "t1204 user",
            "defense evasion",
            "t1480 execution",
            "sha1",
            "sha256",
            "size",
            "script",
            "null",
            "span",
            "refresh",
            "footer",
            "body",
            "june",
            "general",
            "click",
            "strings",
            "tools",
            "tracker",
            "code",
            "look",
            "verify",
            "restart",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "process details",
            "flag",
            "link",
            "present feb",
            "servers",
            "redacted for",
            "as20546 soprado",
            "encrypt",
            "mtb sep",
            "ransom",
            "next associated",
            "twitter",
            "virtool",
            "hostname add",
            "location russia",
            "as200350",
            "russia unknown",
            "federation flag",
            "ipv4 add",
            "asn as200350",
            "related",
            "domain add",
            "unknown ns",
            "expiration date",
            "http version",
            "windows nt",
            "gbot",
            "post method",
            "port",
            "destination",
            "delete",
            "get na",
            "as15169",
            "expiration",
            "url https",
            "no expiration",
            "showing",
            "entries",
            "url add",
            "pulse pulses",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "unknown cname",
            "cname",
            "asn as24940",
            "less",
            "date",
            "pulse submit"
          ],
          "references": [
            "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
            "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
            "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
            "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
            "Subject: DE Certificate Subject: Berlin Certificate Subject",
            "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
            "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
            "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
            "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
            "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
            "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
            "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
            "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
            "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
            "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
            "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
            "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
            "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
            "http://netuser.joymeng.com/charge_apple/notify",
            "https://www.passcreator.com/en/apple-wallet-passes",
            "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
            "apple-business.cancom.at",
            "Apple - 162.55.158.153",
            "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
            "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283",
            "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
            "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
            "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
            "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "#LowFi:Tool:Win32/VbsToExeV2E",
              "display_name": "#LowFi:Tool:Win32/VbsToExeV2E",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Androp",
              "display_name": "Androp",
              "target": null
            },
            {
              "id": "Inject.BRDV",
              "display_name": "Inject.BRDV",
              "target": null
            },
            {
              "id": "Win32:Androp",
              "display_name": "Win32:Androp",
              "target": null
            },
            {
              "id": "Crypt2.AZDI",
              "display_name": "Crypt2.AZDI",
              "target": null
            },
            {
              "id": "TEL:MSIL/DlSocConSend",
              "display_name": "TEL:MSIL/DlSocConSend",
              "target": "/malware/TEL:MSIL/DlSocConSend"
            },
            {
              "id": "DDOS:Linux/Lightaidra",
              "display_name": "DDOS:Linux/Lightaidra",
              "target": "/malware/DDOS:Linux/Lightaidra"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
              "target": null
            },
            {
              "id": "Trojan:Win32/Salgorea.C!MTB",
              "display_name": "Trojan:Win32/Salgorea.C!MTB",
              "target": "/malware/Trojan:Win32/Salgorea.C!MTB"
            },
            {
              "id": "Worm:Win32/Autorun.XFV",
              "display_name": "Worm:Win32/Autorun.XFV",
              "target": "/malware/Worm:Win32/Autorun.XFV"
            },
            {
              "id": "Trojan:Win32/Blihan.A",
              "display_name": "Trojan:Win32/Blihan.A",
              "target": "/malware/Trojan:Win32/Blihan.A"
            },
            {
              "id": "Worm:Win32/Yuner.A",
              "display_name": "Worm:Win32/Yuner.A",
              "target": "/malware/Worm:Win32/Yuner.A"
            },
            {
              "id": "Win.Trojan.Zegost",
              "display_name": "Win.Trojan.Zegost",
              "target": null
            },
            {
              "id": "PWS:Win32/QQpass",
              "display_name": "PWS:Win32/QQpass",
              "target": "/malware/PWS:Win32/QQpass"
            },
            {
              "id": "Trojan:Win32/Glupteba.MT!MTB",
              "display_name": "Trojan:Win32/Glupteba.MT!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "Win.Trojan.Generic",
              "display_name": "Win.Trojan.Generic",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Muldrop.V!MTB",
              "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
              "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
            },
            {
              "id": "Win32/Trickler",
              "display_name": "Win32/Trickler",
              "target": null
            },
            {
              "id": "Win.Malware.Hd0kzai-9985588-0",
              "display_name": "Win.Malware.Hd0kzai-9985588-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aenjaris.AL!bit",
              "display_name": "Trojan:Win32/Aenjaris.AL!bit",
              "target": "/malware/Trojan:Win32/Aenjaris.AL!bit"
            },
            {
              "id": "Trojan:Win32/Agent.AG!MTB",
              "display_name": "Trojan:Win32/Agent.AG!MTB",
              "target": "/malware/Trojan:Win32/Agent.AG!MTB"
            },
            {
              "id": "Trojan:Win32/Salgorea",
              "display_name": "Trojan:Win32/Salgorea",
              "target": "/malware/Trojan:Win32/Salgorea"
            },
            {
              "id": "Win.Malware.Barys-6840738-0",
              "display_name": "Win.Malware.Barys-6840738-0",
              "target": null
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "Trojan:Win32/EyeStye.T",
              "display_name": "Trojan:Win32/EyeStye.T",
              "target": "/malware/Trojan:Win32/EyeStye.T"
            },
            {
              "id": "wormWin32/Mofksys.RND!MTB",
              "display_name": "wormWin32/Mofksys.RND!MTB",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/VB.IL",
              "display_name": "TrojanDropper:Win32/VB.IL",
              "target": "/malware/TrojanDropper:Win32/VB.IL"
            },
            {
              "id": "CVE 2007695",
              "display_name": "CVE 2007695",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1008",
              "name": "Fallback Channels",
              "display_name": "T1008 - Fallback Channels"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 927,
            "hostname": 2093,
            "FileHash-SHA256": 1474,
            "URL": 5935,
            "FileHash-MD5": 351,
            "FileHash-SHA1": 252,
            "email": 5,
            "CVE": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 11040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "94 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eea19a23474b8c7dca351f",
          "name": "All Items - find from the UA archive disk",
          "description": "Again have zero idea 'what these are' - just uploading from the 'archives' as I sort through things",
          "modified": "2025-12-24T08:28:47.628000",
          "created": "2024-03-11T06:15:54.351000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "116 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906bd99cadbd4140014c6af",
          "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
          "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
          "modified": "2025-12-02T01:05:30.331000",
          "created": "2025-11-02T02:10:33.546000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 449,
            "hostname": 1403,
            "URL": 3552,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1
          },
          "indicator_count": 6742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "138 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d7fd544aa8cf483b02d5c",
          "name": "Sinkhole | Win32/Dofoil.R CnC Beacon",
          "description": "#LowFI:VBExpensiveLoop\n*Worm:Win32/Gamarue [Static Pe Anomaly \u2022\nContains Pe Overlay \u2022\nBinary Yara]\n- Win32/Dofoil.R CnC Beacon |\nAlerts:\n\u2022 suspicious_iocontrol_codes\n\u2022 physical_drive_access",
          "modified": "2025-09-13T06:02:44.359000",
          "created": "2025-08-14T06:19:01.666000",
          "tags": [
            "lowfi",
            "united",
            "entries",
            "passive dns",
            "open ports",
            "next associated",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "domain",
            "address",
            "creation date",
            "name servers",
            "date",
            "hostname add",
            "dynamicloader",
            "medium",
            "fake",
            "high",
            "post",
            "show",
            "search",
            "observed http",
            "reg add",
            "copy",
            "write",
            "june",
            "malware",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "null",
            "error",
            "click",
            "body",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "strings",
            "refresh",
            "tools",
            "meta",
            "onload",
            "span",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "defense evasion",
            "spawns",
            "mask",
            "generator"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 175,
            "FileHash-SHA1": 180,
            "FileHash-SHA256": 458,
            "URL": 436,
            "domain": 69,
            "hostname": 156,
            "email": 1,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 1484,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d5115ad786de4ff048e5b",
          "name": "TEL:ECCert!SSLCO | Mirai Malware Hosting | Multi user Tracker",
          "description": "https://api.mirai.com/MiraiWebService/passbook/180823-77257/4001645 [Malware hosting]\n*TEL:ECCert!SSLCO\nYARA Detections:\nDelphi\nThis program must be run under Win32\ncompilers.\nCode Overlap of Trojan Droppers Backdoors , TrojanSpy\n\n\n#injection_inter_process\n#creates_largekey\n#network_bind\n#ransomware_file_modifications\n#antivm_generic_bios\n#antivm_generic_disk\n#enumerates_physical_drives\n#physical_drive_access\n#deletes_executed_files\n#recon_fingerprint\n#suspicious_command_tools\n#anomalous_deletefile\n#antisandbox_sleep\n#dead_connect\n#dynamic_function_loading\n#http_request\n#ipc_namedpipe\n#network_anomaly\n#powershell_download\n#powershell_request #track #locate #remote_access",
          "modified": "2025-09-13T02:00:42.729000",
          "created": "2025-08-14T02:59:33.036000",
          "tags": [
            "url https",
            "url http",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "entries",
            "present sep",
            "united",
            "present aug",
            "present jul",
            "present jun",
            "moved",
            "unknown ns",
            "present may",
            "present apr",
            "passive dns",
            "date",
            "encrypt",
            "body",
            "cookie",
            "gmt server",
            "content type",
            "dynamicloader",
            "medium",
            "x17x03x01",
            "download studio",
            "high",
            "read c",
            "show",
            "windows",
            "copy",
            "powershell",
            "write",
            "anomaly",
            "next",
            "unknown",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "yara detections",
            "delphi",
            "codeoverlap",
            "win32",
            "rgba",
            "memcommit",
            "delete",
            "png image",
            "hash",
            "dock",
            "execution",
            "malware",
            "wine emulator",
            "dynamic",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "capture",
            "persistence",
            "sha256",
            "submitted",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "script",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "null",
            "august",
            "span",
            "refresh",
            "meta",
            "mirai",
            "february",
            "april",
            "june",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "caribe",
            "rest",
            "accept",
            "friday",
            "look",
            "verify",
            "restart"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6211,
            "domain": 682,
            "hostname": 1661,
            "FileHash-MD5": 117,
            "FileHash-SHA1": 100,
            "FileHash-SHA256": 1386,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 10162,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689d14258dd07e26a3bb1d46",
          "name": "PalantirFoundry.com (?) Multiple Remote Controlled Devices",
          "description": "Hacking.\nI\u2019m not sure if this is masquerading or not yet. Anything with \u2018PalantirFoundry.com\u2019 redirects to actual Palanrir login. Multiple users. Potentially 5000+ devices included in pulse. All monitored targets.",
          "modified": "2025-09-12T22:00:43.252000",
          "created": "2025-08-13T22:39:33.511000",
          "tags": [
            "passive dns",
            "urls",
            "files",
            "ip address",
            "asn as16509",
            "less whois",
            "registrar",
            "unknown related",
            "servers",
            "status",
            "hostname",
            "domain",
            "files ip",
            "address",
            "united",
            "unknown ns",
            "a domains",
            "search",
            "script urls",
            "authority",
            "record value",
            "service",
            "mirai",
            "cloud provider",
            "reverse dns",
            "sydney",
            "australia asn",
            "as16509",
            "dns resolutions",
            "related tags",
            "none indicator",
            "write c",
            "mozilla",
            "nsisinetc",
            "show",
            "medium",
            "entries",
            "high",
            "http",
            "delete",
            "write",
            "malware",
            "data upload",
            "ms windows",
            "intel",
            "pe32",
            "lowfi",
            "next",
            "showing",
            "present feb",
            "present jun",
            "present dec",
            "present aug",
            "present may",
            "present jul",
            "moved",
            "media",
            "segoe ui",
            "ipv4",
            "url analysis",
            "location united",
            "error",
            "regopenkeyexa",
            "regsetvalueexa",
            "read c",
            "port",
            "destination",
            "regdword",
            "windows nt",
            "hostile",
            "win32",
            "unknown",
            "delphi",
            "persistence",
            "execution",
            "extraction",
            "l data",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "file defense",
            "sha1",
            "sha256",
            "ascii text",
            "mitre att",
            "pattern match",
            "show technique",
            "null",
            "refresh",
            "body",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "type",
            "please",
            "pulse submit",
            "url add",
            "pulse pulses",
            "related nids",
            "files location",
            "flag united",
            "ddos",
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "virtool",
            "downloader",
            "dadobra",
            "date",
            "certificate",
            "montreal",
            "canada",
            "asn16509",
            "amazon02",
            "screenshot",
            "title login",
            "palantir",
            "page url",
            "history https",
            "evasion att",
            "remember",
            "label",
            "button",
            "form",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "software envoy",
            "value",
            "domainpath name",
            "header value",
            "self",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "returnur",
            "south korea",
            "as9318 sk",
            "sqlite rollback",
            "journal",
            "as701 verizon",
            "bittorrent dht",
            "win64",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFi:LinkularNSIS",
              "display_name": "#LowFi:LinkularNSIS",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
              "display_name": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
              "target": null
            },
            {
              "id": "Fareit",
              "display_name": "Fareit",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Dadobra.E",
              "display_name": "TrojanDownloader:Win32/Dadobra.E",
              "target": "/malware/TrojanDownloader:Win32/Dadobra.E"
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3149,
            "domain": 1304,
            "URL": 5269,
            "FileHash-SHA256": 968,
            "FileHash-SHA1": 206,
            "email": 7,
            "FileHash-MD5": 274,
            "SSLCertFingerprint": 1,
            "CVE": 1
          },
          "indicator_count": 11179,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "689cc89e77327602780be49e",
          "name": "Remotewd Devices \u2022 Spectrum / Charter Communications & AT&T",
          "description": "Remotewd Devices expanded \u2022 Spectrum / Charter Communications & AT&T.\nAdvesarial. Polymorphic.",
          "modified": "2025-09-12T16:05:33.542000",
          "created": "2025-08-13T17:17:18.456000",
          "tags": [
            "url https",
            "domain",
            "types of",
            "united kingdom",
            "sweden",
            "virgin islands",
            "china",
            "germany",
            "date",
            "status",
            "ip address",
            "search",
            "domain add",
            "passive dns",
            "urls",
            "files",
            "error sep",
            "present jul",
            "address google",
            "safe browsing",
            "united",
            "unknown ns",
            "moved",
            "body",
            "cloudfront x",
            "hio52 p1",
            "certificate",
            "win32",
            "trojan",
            "entries",
            "next associated",
            "title error",
            "ipv4",
            "host gh",
            "secure path",
            "httponly cache",
            "x github",
            "request id",
            "accept",
            "encrypt",
            "formbook cnc",
            "checkin",
            "a domains",
            "lowfi",
            "mtb jun",
            "github pages",
            "as11427",
            "us note",
            "route",
            "ptr record",
            "hostname add",
            "url analysis",
            "verdict",
            "general info",
            "geo mckinney",
            "texas",
            "spectrum",
            "charter communications",
            "charter collection",
            "auth",
            "files ip",
            "address",
            "asn as16509",
            "record value",
            "germany unknown",
            "meta",
            "gmt cache",
            "sans400",
            "condensed300",
            "feel lost",
            "h1 div",
            "server",
            "gmt connection",
            "keep alive",
            "pragma",
            "ipv4 add",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "unknown aaaa",
            "china unknown",
            "beijing",
            "unknown soa",
            "hostname",
            "present aug",
            "name servers",
            "aaaa",
            "windows nt",
            "dynamicloader",
            "generic http",
            "exe upload",
            "inbound",
            "outbound",
            "host",
            "medium",
            "write",
            "markus",
            "malware",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "showing",
            "error",
            "extraction",
            "se enter",
            "sc type",
            "data upload",
            "failed",
            "extr data",
            "ox sunnort",
            "include review",
            "exclude data",
            "iocs",
            "pdf report",
            "pcap",
            "stix",
            "openloc",
            "pul data",
            "move",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "mitre att",
            "ck techniques",
            "evasion att",
            "pattern match",
            "ascii text",
            "show technique",
            "null",
            "refresh",
            "span",
            "august",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "class",
            "adversaries",
            "defense evasion",
            "initial access",
            "msie",
            "chrome",
            "gmt content",
            "main",
            "virtool",
            "idran anv",
            "exti",
            "concor referen",
            "running webserver",
            "review iocs",
            "suggested iocs",
            "show",
            "http traffic",
            "intel",
            "ms windows",
            "pe32",
            "high",
            "write c",
            "explorer",
            "unknown",
            "worm",
            "next",
            "comman_and_control",
            "et",
            "vtapi",
            "dos",
            "persistence",
            "polymorphic",
            "virus",
            "device",
            "script",
            "style",
            "endcolorstr",
            "regexp",
            "link",
            "powershell",
            "form",
            "push",
            "active",
            "remote_access",
            "general full",
            "protocol h2",
            "security tls",
            "austin",
            "asn7018",
            "attinternet4",
            "reverse dns",
            "software",
            "domains",
            "hashes",
            "at&t",
            "injection",
            "rwx",
            "hackers",
            "attack",
            "cape",
            "stealth hidden extension",
            "antivm generic",
            "cape detected",
            "threat stealth",
            "public folder",
            "deletes",
            "files anomalous",
            "disables system",
            "restore dead",
            "mail procmem",
            "yara suricata",
            "queries user name"
          ],
          "references": [
            "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
            "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
            "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
            "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
            "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
            "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
            "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
            "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
            "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
            "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
            "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
            "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
            "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
            "Ransomware File Modifications Exec Crash",
            "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
            "Request Queries Keyboard Layout Antivm Generic Disk Resumethread",
            "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
            "Contains Pe Overlay Queries Locale Api Language Check Registry"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Vflooder",
              "display_name": "Trojan:Win32/Vflooder",
              "target": "/malware/Trojan:Win32/Vflooder"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            },
            {
              "id": "VirTool:Win32/Obfuscator.JM",
              "display_name": "VirTool:Win32/Obfuscator.JM",
              "target": "/malware/VirTool:Win32/Obfuscator.JM"
            },
            {
              "id": "Win.Trojan.Cycbot-1584",
              "display_name": "Win.Trojan.Cycbot-1584",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6171,
            "domain": 1823,
            "hostname": 3155,
            "email": 8,
            "FileHash-SHA256": 950,
            "FileHash-MD5": 345,
            "FileHash-SHA1": 317,
            "CVE": 1,
            "CIDR": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 12772,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "218 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6854d01e3a8bc3deabb0f2a5",
          "name": "show_user_auctions.php  uid=265889 allegro.pl",
          "description": "https://www.virustotal.com/gui/file/8b33f59bb8a1a16bc5cd762a71d9ea902c7a301da2009517bfb34b0694e17049/relationshttps://www.virustotal.com/gui/ip-address/5.134.210.65/relations\nhttps://www.virustotal.com/gui/url/0d7d3ffc146887baef5a536bd7c7aa32392c2293b212266af89f782fb1c55fbc/details\nhttps://www.virustotal.com/gui/file/85e128a2b18df434c7d09c9360359e74c30711172a9075369c9ca4681dd5d498/details",
          "modified": "2025-09-01T08:05:11.054000",
          "created": "2025-06-20T03:06:06.379000",
          "tags": [
            "vhash",
            "ssdeep",
            "chrome",
            "typ pliku",
            "wpis",
            "web open",
            "font format",
            "truetype",
            "rgba",
            "obraz svg",
            "scalable vector",
            "graphics",
            "function",
            "silent failure",
            "regexp",
            "gethostname",
            "date",
            "saves",
            "return",
            "cmsg",
            "iframe",
            "issafari",
            "null",
            "meta"
          ],
          "references": [
            "http://allegro.pl/show_user_auctions.php?uid=265889",
            "http://5.134.210.65",
            "5.134.210.65",
            "MD5  4234121dd739b4426ef27c2dc31661f2",
            "https://ct.captcha-delivery.com/c.js",
            "http://allegro.pl/uzytkownik/adam_f./sklep",
            "77d947c44255241fc5669daca69bd3906d70d03f0c07b0af8b89c0b2ae1351bc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 3,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 23,
            "URL": 109,
            "domain": 17,
            "hostname": 16
          },
          "indicator_count": 170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "230 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68761742b83c406c6afc4a45",
          "name": "Egton Medical Information Systems | Mirai | Malware |  Cams",
          "description": "Egton Medical Information Systems Limited |  Lynn Green\nRawdon House Green Lane\nCity\tLeeds\nCountry\tGB (andrew.carr@e-mis.com)\n[http://www.camx.com/files/cb05_final_report_120805.aspx]\n\nRequires further research.\nPotentially patient data brokers, international PHI exchange,  stealth  monitoring. #mirai #malware #trojan #cams #target #medical_information_exchange",
          "modified": "2025-08-14T08:00:18.079000",
          "created": "2025-07-15T08:54:26.212000",
          "tags": [
            "egton medical",
            "limited name",
            "server",
            "date",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "beginstring",
            "segoe ui",
            "null",
            "type data",
            "refresh",
            "body",
            "span",
            "hybrid",
            "general",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "pattern match",
            "ascii text",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "show process",
            "utf8",
            "crlf line",
            "t1057",
            "local",
            "path",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "evasion att",
            "t1480 execution",
            "discovery att",
            "serving ip",
            "address",
            "status code",
            "united",
            "passive dns",
            "entries",
            "gmt server",
            "ecacc",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "files",
            "location united",
            "ddos",
            "activity",
            "checkin",
            "next associated",
            "win64",
            "win32",
            "url http",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "ck techniques",
            "memcommit",
            "read c",
            "show",
            "search",
            "copy",
            "ip address",
            "high",
            "dns query",
            "medium",
            "write",
            "malware",
            "urlhttp",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "backdoor",
            "mtb jul",
            "please",
            "x msedge",
            "all ipv4",
            "open",
            "data upload",
            "extraction",
            "sc type",
            "failed",
            "extr",
            "include review",
            "name server",
            "status",
            "whois field",
            "value address",
            "rawdon house",
            "green lane",
            "city leeds",
            "country gb",
            "creation date",
            "dnssec",
            "domain",
            "servers",
            "present jul",
            "body xml",
            "error code",
            "message value",
            "time2017",
            "a domains",
            "name servers",
            "redacted for",
            "unknown aaaa",
            "script urls",
            "record value",
            "germany unknown",
            "certificate",
            "for privacy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 107,
            "hostname": 192,
            "URL": 488,
            "FileHash-MD5": 136,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 169,
            "CVE": 1,
            "email": 6
          },
          "indicator_count": 1229,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "248 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6842489989d6db4d41fd8322",
          "name": "Vulnerable Driver Load",
          "description": "Here is the full list of malicious Windows drivers, which can be blocked with the help of a special tool, or a built-in system, if you want to know what to do with it.",
          "modified": "2025-07-06T01:00:17.231000",
          "created": "2025-06-06T01:47:05.317000",
          "tags": [
            "malicious",
            "vulnerable",
            "living",
            "land drivers",
            "premium",
            "windows",
            "feel",
            "strong",
            "json",
            "sysmon",
            "subdomains",
            "whasz",
            "html internet",
            "magia dokument",
            "html",
            "ascii",
            "z bardzo",
            "triid plik",
            "magika html",
            "rozmiar",
            "zgoszenie",
            "error",
            "100255",
            "255100",
            "number",
            "e100",
            "100i100n",
            "65535255",
            "25565535",
            "mmm d",
            "typeof window",
            "null",
            "bubble",
            "radar",
            "false",
            "click",
            "isitem",
            "dark",
            "copy",
            "shell",
            "panelbox",
            "document",
            "code",
            "body",
            "light",
            "mark",
            "date",
            "scroll",
            "target",
            "blank",
            "back",
            "main",
            "lowfi"
          ],
          "references": [
            "https://loldrivers.io/",
            "https://www.loldrivers.io/js/chart.min.js",
            "https://www.loldrivers.io/js/bundle.7cd1a644ff4540d19bfa43f193df74afce746a0213920f45d73bf720542f682d81b6ad0320242744d332512cfb63eac5790fab1a240d6e6c8cb89f25fcacfbd7.js",
            "https://www.loldrivers.io/favicons/browserconfig.xml"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1885,
            "FileHash-SHA1": 1367,
            "FileHash-SHA256": 1615,
            "hostname": 214,
            "domain": 52,
            "URL": 468,
            "CVE": 2
          },
          "indicator_count": 5603,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "287 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6851011a6c087abfa19e269b",
          "name": "Evolution of Tycoon 2FA Defense Evasion Mechanisms",
          "description": "The evolution of cybercriminals\u2019s tactics for bypassing two-factor authentication (2FA) is revealed in a study by security researchers at the Institute for Strategic Studies (ISS).",
          "modified": "2025-06-17T05:52:06.768000",
          "created": "2025-06-17T05:46:02.707000",
          "tags": [
            "tycoon",
            "stage",
            "mechanism",
            "april",
            "redirect",
            "attack detected",
            "ctrl",
            "page",
            "captcha",
            "post request",
            "shift",
            "meta",
            "generic",
            "telegram",
            "august",
            "find",
            "false",
            "model",
            "error",
            "stages",
            "date",
            "manipulation",
            "invisible",
            "saad tycoon",
            "encrypted"
          ],
          "references": [
            "https://any.run/cybersecurity-blog/tycoon2fa-evasion-analysis/",
            "https://socradar.io/tycoon-2fa-an-evolving-phishing-kit-phaas-threats/"
          ],
          "public": 1,
          "adversary": "Saad Tycoon",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Encrypted",
              "display_name": "Encrypted",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "PetrP.73",
            "id": "154605",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "URL": 51,
            "domain": 4,
            "hostname": 25
          },
          "indicator_count": 81,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 173,
          "modified_text": "306 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "682ce996ee00bc29988d4ed4",
          "name": "Tycoon 2FA: Advanced Evasion Techniques in Phishing-as-a-Service",
          "description": "In May 2025, ANY.RUN researchers detailed the evolution of the Tycoon 2FA phishing kit, which targets Microsoft 365 and Gmail credentials. This Phishing-as-a-Service (PhaaS) platform employs sophisticated evasion techniques, including dynamic code generation, obfuscation, and traffic filtering, to bypass two-factor authentication (2FA) defenses. The kit uses an Adversary-in-the-Middle (AiTM) approach to capture session cookies, allowing attackers to reuse sessions and evade security measures. The continuous updates and enhancements in Tycoon 2FA's evasion tactics highlight the persistent threat it poses to corporate defenses.",
          "modified": "2025-05-20T20:44:06.988000",
          "created": "2025-05-20T20:44:06.988000",
          "tags": [
            "tycoon",
            "stage",
            "mechanism",
            "april",
            "redirect",
            "attack detected",
            "ctrl",
            "page",
            "captcha",
            "post request",
            "shift",
            "meta",
            "generic",
            "august",
            "find",
            "false",
            "model",
            "error",
            "stages",
            "date",
            "manipulation",
            "invisible",
            "saad tycoon",
            "encrypted"
          ],
          "references": [
            "https://any.run/cybersecurity-blog/tycoon2fa-evasion-analysis/"
          ],
          "public": 1,
          "adversary": "Saad Tycoon",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Encrypted",
              "display_name": "Encrypted",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "PetrP.73",
            "id": "154605",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "URL": 39,
            "domain": 4,
            "hostname": 26
          },
          "indicator_count": 70,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 172,
          "modified_text": "333 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6826fd781ceaad59a92471f5",
          "name": "Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline",
          "description": "This article provides an in-depth analysis of the Tycoon 2FA phishing kit, focusing on its continuous evolution and the sophisticated techniques it employs to bypass two-factor authentication (2FA) for Microsoft 365 and Gmail. It explores various evasion mechanisms, including code obfuscation, CAPTCHA checks, and browser fingerprinting, detailing how these methods have changed over time. The study also offers practical tips for detecting Tycoon 2FA attacks, emphasizing the importance of behavioral analysis over signature-based detection.",
          "modified": "2025-05-16T08:55:20.294000",
          "created": "2025-05-16T08:55:20.294000",
          "tags": [
            "tycoon",
            "mechanism",
            "stage",
            "captcha",
            "shift",
            "april",
            "captchas",
            "mechanisms",
            "phaas",
            "tycoon2fa",
            "generic",
            "telegram",
            "august",
            "false",
            "model",
            "error",
            "stages",
            "saad tycoon"
          ],
          "references": [
            "https://medium.com/@anyrun/evolution-of-tycoon-2fa-defense-evasion-mechanisms-analysis-and-timeline-6ec263227daf"
          ],
          "public": 1,
          "adversary": "Saad Tycoon",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "PetrP.73",
            "id": "154605",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "URL": 25,
            "domain": 4,
            "hostname": 24
          },
          "indicator_count": 54,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "338 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6761887bac8548ef81857a50",
          "name": "Prokuratura Okr\u0119gowa w Jeleniej G\u00f3rze - Prokuratura Okr\u0119gowa w Jeleniej G\u00f3rze - Portal Gov.pl",
          "description": "Wstecz prasowy wedi dweud wrthod wybodaeth iawnydd i'wodraethol i gwadu i us\u0142ug.",
          "modified": "2025-05-14T20:58:17.341000",
          "created": "2024-12-17T14:19:39.155000",
          "tags": [
            "jeleniej grze",
            "jelenia gra",
            "prokuratury",
            "prokuratura",
            "usugi dla",
            "okrgowa",
            "przejd",
            "logowanie",
            "profil zaufany",
            "strona",
            "string",
            "date",
            "sufeffxa0",
            "regexp",
            "matomo",
            "please",
            "blob",
            "null",
            "tag manager",
            "link",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "copyright",
            "jorik tangelder",
            "mit license",
            "zamknij",
            "nastpne zdjcie",
            "trace",
            "hammer",
            "crlf",
            "v2 dokument",
            "plik dokumentu",
            "dane",
            "unicode",
            "utf8",
            "z bom",
            "dziennik zdarze",
            "ms windows",
            "vista"
          ],
          "references": [
            "https://www.gov.pl/web/po-jelenia-gora/",
            "http://www.gov.pl/web/po-jelenia-gora/",
            "https://matomo.www.gov.pl/analytics/js/container_68lYTZ79.js",
            "https://www.gov.pl/scripts/bundle.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Hammer",
              "display_name": "Hammer",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "email": 1,
            "hostname": 179,
            "domain": 46,
            "URL": 340,
            "FileHash-SHA256": 23,
            "FileHash-MD5": 47,
            "FileHash-SHA1": 3
          },
          "indicator_count": 639,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66fc29a49b5ac693c8d75122",
          "name": "Medical Campus - Aurora, Co | Recheck",
          "description": "This weekend we found a busybox MIORI Hackers - serious attack Aurora, Medical Campus -Mirai. This recheck is generic. All results generated automatically by LevelBlue, sourced by ScoreBlue.\nMaybe it will be clean today. Complaints of pop up auto logins on locked screens and autonomous system running alongside actual system. System root.\nMalware Families:\nTrojanDownloader:Win32/Bulilit, ELF:Mirai-TO\\ [Trj], Backdoor:Linux/Mirai.B, TELPER:HSTR:DotCisOffer, TrojanSpy:Win32/Nivdort, Backdoor:Win32/Bladabindi, ALF:E5, Win.Malware.Midie-9950743-0, Trojan:Win32/Emotet.ARJ!MTB",
          "modified": "2024-10-31T16:03:52.240000",
          "created": "2024-10-01T16:56:04.004000",
          "tags": [
            "united",
            "as397240",
            "search",
            "showing",
            "as54113",
            "as397241",
            "unknown",
            "moved",
            "creation date",
            "record value",
            "next",
            "date",
            "body",
            "a domains",
            "passive dns",
            "formbook cnc",
            "checkin",
            "entries",
            "github pages",
            "sea x",
            "accept",
            "status",
            "name servers",
            "certificate",
            "urls",
            "aaaa",
            "cname",
            "meta",
            "whitelisted ip",
            "address",
            "location united",
            "asn as36459",
            "github",
            "less whois",
            "registrar",
            "markmonitor",
            "related tags",
            "as36459",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "files",
            "ninite",
            "expiration date",
            "domain",
            "hostname",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "document file",
            "v2 document",
            "utf8",
            "crlf line",
            "beginstring",
            "size",
            "null",
            "hybrid",
            "refresh",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "url https",
            "tulach type",
            "role title",
            "added active",
            "pulses url",
            "url http",
            "nextc type",
            "type indicator",
            "related pulses",
            "filehashsha256",
            "copyright",
            "ipv6",
            "germany",
            "italy",
            "trojan",
            "trojanspy",
            "worm",
            "trojanclicker",
            "virtool",
            "service",
            "linux x8664",
            "khtml",
            "gecko",
            "veryhigh",
            "redirect",
            "httpsupgrades",
            "collisionbox",
            "runner",
            "gameoverpanel",
            "trex",
            "orgtechhandle",
            "orgtechref",
            "director",
            "university",
            "nethandle",
            "net168",
            "net1680000",
            "ucha",
            "orgid",
            "east",
            "report spam",
            "as8075",
            "servers",
            "secure server",
            "error all",
            "typeof",
            "error f",
            "crazy doll",
            "created",
            "filehashmd5",
            "types of",
            "russia",
            "emotet type",
            "mirai type",
            "mirai",
            "mtb description",
            "win32 type",
            "as31034 aruba",
            "italy unknown",
            "as19527 google",
            "encrypt",
            "health type",
            "miori hackers",
            "brute force",
            "backdoor",
            "aurora",
            "ip address",
            "path",
            "unis",
            "dotcisoffer",
            "bladabindi",
            "artro",
            "script urls",
            "as46606",
            "brazil unknown",
            "as11284",
            "as10906",
            "apache",
            "lanc type",
            "telper",
            "win32",
            "win64",
            "pulses email",
            "as9009 m247",
            "as7296 alchemy",
            "as14061",
            "as16276",
            "trojandropper",
            "ransom",
            "mtb sep",
            "msie",
            "chrome",
            "ip check",
            "gmt content",
            "pulse submit",
            "url analysis",
            "files ip",
            "aaaa nxdomain",
            "nxdomain",
            "a nxdomain",
            "as22612",
            "dnssec",
            "meta http",
            "accept encoding",
            "request id",
            "united kingdom",
            "div div",
            "arial helvetica",
            "emails",
            "as15169 google",
            "cryp",
            "gmt cache",
            "sameorigin",
            "domain name",
            "code",
            "false",
            "command type",
            "roleselfservice",
            "mcig sep",
            "all search",
            "author avatar",
            "days ago",
            "http",
            "related nids",
            "files location",
            "as30081",
            "gmt contenttype",
            "mozilla",
            "as15133 verizon",
            "whitelisted",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "softcnapp",
            "overview ip",
            "flag united",
            "files related",
            "as62597 nsone",
            "as31898 oracle",
            "mtb aug",
            "class",
            "twitter",
            "april",
            "secure",
            "httponly",
            "expiresthu",
            "pragma",
            "as13414 twitter",
            "smoke loader",
            "reverse dns",
            "asnone united",
            "idlogin sep",
            "uid38009",
            "expiration",
            "hack type",
            "porn type"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Aruba"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3850,
            "FileHash-MD5": 6012,
            "FileHash-SHA1": 5906,
            "domain": 3329,
            "email": 33,
            "hostname": 4231,
            "CVE": 2,
            "FileHash-SHA256": 8407,
            "CIDR": 2,
            "SSLCertFingerprint": 7
          },
          "indicator_count": 31779,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "534 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "664bd9b732ecaf1b3c3beddf",
          "name": "Found some problems - Files from the UAlberta Google Drive Archive",
          "description": "Been looking for these...Gifts from the University of Alberta to the World apparently\n*Please note: I emptied out the Drive, however, there was a significant amount of abuse re: Google and Microsoft Accounts at the University of Alberta (reported).\n*On the Google side I utilized: Drive (a little), Docs/Slides/Sheets (when groupwork was required)\n*On the Microsoft side I utilized: OneDrive, Office 365 (Word, PPT, Excel, and OneNote). I used to also have a personal microsoft account (OneNote, OneDrive, Skype).\nThese were the applications I lived on for my studies. I could access the Gmail/Microsoft accounts for the University (however - 'bad things' usually happen because of this). I have no access to my personal Microsoft Account (i.e. myself and other affected student(s) do not have access to our personal stuff.",
          "modified": "2024-09-03T00:02:13.980000",
          "created": "2024-05-20T23:16:07.255000",
          "tags": [
            "contact",
            "quick",
            "destination",
            "entry",
            "safety",
            "local",
            "health",
            "travel",
            "notification",
            "considerations",
            "service",
            "criminal",
            "showit",
            "click",
            "outcome",
            "step",
            "please",
            "class",
            "questions set",
            "question set",
            "unlock",
            "continue",
            "jointfilingyes",
            "jointfilingno",
            "minimum req",
            "domicileresusno",
            "joint sponsor",
            "sponsorjoint",
            "path",
            "href",
            "span",
            "activetab",
            "starton",
            "newpage",
            "searchq",
            "datasia",
            "datacon",
            "segfilter",
            "subsite",
            "issuance agency",
            "visas",
            "null",
            "state",
            "dialog field",
            "tabpanel",
            "recaptcha",
            "nameinputvisa",
            "fullnameinput1",
            "license headers",
            "tools",
            "templates",
            "sia contact",
            "visa",
            "website",
            "phoneregexp",
            "emailregexp",
            "azaz",
            "urlpattern",
            "example starter",
            "javascript",
            "fetch",
            "comptwo",
            "compone",
            "dateofbirth",
            "function",
            "date",
            "passport",
            "nameinput",
            "fullnameinput",
            "adult passport",
            "child passport",
            "new child",
            "new adult",
            "new passport",
            "datepicker",
            "ds5504",
            "hideit",
            "infinity",
            "false",
            "jquery",
            "error",
            "body",
            "trident",
            "simple",
            "turn",
            "back",
            "calendar",
            "format",
            "february",
            "april",
            "june",
            "august",
            "show",
            "page has",
            "bcdate",
            "col1child",
            "col2child",
            "coldatechild",
            "rowdisplay",
            "val1",
            "val2",
            "repaginate",
            "grab",
            "jandec",
            "86400000",
            "current",
            "namerbcontactme",
            "agency",
            "compliment",
            "complaint",
            "passportfees",
            "customerservice",
            "bymail",
            "namerbcategory",
            "brokenlink",
            "search",
            "departuredate",
            "calendar date",
            "picker",
            "change",
            "month",
            "vital",
            "records form",
            "component js",
            "select",
            "please enter",
            "azaz09",
            "dddddd",
            "woff2",
            "woff",
            "truetype",
            "css document",
            "efefef",
            "ffffff",
            "gradienttype0",
            "galaxy",
            "nexus",
            "iphone5",
            "abtn",
            "bbtn",
            "cbtn",
            "dbtn",
            "ebtn",
            "fbtn",
            "gbtn",
            "hbtn",
            "ibtn",
            "media query",
            "from",
            "fce68e",
            "font family",
            "bold",
            "document",
            "cc3333",
            "b7b7b7",
            "e2edff",
            "ced9ea",
            "pm author",
            "ipca csi",
            "helvetica",
            "arial",
            "cq aem",
            "feed classes",
            "f2cd54",
            "f4d97e",
            "portrait",
            "landscape",
            "ipad",
            "declare",
            "immigrant",
            "visa navigation",
            "navigation css",
            "georgia",
            "times new",
            "roman",
            "times",
            "verdana",
            "photomodal",
            "styles media",
            "ff0000",
            "queries",
            "form component",
            "typetext",
            "queries media",
            "phone media",
            "tablet styles",
            "media queries",
            "jumbo sized",
            "copyright",
            "gpl version",
            "http",
            "alpha",
            "button",
            "out width",
            "ui css",
            "framework",
            "icons",
            "misc",
            "mini",
            "input",
            "label",
            "textarea",
            "overlays",
            "csi page",
            "embassy info",
            "embassy data",
            "embassy names",
            "end adjust",
            "embassy nameso",
            "pages",
            "e1a04d",
            "c0c0c0",
            "ffffff url",
            "us survey",
            "component css",
            "country list",
            "e7eceb",
            "important",
            "additional css",
            "wizard",
            "corner radius",
            "f97800",
            "c61700",
            "largestbox",
            "thisbox",
            "csi navigation",
            "ui autocomplete",
            "ui menu",
            "noticeid",
            "countnote",
            "largestnote",
            "thisnote",
            "desktops",
            "43px",
            "42px",
            "large",
            "aem interface",
            "styles",
            "web email",
            "ytconfig",
            "typeerror",
            "facebook pixel",
            "pixel code",
            "symbol",
            "fblog",
            "typeof",
            "iterator",
            "pageview",
            "pixel",
            "facebook",
            "config",
            "meta",
            "propname",
            "dpjquerydpuuid",
            "this",
            "next",
            "atom",
            "cookie",
            "iframe",
            "close",
            "string",
            "number",
            "edge",
            "regexp",
            "silk",
            "sxa0",
            "object",
            "opera",
            "android",
            "void",
            "form",
            "UAlberta",
            "Android",
            "Mac",
            "iPhone",
            "Gov Alberta",
            "AWS",
            "AZURE",
            "ENTRA",
            "iCloud",
            "Telus",
            "Bitdefender",
            "Norton"
          ],
          "references": [
            "Copy of clientlib.js(1).download",
            "Copy of clientlib.js(2).download",
            "Copy of clientlib.js(5).download",
            "Copy of clientlib.js(7).download",
            "Copy of clientlib.js(4).download",
            "Copy of clientlib.js(10).download",
            "Copy of clientlib.js(8).download",
            "Copy of clientlib.js(11).download",
            "Copy of clientlib.js(12).download",
            "Copy of clientlib.js(13).download",
            "Copy of clientlib.js(14).download",
            "Copy of clientlib.js(9).download",
            "Copy of clientlib.js(16).download",
            "Copy of clientlib.js(17).download",
            "Copy of clientlib.js(18).download",
            "Copy of clientlib.js(3).download",
            "Copy of clientlib.js(19).download",
            "Copy of clientlib.js(15).download",
            "Copy of clientlib.js(22).download",
            "Copy of clientlib.js(23).download",
            "Copy of clientlib.js(21).download",
            "Copy of clientlib.js(26).download",
            "Copy of clientlib.js(25).download",
            "Copy of clientlib.js(24).download",
            "Copy of clientlib.js(31).download",
            "Copy of clientlib.js(28).download",
            "Copy of clientlib.js(30).download",
            "Copy of clientlib.js(32).download",
            "Copy of clientlib.js(29).download",
            "Copy of clientlib.js(34).download",
            "Copy of clientlib.js(35).download",
            "Copy of clientlib.js(37).download",
            "Copy of clientlib.js(36).download",
            "Copy of clientlib.js(38).download",
            "Copy of clientlib.js(39).download",
            "Copy of clientlib.js(33).download",
            "Copy of clientlib.js(44).download",
            "Copy of clientlib.js(43).download",
            "Copy of clientlib.js(41).download",
            "Copy of clientlib.js(42).download",
            "Copy of clientlib.js(45).download",
            "Copy of clientlib.js(51).download",
            "Copy of clientlib.js(56).download",
            "Copy of clientlib.js(55).download",
            "Copy of clientlib.js(54).download",
            "Copy of clientlib.js(57).download",
            "Copy of clientlib.js(52).download",
            "Copy of clientlib.js(53).download",
            "Copy of clientlib.js(60).download",
            "Copy of clientlib(1).css",
            "Copy of clientlib.js(59).download",
            "Copy of clientlib(3).css",
            "Copy of clientlib(2).css",
            "Copy of clientlib(5).css",
            "Copy of clientlib.js(58).download",
            "Copy of clientlib(8).css",
            "Copy of clientlib(10).css",
            "Copy of clientlib(7).css",
            "Copy of clientlib(6).css",
            "Copy of clientlib(12).css",
            "Copy of clientlib(13).css",
            "Copy of clientlib(9).css",
            "Copy of clientlib(4).css",
            "Copy of clientlib(14).css",
            "Copy of clientlib(17).css",
            "Copy of clientlib(15).css",
            "Copy of clientlib(19).css",
            "Copy of clientlib(18).css",
            "Copy of clientlib(11).css",
            "Copy of clientlib(20).css",
            "Copy of clientlib(16).css",
            "Copy of clientlib(23).css",
            "Copy of clientlib(24).css",
            "Copy of clientlib(26).css",
            "Copy of clientlib(25).css",
            "Copy of clientlib(28).css",
            "Copy of clientlib(22).css",
            "Copy of clientlib(27).css",
            "Copy of clientlib(31).css",
            "Copy of clientlib(29).css",
            "Copy of clientlib(30).css",
            "Copy of clientlib(32).css",
            "Copy of clientlib(34).css",
            "Copy of clientlib(35).css",
            "Copy of clientlib(33).css",
            "Copy of clientlib(38).css",
            "Copy of clientlib(37).css",
            "Copy of clientlib(36).css",
            "Copy of clientlib(40).css",
            "Copy of clientlib(39).css",
            "Copy of clientlib(43).css",
            "Copy of clientlib(21).css",
            "Copy of clientlib(41).css",
            "Copy of clientlib(44).css",
            "Copy of clientlib(42).css",
            "Copy of clientlib(46).css",
            "Copy of clientlib(45).css",
            "Copy of clientlib(47).css",
            "Copy of clientlib(48).css",
            "Copy of clientlib(49).css",
            "Copy of clientlib(50).css",
            "Copy of clientlib(52).css",
            "Copy of clientlib(54).css",
            "Copy of clientlibs.js(3).download",
            "Copy of clientlib(53).css",
            "Copy of clientlibs.js(2).download",
            "Copy of clientlibs(3).css",
            "Copy of clientlib(51).css",
            "Copy of clientlibs(1).css",
            "Copy of clientlibs(2).css",
            "Copy of clientlibs.js.download",
            "Copy of clientlibs.js(4).download",
            "Copy of clientlibs(5).css",
            "Copy of clientlibs.css",
            "Copy of clientlibs(4).css",
            "Copy of dir (1).c9r",
            "Copy of clientlib(55).css",
            "Copy of iframe_api",
            "Copy of fbevents.js.download",
            "Copy of clientlibs.js(1).download",
            "Copy of js",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
            "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
            "hxxps://portal[.]office[.]com/Account",
            "hxxps://myapplications[.]microsoft[.]com/",
            "https://tria.ge/240521-rvybaahb79",
            "https://tria.ge/240521-rxpf6ahd6w",
            "https://tria.ge/240521-r1yh8shd44",
            "https://tria.ge/240521-ry949ahe2z/behavioral1",
            "https://tria.ge/240521-r3mvhshd83"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Mexico",
            "Anguilla",
            "Aruba",
            "Panama",
            "Ukraine",
            "Trinidad and Tobago",
            "Saint Vincent and the Grenadines",
            "Saint Martin (French part)",
            "Sint Maarten (Dutch part)",
            "Philippines",
            "Netherlands",
            "Cura\u00e7ao",
            "Georgia",
            "Tanzania, United Republic of",
            "Costa Rica",
            "Guatemala",
            "Japan",
            "Barbados"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            }
          ],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Healthcare",
            "Biotechnology",
            "Telecommunications",
            "Energy",
            "Construction",
            "Chemical",
            "Agriculture",
            "Finance",
            "Media",
            "Defense",
            "Transportation"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 251,
            "hostname": 188,
            "FileHash-SHA256": 142,
            "URL": 69,
            "FileHash-MD5": 77,
            "FileHash-SHA1": 77
          },
          "indicator_count": 804,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 133,
          "modified_text": "593 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666d1488316880c73e04054e",
          "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
          "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
          "modified": "2024-07-15T03:03:34.888000",
          "created": "2024-06-15T04:11:52.737000",
          "tags": [
            "server",
            "hostmaster",
            "amazon legal",
            "dept",
            "amazon",
            "street",
            "stateprovince",
            "postal code",
            "view whois",
            "whois record",
            "date",
            "contact",
            "threat roundup",
            "november",
            "march",
            "december",
            "february",
            "october",
            "january",
            "highly targeted",
            "data",
            "boost mobile",
            "formbook",
            "response final",
            "url https",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ord52c2 via",
            "cloudfront",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "unknown",
            "embeddedwb",
            "windows",
            "search",
            "medium",
            "united",
            "show",
            "whitelisted",
            "shellexecuteexw",
            "msie",
            "tofsee",
            "service",
            "write",
            "win32",
            "malware",
            "copy",
            "a nxdomain",
            "passive dns",
            "domain",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "ip related",
            "process32nextw",
            "components",
            "writeconsolew",
            "copy c",
            "delete c",
            "query",
            "useruin",
            "delphi",
            "capture",
            "install",
            "prorat",
            "url http",
            "http",
            "related nids",
            "files location",
            "regsetvalueexa",
            "hx88x89",
            "regbinary",
            "x95xd3xa4",
            "x8dxb7xb7",
            "hx88x9ax1e",
            "mx81xd1r",
            "x92xac",
            "xc2x84",
            "x93xaf",
            "stream",
            "persistence",
            "execution",
            "creation date",
            "entries",
            "as44273 host",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "accept",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "path",
            "pragma",
            "name servers",
            "west domains",
            "hostname",
            "next",
            "asnone germany",
            "as21499 host",
            "singapore",
            "france",
            "object",
            "com cnt",
            "dem fin",
            "found",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "levelblue",
            "open threat",
            "meta",
            "a div",
            "div div",
            "france unknown",
            "ok server",
            "type",
            "seychelles",
            "whitesky",
            "as29182 jsc",
            "showing",
            "as24940 hetzner",
            "moved",
            "expiration date",
            "aaaa",
            "russia",
            "as15169 google",
            "germany",
            "emails",
            "germany unknown",
            "a domains",
            "body doctype",
            "html public",
            "ietfdtd html",
            "finland",
            "asnone iran",
            "iran",
            "td tr",
            "td td",
            "tbody",
            "tr tr",
            "domains",
            "backdoor",
            "apple",
            "radio hacking",
            "voicestram",
            "listening",
            "trojan",
            "twitter",
            "servers",
            "vbs",
            "data center",
            "avg clamav",
            "msdefender sep",
            "vitro mar",
            "Win32:Vitro",
            "target: tsara brashears",
            "target: brashears personal devices",
            "target: whitesky communication network",
            "target: accounting firm devices",
            "targets: intellectual property",
            "redrum",
            "open",
            "tr tbody",
            "rsa ca",
            "apache",
            "as7922 comcast",
            "pulse submit",
            "url analysis",
            "epss",
            "impact",
            "cve cve20178977",
            "exploits",
            "targeted",
            "cve overview",
            "media"
          ],
          "references": [
            "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
            "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
            "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
            "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
            "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
            "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
            "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
            "message.htm.com | Ransomware",
            "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
            "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
            "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
            "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
            "Some items found relates to research exploited against or researched by target: disabled_duck",
            "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
            "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
            "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
            "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
            "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
            "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
            "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
            "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
            "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
            "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
            "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
            "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
            "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
            "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Seychelles",
            "Netherlands",
            "France",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win32:BackdoorX-gen\\ [Trj]",
              "display_name": "Win32:BackdoorX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-6840338-0",
              "display_name": "Win.Trojan.Tofsee-6840338-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dursg.K",
              "display_name": "Trojan:Win32/Dursg.K",
              "target": "/malware/Trojan:Win32/Dursg.K"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-42770",
              "display_name": "Win.Trojan.Downloader-42770",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/Nemucod.QJ",
              "display_name": "TrojanDownloader:JS/Nemucod.QJ",
              "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "Win.Trojan.Magania-13720",
              "display_name": "Win.Trojan.Magania-13720",
              "target": null
            },
            {
              "id": "Win32:Sality",
              "display_name": "Win32:Sality",
              "target": null
            },
            {
              "id": "Win.Trojan.Swisyn-6819",
              "display_name": "Win.Trojan.Swisyn-6819",
              "target": null
            },
            {
              "id": "Win32:SaliCode",
              "display_name": "Win32:SaliCode",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1313630",
              "display_name": "Win.Trojan.Agent-1313630",
              "target": null
            },
            {
              "id": "Crypt_r.BCM",
              "display_name": "Crypt_r.BCM",
              "target": null
            },
            {
              "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [
            "Retail",
            "Technology",
            "Telecommunications",
            "Civil Society",
            "Online Shopping",
            "Legal"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1965,
            "hostname": 1378,
            "domain": 1922,
            "FileHash-SHA256": 2639,
            "FileHash-MD5": 386,
            "FileHash-SHA1": 377,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 8680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "643 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6665d9ae1b06b560698b2a70",
          "name": "Assurance [a Prudential company] S0094-Remote Access",
          "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023.    Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly/Crouching Yeti and more. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
          "modified": "2024-07-09T15:02:04.111000",
          "created": "2024-06-09T16:34:54.161000",
          "tags": [
            "falcon sandbox",
            "sha256",
            "sha1",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "ascii text",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "historical ssl",
            "referrer",
            "httponly",
            "path",
            "secure",
            "maxage31557600",
            "expiresmon",
            "samesitenone",
            "expireswed",
            "etag w",
            "setcookie dids",
            "maxage864000",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "html document",
            "history",
            "utc names",
            "html info",
            "title assurance",
            "meta tags",
            "script tags",
            "anchor hrefs",
            "code",
            "requestid",
            "hostid",
            "xml file",
            "accessdenied",
            "message",
            "signature",
            "expires",
            "awsaccesskeyid",
            "log id",
            "gmtn",
            "passive dns",
            "urls",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "tls web",
            "full name",
            "self",
            "false",
            "united",
            "as8075",
            "unknown",
            "gmt server",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "aaaa",
            "meta",
            "link",
            "search",
            "creation date",
            "wheels up",
            "moved",
            "homepage",
            "servers",
            "service",
            "name servers",
            "hostname",
            "next",
            "japan unknown",
            "as2510 fujitsu",
            "status",
            "page",
            "ltd dba",
            "com laude",
            "record value",
            "ireland",
            "germany",
            "australia",
            "as44786 adobe",
            "whitelisted",
            "win32",
            "present may",
            "trojan",
            "karaganye",
            "regsetvalueexa",
            "regdword",
            "default",
            "show",
            "presto",
            "regbinary",
            "medium",
            "create c",
            "query",
            "double",
            "malware",
            "copy",
            "karagany",
            "write",
            "showing",
            "as35908 krypt",
            "as45102 alibaba",
            "hong kong",
            "data service",
            "script script",
            "div div",
            "title",
            "entries",
            "files",
            "japan asn",
            "dns resolutions",
            "memory pattern",
            "ip traffic",
            "domains",
            "urls https",
            "files c",
            "filesgoogle c",
            "written c",
            "extensions",
            "as20446",
            "as14061",
            "emails",
            "threat roundup",
            "bashlite",
            "jupyter rising",
            "vmware",
            "security blog",
            "april",
            "september",
            "december",
            "january",
            "enemybot",
            "core"
          ],
          "references": [
            "Assurance",
            "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
            "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
            "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
            "Domains Contacted: simplesausages.cx.cc adobe.com",
            "https://test2.ditproducts.com/dat/wannacry1.html",
            "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "CVE-2023-22518 | CVE-2023-4966"
          ],
          "public": 1,
          "adversary": "Berserk Bear (also known as BROMINE, Crouching Yeti, Dragonfly,",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "target": null
            },
            {
              "id": "Win32:Karagany-D\\ [Trj]",
              "display_name": "Win32:Karagany-D\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Xtoober-650",
              "display_name": "Win.Trojan.Xtoober-650",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage.SS",
              "display_name": "Trojan:Win32/Startpage.SS",
              "target": "/malware/Trojan:Win32/Startpage.SS"
            },
            {
              "id": "Win.Packed.Pincav-7537597-0",
              "display_name": "Win.Packed.Pincav-7537597-0",
              "target": null
            },
            {
              "id": "Trojan.Karagany - S0094",
              "display_name": "Trojan.Karagany - S0094",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1574.002",
              "name": "DLL Side-Loading",
              "display_name": "T1574.002 - DLL Side-Loading"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Finance - Insurance Sector"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2950,
            "FileHash-MD5": 193,
            "FileHash-SHA1": 171,
            "FileHash-SHA256": 1885,
            "URL": 8907,
            "domain": 2945,
            "SSLCertFingerprint": 2,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 17066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "648 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6665d55d941729c5f283b3f7",
          "name": "S0094-Remote Access - Assurance [a Prudential company]",
          "description": "Assurance experienced an abrupt shutdown April 2024. Health Insurance agents were notified mid business;  Prudential [Assurance partner] had fully taken over thus ending all contracts amid business. Cyber investigations date back to 2023. health insurance agents Trojan.Karagany [old] is a modular remote access tool used for recon and linked to Dragonfly. Infostealer, malware and unwanted programs  downloader.\nPersistence. Severe | S0094 - Remote Access\nCVE-2023-22518 | CVE-2023-4966",
          "modified": "2024-07-09T15:02:04.111000",
          "created": "2024-06-09T16:16:29.634000",
          "tags": [
            "falcon sandbox",
            "sha256",
            "sha1",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "pattern match",
            "ascii text",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "date",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "historical ssl",
            "referrer",
            "httponly",
            "path",
            "secure",
            "maxage31557600",
            "expiresmon",
            "samesitenone",
            "expireswed",
            "etag w",
            "setcookie dids",
            "maxage864000",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "html document",
            "history",
            "utc names",
            "html info",
            "title assurance",
            "meta tags",
            "script tags",
            "anchor hrefs",
            "code",
            "requestid",
            "hostid",
            "xml file",
            "accessdenied",
            "message",
            "signature",
            "expires",
            "awsaccesskeyid",
            "log id",
            "gmtn",
            "passive dns",
            "urls",
            "digicert global",
            "g2 tls",
            "rsa sha256",
            "tls web",
            "full name",
            "self",
            "false",
            "united",
            "as8075",
            "unknown",
            "gmt server",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "url https",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "aaaa",
            "meta",
            "link",
            "search",
            "creation date",
            "wheels up",
            "moved",
            "homepage",
            "servers",
            "service",
            "name servers",
            "hostname",
            "next",
            "japan unknown",
            "as2510 fujitsu",
            "status",
            "page",
            "ltd dba",
            "com laude",
            "record value",
            "ireland",
            "germany",
            "australia",
            "as44786 adobe",
            "whitelisted",
            "win32",
            "present may",
            "trojan",
            "karaganye",
            "regsetvalueexa",
            "regdword",
            "default",
            "show",
            "presto",
            "regbinary",
            "medium",
            "create c",
            "query",
            "double",
            "malware",
            "copy",
            "karagany",
            "write",
            "showing",
            "as35908 krypt",
            "as45102 alibaba",
            "hong kong",
            "data service",
            "script script",
            "div div",
            "title",
            "entries",
            "files",
            "japan asn",
            "dns resolutions",
            "memory pattern",
            "ip traffic",
            "domains",
            "urls https",
            "files c",
            "filesgoogle c",
            "written c",
            "extensions",
            "as20446",
            "as14061",
            "emails",
            "threat roundup",
            "bashlite",
            "jupyter rising",
            "vmware",
            "security blog",
            "april",
            "september",
            "december",
            "january",
            "enemybot",
            "core"
          ],
          "references": [
            "Assurance",
            "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
            "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
            "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
            "Domains Contacted: simplesausages.cx.cc adobe.com",
            "https://test2.ditproducts.com/dat/wannacry1.html",
            "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "CVE-2023-22518 | CVE-2023-4966"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands"
          ],
          "malware_families": [
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Karagany!atmn",
              "target": null
            },
            {
              "id": "Win32:Karagany-D\\ [Trj]",
              "display_name": "Win32:Karagany-D\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Xtoober-650",
              "display_name": "Win.Trojan.Xtoober-650",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage.SS",
              "display_name": "Trojan:Win32/Startpage.SS",
              "target": "/malware/Trojan:Win32/Startpage.SS"
            },
            {
              "id": "Win.Packed.Pincav-7537597-0",
              "display_name": "Win.Packed.Pincav-7537597-0",
              "target": null
            },
            {
              "id": "Trojan.Karagany - S0094",
              "display_name": "Trojan.Karagany - S0094",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1574.002",
              "name": "DLL Side-Loading",
              "display_name": "T1574.002 - DLL Side-Loading"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Finance - Insurance Sector"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2950,
            "FileHash-MD5": 193,
            "FileHash-SHA1": 171,
            "FileHash-SHA256": 1885,
            "URL": 8907,
            "domain": 2945,
            "SSLCertFingerprint": 2,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 17066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "648 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666271a86acba18eb98ce7f3",
          "name": "Unix.Trojan.Mirai-6981158-0 | Win32/1ms0rry CoinMiner Botnet affects android user",
          "description": "Found an IP address in block: http://100.116.0.0/?\nFound on android device user. Target is being tracked.  Uses .ru but tracks back to US based on other studies. Command 'redirect blame' found in association. Active, moved.",
          "modified": "2024-07-07T01:06:11.854000",
          "created": "2024-06-07T02:34:16.108000",
          "tags": [
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "general",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "win32 exe",
            "win32 dll",
            "wextract",
            "type name",
            "pink ribbon",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "files",
            "domain",
            "files ip",
            "address domain",
            "ip related",
            "referrer",
            "doublepulsar",
            "historical ssl",
            "darkpulsar",
            "ru sketchup",
            "flawedammyy",
            "date",
            "hostname",
            "pulse submit",
            "url analysis",
            "verdict",
            "next",
            "a nxdomain",
            "ip address",
            "url http",
            "http",
            "related nids",
            "files location",
            "as9123 timeweb",
            "russia unknown",
            "ipv4",
            "reverse dns",
            "russia",
            "united kingdom",
            "aaaa",
            "as198947 jsc",
            "as29470 jsc",
            "moved",
            "search",
            "nxdomain",
            "files domain",
            "files related",
            "unknown",
            "as63949 linode",
            "germany unknown",
            "main",
            "as59552 vhg",
            "title",
            "div div",
            "gmt content",
            "accept",
            "chegg",
            "regis",
            "special use IP",
            "tracking",
            "locate",
            "pe resource",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "count blacklist",
            "xiaav",
            "windowsxp",
            "script domains",
            "script urls",
            "body doctype",
            "ok server",
            "encrypt",
            "cookie",
            "p div",
            "script script",
            "div section",
            "as21342",
            "js core",
            "a domains",
            "link",
            "as43561",
            "location sofia",
            "telnet",
            "belemet.id",
            "100.116.0.0/?",
            "a li",
            "p td",
            "td tr",
            "a br",
            "meta",
            "as24940 hetzner",
            "grab",
            "this",
            "entries",
            "trojan",
            "ransom",
            "msil",
            "site",
            "cisco umbrella",
            "alexa top",
            "million",
            "alexa",
            "malicious site",
            "malicious url",
            "hostnames",
            "blacklist",
            "trickbot",
            "usa",
            "showing",
            "creation date",
            "record value",
            "dnssec",
            "memcommit",
            "win321ms0rry",
            "coinminer",
            "etpro trojan",
            "botnet cnc",
            "checkin",
            "activity",
            "medium",
            "t1055",
            "lowfi",
            "malware",
            "copy"
          ],
          "references": [
            "IP Block: 100.116.0.0/ Details: https://www.virustotal.com/gui/ip-address/100.116.0.0/details",
            "bElement.id",
            "Unix.Mirai IP: https://otx.alienvault.com/indicator/ip/93.170.6.43",
            "https://otx.alienvault.com/indicator/file/a108ff340f5256cc17c1e8345aacc3cf6c91987a1884957ea75df6d23281480b",
            "Yara Detections: is__elf",
            "IDS Detections: TELNET login failed root login Bad Login Generic Ping Keep-Alive Inbound M3",
            "Alerts: network_icmp suricata_alert network_multiple_direct_ip_connections Medium Priority Related Pulses OTX User-Created Pulses (2) Related Tags 10 Related Tags manipulation ,  discovery ,  dhta3eru4egasjn ,  abuse elevation ,  setgid More File Type ELF - ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Size 55 KB (56653 bytes) MD5",
            "IDS Detections MSIL/CoinMiner.ACM CnC Activity Win32/1ms0rry CoinMiner Botnet CnC Checkin",
            "b0t.fun: https://otx.alienvault.com/indicator/domain/b0t.fun",
            "IDS Detections: Win32/1ms0rry CoinMiner Botnet CnC Checkin MSIL/CoinMiner.ACM CnC Activity High Priority",
            "Alerts: nids_malware_alert injection_runpe network_icmp allocates_execute_remote_process antivm_queries_computername",
            "Alerts: persistence_autorun injection_ntsetcontextthread injection_resumethread dumped_buffer network_http raises_exception",
            "Alerts: antivm_network_adapters privilege_luid_check suspicious_tld allocates_rwx moves_self checks_debugger antivm_memory_available",
            "https://www.virustotal.com/gui/ip-address/100.116.0.0/summary"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany",
            "Russian Federation"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Dark Pulsar",
              "display_name": "Dark Pulsar",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981158-0",
              "display_name": "Unix.Trojan.Mirai-6981158-0",
              "target": null
            },
            {
              "id": "TrickBot",
              "display_name": "TrickBot",
              "target": null
            },
            {
              "id": "Packer.Native",
              "display_name": "Packer.Native",
              "target": null
            },
            {
              "id": "Win.Packed.Lynx",
              "display_name": "Win.Packed.Lynx",
              "target": null
            },
            {
              "id": "Sodinokibi.AB",
              "display_name": "Sodinokibi.AB",
              "target": null
            },
            {
              "id": "CoinMiner.ACM",
              "display_name": "CoinMiner.ACM",
              "target": null
            },
            {
              "id": "CoinMiner.WE",
              "display_name": "CoinMiner.WE",
              "target": null
            },
            {
              "id": "CoinMiner.WM",
              "display_name": "CoinMiner.WM",
              "target": null
            },
            {
              "id": "Win32/1ms0rry",
              "display_name": "Win32/1ms0rry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1078",
              "name": "Valid Accounts",
              "display_name": "T1078 - Valid Accounts"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            },
            {
              "id": "T1087",
              "name": "Account Discovery",
              "display_name": "T1087 - Account Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1195,
            "FileHash-SHA1": 745,
            "FileHash-SHA256": 1212,
            "URL": 2436,
            "domain": 1264,
            "hostname": 1148,
            "email": 1
          },
          "indicator_count": 8001,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "651 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536c8eee8d42d670e27723",
          "name": "Eternal Blue _ WannaCry MS17-010  | Apple iOS iMessage injection infiltration",
          "description": "",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T17:08:30.022000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66536881127f5ee988306394",
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "662 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66536881127f5ee988306394",
          "name": "iOS Attack - Crouching Yeti: http://x.com/denverpolice/status/|",
          "description": "Targeted triangulation. Apple iOS iPad. Attack chains of Operation Triangulation involves advanced tactics employed by those acting as secret middleman, deploying spoofed trusted websites, emails, alarming news stories, messages, Bluetooth hacking, if threat actor has full CnC of targets phone via injection (sometimes it's random) can power on B/T.   In Spoofed sites, malicious redirects, iMessage 0day case. Zero-click iMessage exploit seen. Information is sent to attacker and stored. Data harvesting, financial & identity theft, service modification and DoS intended. Used by law enforcement, governments, attorney PI's, cyber security defense, red teams and/or malicious hackers.\n*Crouching Yeti threat description notes: Contextual Indicators: Domain is classified as Social Networking Contextual Indicators: The URL is known benign by Check Point's Threat Cloud Contextual Indicators: Https://x.com is popular among websites with good reputation Contextual Indicators: Domain Cisco Umbrella rank is 312.",
          "modified": "2024-06-25T16:05:26.604000",
          "created": "2024-05-26T16:51:13.962000",
          "tags": [
            "sha256",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "local",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "contact",
            "external-resources",
            "dom-modification",
            "third-party-cookies",
            "iframes",
            "trackers",
            "text/html",
            "twitter",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "headers",
            "deny",
            "express",
            "referrer",
            "impacting azure",
            "proofpoint",
            "sneaky server",
            "replacement",
            "unauthorized",
            "switch dns",
            "query",
            "vy binh",
            "hiddentear",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "date",
            "meta",
            "form",
            "submission",
            "expiresthu",
            "path",
            "secure",
            "self",
            "xcitium verdict",
            "cloud",
            "sophos",
            "history first",
            "analysis",
            "cp",
            "cyber",
            "threat",
            "redrum",
            "hit",
            "men",
            "triangulation",
            "historical ssl",
            "apt suspects",
            "critical cmd",
            "hide",
            "asyncrat",
            "jeremy",
            "government",
            "malicious",
            "yuming",
            "name servers",
            "united",
            "passive dns",
            "urls",
            "creation date",
            "search",
            "expiration date",
            "showing",
            "unknown",
            "next",
            "windows nt",
            "malware beacon",
            "memcommit",
            "generic http",
            "exe upload",
            "outbound",
            "etpro trojan",
            "show",
            "trojan",
            "copy",
            "write",
            "win32",
            "malware",
            "read c",
            "entries",
            "medium",
            "markus",
            "contentlength",
            "write c",
            "delete c",
            "create c",
            "yara detections",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "next pe",
            "as32934",
            "hitmen",
            "local government",
            "scene unit",
            "crime",
            "denver police",
            "address",
            "status",
            "aaaa",
            "apple",
            "less whois",
            "registrar",
            "wannacry",
            "http",
            "unique",
            "url https",
            "related nids",
            "code",
            "screenshot",
            "anity",
            "nsa",
            "shadow",
            "saudi telecom",
            "riyadh address",
            "saudi arabia",
            "abuse",
            "ripe",
            "company isp",
            "number",
            "label saudi",
            "telecom company",
            "jsc regional",
            "riyadh",
            "ripe ncc",
            "registry techc",
            "campus",
            "saudi",
            "ripe network",
            "domain",
            "internet se",
            "emails",
            "system",
            "server tsa",
            "b server",
            "certificate",
            "digicert inc",
            "moved",
            "record value"
          ],
          "references": [
            "http://x.com/denverpolice/status/",
            "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
            "Redirects to https://twitter.com?mx=1",
            "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
            "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
            "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
            "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
            "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
            "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
            "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
            "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
            "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
            "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
            "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
            "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
            "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
            "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
            "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
            "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
            "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
            "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
            "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32/Vflooder.B Checkin",
              "display_name": "Win32/Vflooder.B Checkin",
              "target": null
            },
            {
              "id": "Win.Malware.Vtflooder-6723768-0",
              "display_name": "Win.Malware.Vtflooder-6723768-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32/Vflooder.B vtapi DOS",
              "display_name": "Win32/Vflooder.B vtapi DOS",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-63174",
              "display_name": "Win.Trojan.Downloader-63174",
              "target": null
            },
            {
              "id": "Clicker.BGOU",
              "display_name": "Clicker.BGOU",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-752791",
              "display_name": "Win.Trojan.Agent-752791",
              "target": null
            },
            {
              "id": "Win.Dropper.QQpass-9895638-0",
              "display_name": "Win.Dropper.QQpass-9895638-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/QQpass",
              "display_name": "Trojan:Win32/QQpass",
              "target": "/malware/Trojan:Win32/QQpass"
            },
            {
              "id": "WannaCry",
              "display_name": "WannaCry",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1038",
              "name": "DLL Search Order Hijacking",
              "display_name": "T1038 - DLL Search Order Hijacking"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1470",
              "name": "Obtain Device Cloud Backups",
              "display_name": "T1470 - Obtain Device Cloud Backups"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 350,
            "FileHash-SHA1": 348,
            "FileHash-SHA256": 2659,
            "URL": 7850,
            "domain": 2245,
            "hostname": 3611,
            "SSLCertFingerprint": 4,
            "email": 10,
            "CIDR": 4
          },
          "indicator_count": 17081,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "662 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6639853fc403f7be5bd6f27d",
          "name": "Facebook+",
          "description": "",
          "modified": "2024-05-07T01:34:55.365000",
          "created": "2024-05-07T01:34:55.365000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65eea19a23474b8c7dca351f",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Phone2209",
            "id": "281168",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1,
          "modified_text": "712 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603369ad0e38e313883c4fa",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root HELP! RETALIATION HAS OCCURRED ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:56:58.037000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 4468,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603360b48908ae9b9835563",
          "name": "IoT Dark Nexus + Mirai BotNet HELP HER PLEASE!!- Enom | TELNET Root |",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:54:35.118000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015553ad4633eb85c66817",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:31.072000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015551faca20cb510f9121",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:29.149000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cdfd20f6237e3892c0",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:25.910000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cc958e062575a9a160",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:24.154000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "725 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "Yara Detections: ConventionEngine_Term_Desktop ,  LZMA ,  mpress_2_xx_x86 ,  dbgdetect_procs",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "IP\u2019s Contacted: 77.76.39.110 104.156.155.94  77.77.13.89  78.61.87.173  78.63.104.75",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
        "www.crazyfrost.com IPv4 104.21.5.49 IPv4 172.67.132.250",
        "Copy of clientlibs(1).css",
        "Contains Pe Overlay Queries Locale Api Language Check Registry",
        "https://tria.ge/240521-r3mvhshd83",
        "Copy of clientlib(5).css",
        "IP Block: 100.116.0.0/ Details: https://www.virustotal.com/gui/ip-address/100.116.0.0/details",
        "Yara Detections: Yara Detections Nrv2x , UPX_OEP_place ,  UPX_Modified_Or_Inside ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,  UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser , Toxoplasmosis , UPX",
        "Alerts: antiav_servicestop antisandbox_sleep process_creation_suspicious_location",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Alerts: disables_uac infostealer_keylog modify_uac_prompt anomalous_deletefile",
        "Copy of clientlib(55).css",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882",
        "Copy of clientlib.js(30).download",
        "https://hybrid-analysis.com/sample/e4999984a69a65a69bec9fef1200f7ec36a10bc401cdd15db3510fdc87ec5008/697fb0fec4a9bda3410454cf",
        "Copy of clientlib.js(55).download",
        "http://email.critizr.com/asm/unsubscribe/?user_id=1464008&data=anW5I3azQrbEzQ84_I2zsSfJkpp1WTl08_zW0p5h4i5oMDAwdTAwMIqknJPIfal-ld9TvXgRLVf_F",
        "Copy of clientlib.js(9).download",
        "https://test2.ditproducts.com/dat/wannacry1.html",
        "CVE-2023-22518 | CVE-2023-4966",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
        "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
        "Copy of clientlib(21).css",
        "https://ct.captcha-delivery.com/c.js",
        "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver",
        "Copy of clientlib.js(57).download",
        "Copy of clientlib.js(11).download",
        "https://www.gov.pl/scripts/bundle.js",
        "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
        "Copy of clientlib(24).css",
        "TAGS:  detection detections detections name development att direct dirty dns resolutions domain",
        "Copy of clientlib(6).css",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
        "Copy of clientlib(15).css",
        "https://otx.alienvault.com/indicator/file/a108ff340f5256cc17c1e8345aacc3cf6c91987a1884957ea75df6d23281480b",
        "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
        "5.134.210.65",
        "Alerts: antivm_network_adapters privilege_luid_check suspicious_tld allocates_rwx moves_self checks_debugger antivm_memory_available",
        "Copy of clientlib.js(8).download",
        "Packer UPX v0.89.6 - v1.02 / v1.05 -v1.24 -> Markus & Laszlo [overlay]",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "Copy of clientlib.js(36).download",
        "Copy of clientlib(1).css",
        "TAGS: yara niggercat none file null object os x outbound passive dns path pattern match",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "https://hybrid-analysis.com/sample/3aaca21b3918eecd127867bdd724611398cf897a0686fedfde1d424b7ad6130a",
        "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
        "Alerts: dead_host network_icmp tcp_by",
        "TAGS: aaaa accept activity address adversaries aes128gcm ahmann all hostname all ipv4 as15169",
        "Copy of clientlib(29).css",
        "Copy of clientlib(31).css",
        "Copy of clientlib.js(16).download",
        "nigger.cat \u2022 http://a.nigger.cat/ \u2022 http://a.nigger.cat/imrred.exe \u2022 http://a.nigger.cat/iwzptk.pdf \u2022",
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
        "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
        "TAGS: pink screen port possible prefetch8 present program protocol h3 ptr record none push",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Copy of clientlib(44).css",
        "Copy of clientlib(42).css",
        "pornhub.dev, http://matrix.pornhub.dev, https://twitter.com/PORNO_SEXYBABES, https://www.anon-v.com/porno/fenella/",
        "Copy of clientlib(8).css",
        "Copy of clientlib.js(33).download",
        "Copy of clientlib.js(12).download",
        "Copy of clientlib(3).css",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://www.virustotal.com/gui/ip-address/100.116.0.0/summary",
        "Domains Contacted: simplesausages.cx.cc adobe.com",
        "https://www.passcreator.com/en/apple-wallet-passes",
        "Copy of clientlib.js(24).download",
        "Copy of clientlibs.js(3).download",
        "WannaCry MS17-010 'Shadow' https://otx.alienvault.com/otxapi/indicators/url/screenshot/https://www.antiy.com/response/wannacry.html",
        "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
        "IDS Detections: IP Check Domain (showmyipaddress .com in HTTP Host) External IP Lookup",
        "https://matomo.www.gov.pl/analytics/js/container_68lYTZ79.js",
        "http://www.gov.pl/web/po-jelenia-gora/",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "Copy of clientlib(34).css",
        "Hostname device-local-fb18804d-348e-49ea-8c17-cc8a29f18082.remotewd.com | 192.168.56.104: IPv4",
        "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
        "Copy of clientlib(43).css",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "Copy of clientlibs(3).css",
        "http://spiritzuridgerunelahubcloudgusparkx.rest/",
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "apple4you.it \u2022 https://www.apple4you.it/ \u2022 cpcalendars.apple4you.it \u2022 ftp.apple4you.it \u2022",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Subject: DE Certificate Subject: Berlin Certificate Subject",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Copy of clientlib.js(14).download",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
        "https://tria.ge/240521-rxpf6ahd6w",
        "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
        "https://any.run/cybersecurity-blog/tycoon2fa-evasion-analysis/",
        "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "AppleWebKit Christopher P. \u2018BUZZ\u2019 Ahmann interference",
        "Unix.Mirai IP: https://otx.alienvault.com/indicator/ip/93.170.6.43",
        "b0t.fun: https://otx.alienvault.com/indicator/domain/b0t.fun",
        "Copy of clientlibs.js.download",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "Copy of clientlib.js(56).download",
        "Alerts: network_icmp suricata_alert network_multiple_direct_ip_connections Medium Priority Related Pulses OTX User-Created Pulses (2) Related Tags 10 Related Tags manipulation ,  discovery ,  dhta3eru4egasjn ,  abuse elevation ,  setgid More File Type ELF - ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, not stripped Size 55 KB (56653 bytes) MD5",
        "message.htm.com | Ransomware",
        "Redirects to >https://twitter.com/x/migrate?tok=eyJlIjoiL2RlbnZlcnBvbGljZS9zdGF0dXMvIiwidCI6MTcxNjcwMzc3M33oZya0EO4PtEbRwq4XZboX",
        "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
        "https://tria.ge/240521-r1yh8shd44",
        "TAGS: as29278 deninet as29728 cottage as47325 ascii text asn as29278 asn as29728 asn13335",
        "Copy of clientlib.js(54).download",
        "Alerts: packer_entropy packer_upx antivm_memory_available pe_features",
        "https://www.loldrivers.io/favicons/browserconfig.xml",
        "Copy of clientlib.js(38).download",
        "Copy of clientlib(41).css",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "Copy of clientlib.js(42).download",
        "Copy of clientlib(49).css",
        "Command and Control IP: 5.41.21.250 | Location Saudi Arabia flag Jeddah,  Saudi Arabia ASN AS39891 saudi telecom company jsc",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
        "PATHETIC redirect: rainn.org | victims of violence & abuse disclose extremely sensitive details. Reported false information given to disorient victims.",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "Copy of clientlib.js(26).download",
        "bElement.id",
        "Copy of clientlib(47).css",
        "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
        "https://cpcontacts.apple4you.it",
        "Copy of clientlib.js(37).download",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Domains Contacted: whatismyipaddress.com whatismyip.everdot.org www.facebook.com",
        "https://www.virustotal.com/gui/file/fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f/summary",
        "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
        "Copy of clientlibs.css",
        "Copy of clientlib.js(44).download",
        "https://tria.ge/240521-rvybaahb79",
        "Copy of clientlib(30).css",
        "Yara Detections XOR_embeded_exefile_xored_with_round_256_bytes_key",
        "Copy of clientlib(48).css",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
        "Copy of clientlibs(4).css",
        "Copy of clientlib(46).css",
        "Copy of clientlib.js(58).download",
        "Copy of clientlib.js(18).download",
        "Copy of clientlib(50).css",
        "adsparkahz.shop \u2022 https://adsparkahz.shop/ \u2022 parkedbits.com",
        "http://a.nigger.cat/ypphgg.exe \u2022 http://u.nigger.cat/ \u2022 https://a.nigger.cat/",
        "https://www.facebook.com/groups/378607181955796/posts/773093455840498/?hpir=1&http_ref=eyJ0cyI6MTc2OTk2MDkxOTAwMCwiciI6IiJ9",
        "Unix.Dropper.Mirai-7135925-0 ,  DDoS:Linux/Gafgyt.YA!MTB Yara Detections is__elf ,  ECHOBOT",
        "https://socradar.io/tycoon-2fa-an-evolving-phishing-kit-phaas-threats/",
        "https://www.loldrivers.io/js/bundle.7cd1a644ff4540d19bfa43f193df74afce746a0213920f45d73bf720542f682d81b6ad0320242744d332512cfb63eac5790fab1a240d6e6c8cb89f25fcacfbd7.js",
        "TAGS: macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec",
        "Copy of clientlib(25).css",
        "IDS Detections: Domain in DNS Lookup (whatismyipaddress .com) IP Check",
        "Copy of clientlib(13).css",
        "ELF:DDoS-S\\ [Trj] ,  Unix.Trojan.Gafgyt-6981154-0 ,  DDoS:Linux/Gafgyt.YA!MTB",
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "Copy of clientlib.js(31).download",
        "Copy of clientlib.js(4).download",
        "Copy of clientlib(16).css",
        "https://parkedbits.com \u2022 spiritzuridgerunelahubcloudgusparkx.rest",
        "TAGS: upnproxy url analysis url https url text urls verified verify veryhigh victim network vubbuv win32 win64 windows windows nt windows server worm write write c yara detections yara rule",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Yara: Detections Delphi",
        "TAGS: sample analysis se domains search security quic add source level span spawns spy",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |",
        "Copy of clientlib(27).css",
        "Copy of clientlib(45).css",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Copy of clientlib(54).css",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "Copy of clientlib(22).css",
        "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
        "TAGS: trojan trojandropper trojanspy united unknown unknown aaaa unknown ns updater",
        "Copy of clientlibs.js(2).download",
        "apple-business.cancom.at",
        "uploads-cserver-alumni-profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "Copy of clientlib.js(35).download",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
        "Copy of clientlib.js(7).download",
        "Copy of clientlib(19).css",
        "Copy of clientlib(9).css",
        "Copy of clientlib.js(22).download",
        "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
        "Copy of iframe_api",
        "Copy of clientlib.js(13).download",
        "Yara Detections: is__elf ,  ECHOBOT",
        "Copy of clientlib.js(53).download",
        "Domains Contacted: fexexwjehud.org lxclombt.net jpnzlsaqogv.com esccuyigsy.org",
        "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
        "http://x.com/denverpolice/status/",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "https://www.loldrivers.io/js/chart.min.js",
        "https://www.gov.pl/web/po-jelenia-gora/",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "MD5  4234121dd739b4426ef27c2dc31661f2",
        "Domain: hicloudcam.com | https://otx.alienvault.com/indicator/hostname/alarmeu.sslproxy.gatewayvvlilly3lilly.alpha.hicloudcam.com",
        "IDS Detections: Suspicious Activity potential UPnProxy",
        "Copy of js",
        "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
        "http://a.nigger.cat/ltbexb.jpg \u2022 http://a.nigger.cat/ocnxdv.exe \u2022 http://a.nigger.cat/ocnxdv.exe/",
        "https://loldrivers.io/",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Copy of clientlib(17).css",
        "IDS Detections: Query for .cc TLD Suspicious User-Agent (Presto) Double User-Agent (User-Agent User-Agent)",
        "Copy of clientlib(11).css",
        "Copy of clientlib.js(28).download",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Copy of clientlib.js(60).download",
        "Copy of clientlibs(5).css",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Antivirus Detections: Win.Malware.Pits-10035540-0",
        "https://hybrid-analysis.com/sample/f6ccff8dec08334fab98d4f6cb9b2774acd00e98d1afabd219c2634d5b3e2147/697faa178cc598cfb90b0423",
        "https://otx.alienvault.com/indicator/file/000054fa2b0d1004464350ee9acc40707fec51223dba36c702a3db4139af9717",
        "Copy of clientlib.js(29).download",
        "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
        "Apple - 162.55.158.153",
        "Copy of clientlib.js(10).download",
        "Copy of clientlib.js(51).download",
        "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
        "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passive dns path pattern match pink screen port possible prefetch8 present dec present feb present jan",
        "IDS Detections: Win32/1ms0rry CoinMiner Botnet CnC Checkin MSIL/CoinMiner.ACM CnC Activity High Priority",
        "TAGS. redirect refresh related tags remoteIPAddress resource restart reverse dns route runner",
        "Ransomware File Modifications Exec Crash",
        "https://medium.com/@anyrun/evolution-of-tycoon-2fa-defense-evasion-mechanisms-analysis-and-timeline-6ec263227daf",
        "Copy of clientlib(2).css",
        "https://ftp.apple4you.it \u2022 http://cpcalendars.apple4you.it \u2022 http://cpcontacts.apple4you.it \u2022",
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "Copy of clientlib.js(34).download",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Copy of clientlib.js(41).download",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
        "http://allegro.pl/show_user_auctions.php?uid=265889",
        "Copy of clientlib.js(52).download",
        "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
        "https://otx.alienvault.com/indicator/file/f7636eef1d9df0664cd0f205ad8864b659bf9898ce6231376778c4411986912e",
        "Copy of clientlib(33).css",
        "9e8c2f9e77b4b6a7538e4136d3bda379c560dc1a5931643da119da2f28881e4d\tELF:DDoS-S\\ [Trj]\t\tUnix.Trojan.Gafgyt-6981154-0\tDDoS:Linux/Gafgyt.YA!MTB",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Copy of clientlib.js(45).download",
        "Alerts: mouse_movement_detect dead_connect  enumerates_running_processes process_needed",
        "Copy of clientlib(18).css",
        "Crouching Yeti: Appendixes - according to source ArcSight Threat Intelligence",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://fs25.mygamesteam.com/download/underground-parking/",
        "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
        "https://tria.ge/240521-ry949ahe2z/behavioral1",
        "Alerts: dynamic_function_loading reads_memory_remote_process packer_entropy network_http",
        "Copy of clientlib.js(1).download",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections",
        "Copy of fbevents.js.download",
        "http://netuser.joymeng.com/charge_apple/notify",
        "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "Copy of dir (1).c9r",
        "Copy of clientlib.js(32).download",
        "Copy of clientlib.js(23).download",
        "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
        "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
        "Antivirus Detections: Trojan:Win32/Dorv.A",
        "Redirects to https://twitter.com?mx=1",
        "TAGS: data upload date date hash ddos dead connection default defense evasion delphi destination",
        "Copy of clientlib(35).css",
        "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
        "Alerts: nids_malware_alert network_icmp dumped_buffer network_cnc_http network_http network_http_post allocates_rwx",
        "https://unicef.se/assets/apple",
        "Copy of clientlib.js(59).download",
        "Copy of clientlib(39).css",
        "TAGS: expiration date explorer extraction facebook facebook failed february filehash files files ip",
        "Copy of clientlib(32).css",
        "Domains Contacted: www.whatismyip.com www.showmyipaddress.com www.whatismyip.ca",
        "TAGS: flag gecko general general full general info generator geo hungary guard hackers hash hide",
        "Copy of clientlib.js(17).download",
        "Copy of clientlib(14).css",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "http://allegro.pl/uzytkownik/adam_f./sklep",
        "Copy of clientlib.js(15).download",
        "http://a.nigger.cat/ovefvy.html \u2022 http://a.nigger.cat/snkikb.rar \u2022 http://a.nigger.cat/unipms.exe",
        "Copy of clientlib(36).css",
        "hxxps://portal[.]office[.]com/Account",
        "Copy of clientlib.js(25).download",
        "http://5.134.210.65",
        "https://hybrid-analysis.com/sample/01a1a2106bcddc591cab08d31c13966bd0413fe312bce9be396e964e114631a6/697f8c04475b90e7fb0d7ff9",
        "Copy of clientlib.js(5).download",
        "Copy of clientlib(26).css",
        "Alerts: network_bind persistence_autorun binary_yara procmem_yara suricata_alert",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Copy of clientlibs(2).css",
        "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
        "Alerts: network_icmp modifies_proxy_wpad network_http suspicious_tld allocates_rwx creates_exe antivm_network_adapters checks_debugger",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Copy of clientlib(7).css",
        "TAGS: christopher p christopher p. \u2018buzz\u2019 ahmann ck id ck matrix ck techniques clare click cloud",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "Request Queries Keyboard Layout Antivm Generic Disk Resumethread",
        "IP address: 104.244.42.1  Hosting: Unknown  Running on: Tsa B  CMS: Express",
        "Copy of clientlib.js(19).download",
        "Copy of clientlib(51).css",
        "IDS Detections: Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host)",
        "Alerts: infostealer_cookies antiav_detectfile",
        "Copy of clientlib.js(43).download",
        "Copy of clientlibs.js(1).download",
        "TAGS: json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "TAGS: state of colorado stream strings suspicious t1590 gather tcp syn title tools tr trex triangulation",
        "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
        "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
        "Copy of clientlib.js(2).download",
        "Copy of clientlib.js(21).download",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Copy of clientlibs.js(4).download",
        "Copy of clientlib(4).css",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "https://otx.alienvault.com/indicator/file/00001aff2ea1acd6087f9fba8d8316d90d29e391d9969bc70cc607461467797e",
        "Copy of clientlib.js(3).download",
        "TAGS: pyspark python python initiated quic ransom recipes record value redacted for",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "https://otx.alienvault.com/indicator/hostname/originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com",
        "Copy of clientlib.js(39).download",
        "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passiv",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "127.0.0.1 Private IP Address  \u2022  http://facebook.com/iWebTechnologies",
        "http://ftp.apple4you.it \u2022 http://www.apple4you.it/ \u2022https://cpcalendars.apple4you.it \u2022",
        "Copy of clientlib(38).css",
        "Copy of clientlib(12).css",
        "output.228572717.txt [fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f]",
        "IDS Detections: Trojan Internet Connectivity Check TrojanDownloader.Win32/Karagany.H checkin 2",
        "Assurance",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "http://www.a.nigger.cat/ocnxdv.exe \u2022 https://a.nigger.cat/pwzbrt.txt",
        "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "Alerts: persistence_autorun injection_ntsetcontextthread injection_resumethread dumped_buffer network_http raises_exception",
        "WannaCry | NSA -Anity Cert: https://otx.alienvault.com/indicator/url/https://www.antiy.com/response/Antiy_Wannacry_NSA.html",
        "Copy of clientlib(40).css",
        "Copy of clientlib(20).css",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Copy of clientlib(10).css",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "TAGS: av detections av exploit belgium belgium unknown binbusybox bits body canada unknown",
        "Alerts: nids_malware_alert injection_runpe network_icmp allocates_execute_remote_process antivm_queries_computername",
        "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
        "Yara Detections: is__elf",
        "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
        "77d947c44255241fc5669daca69bd3906d70d03f0c07b0af8b89c0b2ae1351bc",
        "IDS Detections MSIL/CoinMiner.ACM CnC Activity Win32/1ms0rry CoinMiner Botnet CnC Checkin",
        "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
        "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
        "hxxps://myapplications[.]microsoft[.]com/",
        "IDS Detections: TELNET login failed root login Bad Login Generic Ping Keep-Alive Inbound M3",
        "TAGS: cloudflare cloudflarenet command config connection copy crazyfrost cyber attacks",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "nr-data.net [Apple Private Data Collection]",
        "originb0b.profile-cassandra-5.redirectme.netoppofentryd.staging.0025-kr.ali.zomans.com | 108.160.165.139 Location: USA |ASN AS19679 dropbox inc. Nameservers ns-136.awsdns-17.com. ns-1518.awsdns-61.org. ,\u00a0 ns-1573.awsdns-04.co.uk. ,\u00a0 ns-809.awsdns-37.net. Less WHOIS Registrar: https://www.101domain.com/,\u00a0\u00a0 Creation Date: Oct 21, 2010 Related Pulses None Related Tags None Indicator Facts Running webserver External Resources Whois,\u00a0 UrlVoid,\u00a0 VirusTotal Analysis Related Pulses Comments (0) Whois Show  100 entr",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Copy of clientlib(37).css",
        "Copy of clientlib(28).css",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "Copy of clientlib(23).css",
        "IDS Detections: Domain (whatismyipaddress .com in HTTP Host)",
        "IP\u2019s Contacted: 188.223.42.134 78.57.88.30  84.73.234.83  78.84.44.225  89.252.203.80",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
        "TAGS: add dynamicloader ecdsa echobot echobot related encrypt entries error evasion att",
        "TAGS: mtb yara name servers name tactics network traffic new browser next associated next",
        "Copy of clientlib(53).css",
        "Copy of clientlib(52).css",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Saad Tycoon",
            "Berserk Bear (also known as BROMINE, Crouching Yeti, Dragonfly,"
          ],
          "malware_families": [
            "Coinminer.we",
            "Win.trojan.swisyn-6819",
            "Coinminer.wm",
            "Worm:win32/yuner.a",
            "Trojandropper:win32/muldrop.v!mtb",
            "Win32:malware-gen",
            "Win32:salicode",
            "Win.trojan.vundo-7170412-0",
            "Trojan:win32/neconyd.a",
            "Win.packed.usteal-7531303-0",
            "Pykspa.c",
            "Win32:kamso",
            "Win.trojan.zegost",
            "Unix.trojan.darknexus-7679166-0",
            "Ddos:linux/gafgyt.ya!mtb",
            "Win.dropper.qqpass-9895638-0",
            "Pws:win32/qqpass",
            "Win32:sality",
            "Win32:karagany-d\\ [trj]",
            "Win32/vflooder.b vtapi dos",
            "Fareit",
            "Trojan:win32/vflooder",
            "#lowfi:tool:win32/vbstoexev2e",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn",
            "Trojan:win32/blihan.a",
            "Trojandownloader:win32/dadobra.e",
            "Wannacry",
            "Win.packed.lynx",
            "Crypt_r.bcm",
            "Win.trojan.downloader-63174",
            "Worm:win32/autorun.xfv",
            "Win.trojan.agent-752791",
            "Trojan:win32/dursg.k",
            "Encrypted",
            "Packer.native",
            "Virtool:win32/obfuscator.jm",
            "Worm:win32/lightmoon.h",
            "Tel:msil/dlsocconsend",
            "Coinminer.acm",
            "Ransom",
            "Tr",
            "Et",
            "Alf:aggr:exploit:o97m/cve-2017-11882",
            "Win.trojan.xtoober-650",
            "Trojan:win32/salgorea",
            "#lowfi:linkularnsis",
            "Androp",
            "Trickbot",
            "Win.trojan.magania-13720",
            "Trojan:win32/salgorea.c!mtb",
            "Clicker.bgou",
            "Win32/trickler",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Trojan:win32/aenjaris.al!bit",
            "Unruy",
            "Win32:androp",
            "Elf:ddos-s\\ [trj]",
            "4-0 win.malware.pits-10035540-0",
            "Win.malware.hd0kzai-9985588-0",
            "Trojandropper:win32/vb.il",
            "Cve 2007695",
            "Unix.trojan.gafgyt-698115",
            "Wormwin32/mofksys.rnd!mtb",
            "Backdoor:win32/tofsee.t",
            "Hammer",
            "Crypt2.azdi",
            "Mirai",
            "Trojandownloader:js/nemucod.qj",
            "Alf:exploit:o97m/cve-2017-8977",
            "Win.trojan.cycbot-1584",
            "Win.trojan.agent-1313630",
            "Trojan:win32/agent.ag!mtb",
            "Trojan:win32/startpage.ss",
            "Elf:mirai-gh\\ [trj]",
            "Multiple malware\u2019s , trojans and rats",
            "Alf:jasyp:trojandownloader:win32/karagany!atmn",
            "Win.trojan.downloader-42770",
            "Pws:win32/qqpass.fc",
            "Trojan:win32/eyestye.t",
            "Win.packed.pincav-7537597-0",
            "Dark pulsar",
            "Win32:backdoorx-gen\\ [trj]",
            "Deathhiddentear (large&small ht)   >",
            "Trojan.karagany - s0094",
            "#lowfi:hstr:win32/obfuscatordynmemjmpapi",
            "Artro",
            "Trojan:win32/zombie.a",
            "Win.packer.pkr_ce1a-9980177-0",
            "Win.malware.urelas-9863836-0",
            "Trojan:win32/qqpass",
            "Win.malware.barys-6840738-0",
            "Trojan:win32/dorv.a",
            "Unix.trojan.mirai-6981158-0",
            "Win.trojan.tofsee-6840338-0",
            "Inject.brdv",
            "Win.trojan.generic",
            "Win32:trojan-gen",
            "Win.malware.vtflooder-6723768-0",
            "Win32/1ms0rry",
            "Sodinokibi.ab",
            "Win32/vflooder.b checkin",
            "Trojan:win32/glupteba.mt!mtb",
            "#lowfi:suspicioussectionname",
            "Ddos:linux/lightaidra",
            "Alf:heraklezeval:trojan:win32/ymacco.aa47"
          ],
          "industries": [
            "Healthcare",
            "Media",
            "Construction",
            "Chemical",
            "Legal",
            "Government",
            "Technology",
            "Transportation",
            "Agriculture",
            "Education",
            "Telecommunications",
            "Energy",
            "Finance",
            "Civil society",
            "Defense",
            "Finance - insurance sector",
            "Retail",
            "Biotechnology",
            "Online shopping"
          ],
          "unique_indicators": 205858
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/location.search",
    "whois": "http://whois.domaintools.com/location.search",
    "domain": "location.search",
    "hostname": "n.location.search"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 32,
  "pulses": [
    {
      "id": "69a3c685d4b7c139ffe62930",
      "name": "Clone Pulse Reference",
      "description": "",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-03-01T04:54:29.384000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6906bd99cadbd4140014c6af",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 454,
        "hostname": 1404,
        "URL": 3557,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1,
        "CVE": 1
      },
      "indicator_count": 6754,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "698037098c99c37cb91037c2",
      "name": "Busy Box MITM Attacks via Drive-by-Compromise | Facebook | Apple",
      "description": "Busy Box - MITM Attack\n\nDrive-by-Compromise | Facebook | Jamie Oliver Recipes | My sister-in-law made this once and I couldn\u2019t stop eating it. \nAdversarial Facebook pop up posts. .\n\n|| Pykspa.C Check in. \"Pykspa is a type of Remote Access Trojan (RAT). A powerful  a worm that spreads via social media or via DGA algorithms. Parking crews are fond of these types of attacks. Christopher Ahmann",
      "modified": "2026-03-04T04:07:14.513000",
      "created": "2026-02-02T05:32:57.303000",
      "tags": [
        "no expiration",
        "filehashsha256",
        "ipv4",
        "url http",
        "domain",
        "hostname",
        "filehashmd5",
        "filehashsha1",
        "iocs",
        "url https",
        "search",
        "type indicator",
        "review iocs",
        "role title",
        "create new",
        "pulse use",
        "pdf report",
        "pcap",
        "extraction",
        "sc data",
        "extre data",
        "include review",
        "exclude sugges",
        "data upload",
        "failed",
        "find s",
        "oo data",
        "enter source",
        "url or",
        "text drag",
        "expiration",
        "showing",
        "entries",
        "protect",
        "pulse show",
        "email abuse",
        "related pulses",
        "indicator role",
        "returnurl no",
        "drop",
        "pulse provide",
        "public tlp",
        "green",
        "adversary tags",
        "buzz",
        "x8664",
        "add tag",
        "groups add",
        "add industry",
        "trojan",
        "tags"
      ],
      "references": [
        "https://www.facebook.com/groups/378607181955796/posts/773093455840498/?hpir=1&http_ref=eyJ0cyI6MTc2OTk2MDkxOTAwMCwiciI6IiJ9",
        "www.crazyfrost.com IPv4 104.21.5.49 IPv4 172.67.132.250",
        "Antivirus Detections: Trojan:Win32/Dorv.A",
        "IDS Detections: Win32/Pykspa.C Public IP Check IP Check Domain (whatismyip in HTTP Host)",
        "IDS Detections: IP Check Domain (showmyipaddress .com in HTTP Host) External IP Lookup",
        "IDS Detections: Domain in DNS Lookup (whatismyipaddress .com) IP Check",
        "IDS Detections: Domain (whatismyipaddress .com in HTTP Host)",
        "Yara Detections XOR_embeded_exefile_xored_with_round_256_bytes_key",
        "Alerts: antiav_servicestop antisandbox_sleep process_creation_suspicious_location",
        "Alerts: network_bind persistence_autorun binary_yara procmem_yara suricata_alert",
        "Alerts: disables_uac infostealer_keylog modify_uac_prompt anomalous_deletefile",
        "Alerts: mouse_movement_detect dead_connect  enumerates_running_processes process_needed",
        "Alerts: dynamic_function_loading reads_memory_remote_process packer_entropy network_http",
        "IP\u2019s Contacted: 188.223.42.134 78.57.88.30  84.73.234.83  78.84.44.225  89.252.203.80",
        "IP\u2019s Contacted: 77.76.39.110 104.156.155.94  77.77.13.89  78.61.87.173  78.63.104.75",
        "Domains Contacted: www.whatismyip.com www.showmyipaddress.com www.whatismyip.ca",
        "Domains Contacted: whatismyipaddress.com whatismyip.everdot.org www.facebook.com",
        "Domains Contacted: fexexwjehud.org lxclombt.net jpnzlsaqogv.com esccuyigsy.org",
        "Antivirus Detections: Win.Malware.Pits-10035540-0",
        "Yara: Detections Delphi",
        "Alerts: infostealer_cookies antiav_detectfile",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "nigger.cat \u2022 http://a.nigger.cat/ \u2022 http://a.nigger.cat/imrred.exe \u2022 http://a.nigger.cat/iwzptk.pdf \u2022",
        "http://a.nigger.cat/ltbexb.jpg \u2022 http://a.nigger.cat/ocnxdv.exe \u2022 http://a.nigger.cat/ocnxdv.exe/",
        "http://a.nigger.cat/ovefvy.html \u2022 http://a.nigger.cat/snkikb.rar \u2022 http://a.nigger.cat/unipms.exe",
        "http://a.nigger.cat/ypphgg.exe \u2022 http://u.nigger.cat/ \u2022 https://a.nigger.cat/",
        "http://www.a.nigger.cat/ocnxdv.exe \u2022 https://a.nigger.cat/pwzbrt.txt",
        "output.228572717.txt [fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f]",
        "https://www.virustotal.com/gui/file/fb970a4bffed1d606a8d90369d43e3a73ea9c8dbcf1394745f1568500e918e1f/summary",
        "https://hybrid-analysis.com/sample/3aaca21b3918eecd127867bdd724611398cf897a0686fedfde1d424b7ad6130a",
        "https://hybrid-analysis.com/sample/e4999984a69a65a69bec9fef1200f7ec36a10bc401cdd15db3510fdc87ec5008/697fb0fec4a9bda3410454cf",
        "https://hybrid-analysis.com/sample/f6ccff8dec08334fab98d4f6cb9b2774acd00e98d1afabd219c2634d5b3e2147/697faa178cc598cfb90b0423",
        "https://hybrid-analysis.com/sample/01a1a2106bcddc591cab08d31c13966bd0413fe312bce9be396e964e114631a6/697f8c04475b90e7fb0d7ff9",
        "apple4you.it \u2022 https://www.apple4you.it/ \u2022 cpcalendars.apple4you.it \u2022 ftp.apple4you.it \u2022",
        "https://ftp.apple4you.it \u2022 http://cpcalendars.apple4you.it \u2022 http://cpcontacts.apple4you.it \u2022",
        "http://ftp.apple4you.it \u2022 http://www.apple4you.it/ \u2022https://cpcalendars.apple4you.it \u2022",
        "https://cpcontacts.apple4you.it",
        "AppleWebKit Christopher P. \u2018BUZZ\u2019 Ahmann interference",
        "adsparkahz.shop \u2022 https://adsparkahz.shop/ \u2022 parkedbits.com",
        "https://parkedbits.com \u2022 spiritzuridgerunelahubcloudgusparkx.rest",
        "https://fs25.mygamesteam.com/download/underground-parking/",
        "http://spiritzuridgerunelahubcloudgusparkx.rest/",
        "127.0.0.1 Private IP Address  \u2022  http://facebook.com/iWebTechnologies",
        "9e8c2f9e77b4b6a7538e4136d3bda379c560dc1a5931643da119da2f28881e4d\tELF:DDoS-S\\ [Trj]\t\tUnix.Trojan.Gafgyt-6981154-0\tDDoS:Linux/Gafgyt.YA!MTB",
        "ELF:DDoS-S\\ [Trj] ,  Unix.Trojan.Gafgyt-6981154-0 ,  DDoS:Linux/Gafgyt.YA!MTB",
        "IDS Detections: Suspicious Activity potential UPnProxy",
        "Yara Detections: is__elf ,  ECHOBOT",
        "Alerts: dead_host network_icmp tcp_by",
        "Unix.Dropper.Mirai-7135925-0 ,  DDoS:Linux/Gafgyt.YA!MTB Yara Detections is__elf ,  ECHOBOT",
        "TAGS: aaaa accept activity address adversaries aes128gcm ahmann all hostname all ipv4 as15169",
        "TAGS: as29278 deninet as29728 cottage as47325 ascii text asn as29278 asn as29728 asn13335",
        "TAGS: av detections av exploit belgium belgium unknown binbusybox bits body canada unknown",
        "TAGS: christopher p christopher p. \u2018buzz\u2019 ahmann ck id ck matrix ck techniques clare click cloud",
        "TAGS: cloudflare cloudflarenet command config connection copy crazyfrost cyber attacks",
        "TAGS: data upload date date hash ddos dead connection default defense evasion delphi destination",
        "TAGS:  detection detections detections name development att direct dirty dns resolutions domain",
        "TAGS: add dynamicloader ecdsa echobot echobot related encrypt entries error evasion att",
        "TAGS: expiration date explorer extraction facebook facebook failed february filehash files files ip",
        "TAGS: flag gecko general general full general info generator geo hungary guard hackers hash hide",
        "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passiv",
        "TAGS: samples high host hover httpsupgrades hu note hu seen hungary hungary asn hybrid ids detections",
        "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec mtb yara name servers name tactics network traffic new browser next associated next yara niggercat none file null object os x outbound passive dns path pattern match pink screen port possible prefetch8 present dec present feb present jan",
        "TAGS: ilwysowa text informative intel mac ip address ip check ipv4 ipv4 add is__elf jamie oliver",
        "TAGS: json khtml launcher learn leve blu linux x8664 live live screenshot local logs look m. brian sabey",
        "TAGS: macintosh malware medium melvin sabey meta mitre att mobile ms windows mtb dec",
        "TAGS: mtb yara name servers name tactics network traffic new browser next associated next",
        "TAGS: yara niggercat none file null object os x outbound passive dns path pattern match",
        "TAGS: pink screen port possible prefetch8 present program protocol h3 ptr record none push",
        "TAGS: pyspark python python initiated quic ransom recipes record value redacted for",
        "TAGS. redirect refresh related tags remoteIPAddress resource restart reverse dns route runner",
        "TAGS: sample analysis se domains search security quic add source level span spawns spy",
        "TAGS: state of colorado stream strings suspicious t1590 gather tcp syn title tools tr trex triangulation",
        "TAGS: trojan trojandropper trojanspy united unknown unknown aaaa unknown ns updater",
        "TAGS: upnproxy url analysis url https url text urls verified verify veryhigh victim network vubbuv win32 win64 windows windows nt windows server worm write write c yara detections yara rule"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Hungary"
      ],
      "malware_families": [
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "DDos:Linux/Gafgyt.YA!MTB",
          "display_name": "DDos:Linux/Gafgyt.YA!MTB",
          "target": "/malware/DDos:Linux/Gafgyt.YA!MTB"
        },
        {
          "id": "ELF:DDoS-S\\ [Trj]",
          "display_name": "ELF:DDoS-S\\ [Trj]",
          "target": null
        },
        {
          "id": "Pykspa.C",
          "display_name": "Pykspa.C",
          "target": null
        },
        {
          "id": "Trojan:Win32/Dorv.A",
          "display_name": "Trojan:Win32/Dorv.A",
          "target": "/malware/Trojan:Win32/Dorv.A"
        },
        {
          "id": "Unix.Trojan.Gafgyt-698115",
          "display_name": "Unix.Trojan.Gafgyt-698115",
          "target": null
        },
        {
          "id": "4-0 Win.Malware.Pits-10035540-0",
          "display_name": "4-0 Win.Malware.Pits-10035540-0",
          "target": null
        },
        {
          "id": "Win.Packed.Usteal-7531303-0",
          "display_name": "Win.Packed.Usteal-7531303-0",
          "target": null
        },
        {
          "id": "tR",
          "display_name": "tR",
          "target": null
        },
        {
          "id": "DeathHiddenTear (Large&Small HT)   >",
          "display_name": "DeathHiddenTear (Large&Small HT)   >",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1586",
          "name": "Compromise Accounts",
          "display_name": "T1586 - Compromise Accounts"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1586,
        "FileHash-SHA1": 1479,
        "FileHash-SHA256": 1938,
        "URL": 4548,
        "domain": 1052,
        "hostname": 2501,
        "email": 9,
        "SSLCertFingerprint": 7,
        "CIDR": 2
      },
      "indicator_count": 13122,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6940b852c28f2a2c6abb4aad",
      "name": "FRITZ!Box \u2026.Connecting to Apple devices",
      "description": "Connecting to targeted Apple\ndevices overnight. \n\nHow to connect to the FRITZ!Box, how to access all of the product's functions, and what to do with the device if you are not connected to it in your home network.",
      "modified": "2026-01-15T01:02:47.757000",
      "created": "2025-12-16T01:39:30.381000",
      "tags": [
        "fritz",
        "strong",
        "main navigation",
        "deutsch",
        "englisch",
        "funktionen der",
        "verbindung zur",
        "wifi",
        "ip address",
        "box avm",
        "lowfi",
        "win32",
        "susp",
        "urls",
        "files",
        "asn as44716",
        "related tags",
        "indicator facts",
        "germany unknown",
        "a domains",
        "meta",
        "typo3",
        "body doctype",
        "kasper skaarhoj",
        "gmt server",
        "pragma",
        "a nxdomain",
        "nxdomain",
        "whitelisted",
        "present aug",
        "present jul",
        "present oct",
        "present jun",
        "united",
        "present sep",
        "present nov",
        "next http",
        "scans show",
        "title",
        "div div",
        "a li",
        "wir suchen",
        "li ul",
        "avm karriere",
        "dich a",
        "reverse dns",
        "berlin",
        "germany asn",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "related pulses",
        "none related",
        "passive dns",
        "ipv4",
        "url analysis",
        "present dec",
        "moved",
        "certificate",
        "vertriebs gmbh",
        "aaaa",
        "as12732 gutcon",
        "domain",
        "hostname",
        "verdict",
        "files ip",
        "address",
        "germany",
        "as13335",
        "as8220 colt",
        "present may",
        "united kingdom",
        "regsetvalueexa",
        "regdword",
        "regbinary",
        "show",
        "yara detections",
        "regsetvalueexw",
        "regsz",
        "medium",
        "suspicious",
        "delphi",
        "malware",
        "write",
        "as6878",
        "msie",
        "chrome",
        "gmt content",
        "germany showing",
        "createobject",
        "set http",
        "search",
        "high",
        "read c",
        "et trojan",
        "jfif",
        "ascii text",
        "detected",
        "trojan generic",
        "checkin",
        "pony downloader",
        "http library",
        "virustotal",
        "riskware",
        "mcafee",
        "drweb",
        "vipre",
        "trojan",
        "panda",
        "next",
        "unknown",
        "as15169 google",
        "status",
        "name servers",
        "record value",
        "emails",
        "error",
        "trojandropper",
        "results dec",
        "ddos",
        "worm",
        "mtb trojan",
        "mtb apr",
        "exev2e",
        "ia256",
        "extraction",
        "get http",
        "post http",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "informative",
        "spawns",
        "mitre att",
        "ck techniques",
        "evasion att",
        "germany germany",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "show technique",
        "ck matrix",
        "show process",
        "network traffic",
        "t1057",
        "t1071",
        "hybrid",
        "local",
        "path",
        "t1204 user",
        "defense evasion",
        "t1480 execution",
        "sha1",
        "sha256",
        "size",
        "script",
        "null",
        "span",
        "refresh",
        "footer",
        "body",
        "june",
        "general",
        "click",
        "strings",
        "tools",
        "tracker",
        "code",
        "look",
        "verify",
        "restart",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "process details",
        "flag",
        "link",
        "present feb",
        "servers",
        "redacted for",
        "as20546 soprado",
        "encrypt",
        "mtb sep",
        "ransom",
        "next associated",
        "twitter",
        "virtool",
        "hostname add",
        "location russia",
        "as200350",
        "russia unknown",
        "federation flag",
        "ipv4 add",
        "asn as200350",
        "related",
        "domain add",
        "unknown ns",
        "expiration date",
        "http version",
        "windows nt",
        "gbot",
        "post method",
        "port",
        "destination",
        "delete",
        "get na",
        "as15169",
        "expiration",
        "url https",
        "no expiration",
        "showing",
        "entries",
        "url add",
        "pulse pulses",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "unknown cname",
        "cname",
        "asn as24940",
        "less",
        "date",
        "pulse submit"
      ],
      "references": [
        "https://fritz.box/login | router.box |  wlan.box | mesh.box | myfritz.box | https://business.kozow.com/bbox/ |",
        "https://avm.de/ Connection: close Content Type: text/html charset=iso 8859 1",
        "AVM Computersysteme Vertriebs GmbH  Certificate Subject: IT  Certificate Subject *.avm.de  Certificate Issuer: US",
        "Certificate Issuer: DigiCert Inc  Certificate Issuer: |DigiCert SHA2 Secur Server CA",
        "Subject: DE Certificate Subject: Berlin Certificate Subject",
        "https://uutiskirje.professiogroup.com/go/54382390-5506438-191003959\u241d",
        "http://b25d1a05.click.convertkit-mail2.com \u2022 https://b25d1a05.click.convertkit-mail2.com",
        "https://push.adac.passcreator.com/ | passcreator-metrics.e07cc1.flownative.cloud",
        "ecs-80-158-49-8.reverse.open-telekom-cloud.com",
        "http://24.211.14.182:5555/login.htm?page=%2F |  s5wpr2nreqby04v9.myfritz.ne",
        "HYPERTRM.EXE - FileHash-SHA256 21cf992aba3d4adbc8a6bd65337f46a93983fbec8fe0f4639be826571ae469ba",
        "Copyright \u00a9 Hilgraeve, Inc. 2001 Product Microsoft\u00ae Windows\u00ae Operating System Description HyperTerminal Applet",
        "Original Name HYPERTRM.EXE Internal Name HyperTrm File Version 5.1.2600.0",
        "Comments HyperTerminal \u00ae was developed by Hilgraeve, Inc. for Microsoft",
        "ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System",
        "ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Trojan Generic - POST To gate.php with no referer\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Fareit/Pony Downloader Checkin 2\t192.168.56.103\t173.194.113.114",
        "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98\t192.168.56.103\t173.194.113.114",
        "http://applewaebastian.fritz.box/ \u2022 applewaebastian.fritz.box",
        "http://netuser.joymeng.com/charge_apple/notify",
        "https://www.passcreator.com/en/apple-wallet-passes",
        "https://sso.myfritz.net/static/images/icons/apple-touch-icon-76x76.png No",
        "apple-business.cancom.at",
        "Apple - 162.55.158.153",
        "Crypt2.AZDI -  FileHash-SHA256 62ffd7a3a21a5732870c4ad92fad7287a5270e4a5508752cfef0aa6f9ea30d1f",
        "Inject.BRDV - FileHash-SHA256\t25f639cdaae06656ab5e0cc80512146aa59097439c388dd15e4cc09343d9a283",
        "Win32:Androp - FileHash-MD5 99c6c9564af67a954661ebf6e41391d2",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-MD5\t99c8310538a090d2b7e5db3ea22b839a",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA1-2f7189e96cda26dbb6948354667fdd1ad37c04c0",
        "#LowFi:Tool:Win32/VbsToExeV2E - FileHash-SHA256\tae2fb6755dbf52fa44e427fbe0f29bf541aeedf66656edeb08ba9d7ef1617afc",
        "Ip Traffic: TCP 74.125.24.106:80 (googleapis.com) TCP 85.195.91.179:80 (catch-cdn.com) UDP <MACHINE_DNS_SERVER>:53",
        "ALF:CERT:Adware:Win32/Peapoon Win.Malware.Midie-6847893-0\tTrojanDropper:Win32/Muldrop.V!MTB Win.Malware.Generickdz-9938530-0\tTrojan:Win32/Zombie.A Win.Malware.Genpack-6989317-0\tTrojanDropper:Win32/VB.IL Win.Trojan.VBGeneric-6735875-0\tWorm:Win32/Mofksys"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "#LowFi:Tool:Win32/VbsToExeV2E",
          "display_name": "#LowFi:Tool:Win32/VbsToExeV2E",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Androp",
          "display_name": "Androp",
          "target": null
        },
        {
          "id": "Inject.BRDV",
          "display_name": "Inject.BRDV",
          "target": null
        },
        {
          "id": "Win32:Androp",
          "display_name": "Win32:Androp",
          "target": null
        },
        {
          "id": "Crypt2.AZDI",
          "display_name": "Crypt2.AZDI",
          "target": null
        },
        {
          "id": "TEL:MSIL/DlSocConSend",
          "display_name": "TEL:MSIL/DlSocConSend",
          "target": "/malware/TEL:MSIL/DlSocConSend"
        },
        {
          "id": "DDOS:Linux/Lightaidra",
          "display_name": "DDOS:Linux/Lightaidra",
          "target": "/malware/DDOS:Linux/Lightaidra"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
          "target": null
        },
        {
          "id": "Trojan:Win32/Salgorea.C!MTB",
          "display_name": "Trojan:Win32/Salgorea.C!MTB",
          "target": "/malware/Trojan:Win32/Salgorea.C!MTB"
        },
        {
          "id": "Worm:Win32/Autorun.XFV",
          "display_name": "Worm:Win32/Autorun.XFV",
          "target": "/malware/Worm:Win32/Autorun.XFV"
        },
        {
          "id": "Trojan:Win32/Blihan.A",
          "display_name": "Trojan:Win32/Blihan.A",
          "target": "/malware/Trojan:Win32/Blihan.A"
        },
        {
          "id": "Worm:Win32/Yuner.A",
          "display_name": "Worm:Win32/Yuner.A",
          "target": "/malware/Worm:Win32/Yuner.A"
        },
        {
          "id": "Win.Trojan.Zegost",
          "display_name": "Win.Trojan.Zegost",
          "target": null
        },
        {
          "id": "PWS:Win32/QQpass",
          "display_name": "PWS:Win32/QQpass",
          "target": "/malware/PWS:Win32/QQpass"
        },
        {
          "id": "Trojan:Win32/Glupteba.MT!MTB",
          "display_name": "Trojan:Win32/Glupteba.MT!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.MT!MTB"
        },
        {
          "id": "Trojan:Win32/QQpass",
          "display_name": "Trojan:Win32/QQpass",
          "target": "/malware/Trojan:Win32/QQpass"
        },
        {
          "id": "Win.Trojan.Generic",
          "display_name": "Win.Trojan.Generic",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Muldrop.V!MTB",
          "display_name": "TrojanDropper:Win32/Muldrop.V!MTB",
          "target": "/malware/TrojanDropper:Win32/Muldrop.V!MTB"
        },
        {
          "id": "Win32/Trickler",
          "display_name": "Win32/Trickler",
          "target": null
        },
        {
          "id": "Win.Malware.Hd0kzai-9985588-0",
          "display_name": "Win.Malware.Hd0kzai-9985588-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aenjaris.AL!bit",
          "display_name": "Trojan:Win32/Aenjaris.AL!bit",
          "target": "/malware/Trojan:Win32/Aenjaris.AL!bit"
        },
        {
          "id": "Trojan:Win32/Agent.AG!MTB",
          "display_name": "Trojan:Win32/Agent.AG!MTB",
          "target": "/malware/Trojan:Win32/Agent.AG!MTB"
        },
        {
          "id": "Trojan:Win32/Salgorea",
          "display_name": "Trojan:Win32/Salgorea",
          "target": "/malware/Trojan:Win32/Salgorea"
        },
        {
          "id": "Win.Malware.Barys-6840738-0",
          "display_name": "Win.Malware.Barys-6840738-0",
          "target": null
        },
        {
          "id": "Unruy",
          "display_name": "Unruy",
          "target": null
        },
        {
          "id": "Trojan:Win32/EyeStye.T",
          "display_name": "Trojan:Win32/EyeStye.T",
          "target": "/malware/Trojan:Win32/EyeStye.T"
        },
        {
          "id": "wormWin32/Mofksys.RND!MTB",
          "display_name": "wormWin32/Mofksys.RND!MTB",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/VB.IL",
          "display_name": "TrojanDropper:Win32/VB.IL",
          "target": "/malware/TrojanDropper:Win32/VB.IL"
        },
        {
          "id": "CVE 2007695",
          "display_name": "CVE 2007695",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1008",
          "name": "Fallback Channels",
          "display_name": "T1008 - Fallback Channels"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 927,
        "hostname": 2093,
        "FileHash-SHA256": 1474,
        "URL": 5935,
        "FileHash-MD5": 351,
        "FileHash-SHA1": 252,
        "email": 5,
        "CVE": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 11040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "94 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eea19a23474b8c7dca351f",
      "name": "All Items - find from the UA archive disk",
      "description": "Again have zero idea 'what these are' - just uploading from the 'archives' as I sort through things",
      "modified": "2025-12-24T08:28:47.628000",
      "created": "2024-03-11T06:15:54.351000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1165,
        "hostname": 866,
        "URL": 657,
        "FileHash-SHA256": 26,
        "email": 337,
        "FileHash-MD5": 12,
        "FileHash-SHA1": 8,
        "CIDR": 1
      },
      "indicator_count": 3072,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "116 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906bd99cadbd4140014c6af",
      "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
      "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
      "modified": "2025-12-02T01:05:30.331000",
      "created": "2025-11-02T02:10:33.546000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 449,
        "hostname": 1403,
        "URL": 3552,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1
      },
      "indicator_count": 6742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "138 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d7fd544aa8cf483b02d5c",
      "name": "Sinkhole | Win32/Dofoil.R CnC Beacon",
      "description": "#LowFI:VBExpensiveLoop\n*Worm:Win32/Gamarue [Static Pe Anomaly \u2022\nContains Pe Overlay \u2022\nBinary Yara]\n- Win32/Dofoil.R CnC Beacon |\nAlerts:\n\u2022 suspicious_iocontrol_codes\n\u2022 physical_drive_access",
      "modified": "2025-09-13T06:02:44.359000",
      "created": "2025-08-14T06:19:01.666000",
      "tags": [
        "lowfi",
        "united",
        "entries",
        "passive dns",
        "open ports",
        "next associated",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "domain",
        "address",
        "creation date",
        "name servers",
        "date",
        "hostname add",
        "dynamicloader",
        "medium",
        "fake",
        "high",
        "post",
        "show",
        "search",
        "observed http",
        "reg add",
        "copy",
        "write",
        "june",
        "malware",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "null",
        "error",
        "click",
        "body",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "strings",
        "refresh",
        "tools",
        "meta",
        "onload",
        "span",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "defense evasion",
        "spawns",
        "mask",
        "generator"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 175,
        "FileHash-SHA1": 180,
        "FileHash-SHA256": 458,
        "URL": 436,
        "domain": 69,
        "hostname": 156,
        "email": 1,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 1484,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d5115ad786de4ff048e5b",
      "name": "TEL:ECCert!SSLCO | Mirai Malware Hosting | Multi user Tracker",
      "description": "https://api.mirai.com/MiraiWebService/passbook/180823-77257/4001645 [Malware hosting]\n*TEL:ECCert!SSLCO\nYARA Detections:\nDelphi\nThis program must be run under Win32\ncompilers.\nCode Overlap of Trojan Droppers Backdoors , TrojanSpy\n\n\n#injection_inter_process\n#creates_largekey\n#network_bind\n#ransomware_file_modifications\n#antivm_generic_bios\n#antivm_generic_disk\n#enumerates_physical_drives\n#physical_drive_access\n#deletes_executed_files\n#recon_fingerprint\n#suspicious_command_tools\n#anomalous_deletefile\n#antisandbox_sleep\n#dead_connect\n#dynamic_function_loading\n#http_request\n#ipc_namedpipe\n#network_anomaly\n#powershell_download\n#powershell_request #track #locate #remote_access",
      "modified": "2025-09-13T02:00:42.729000",
      "created": "2025-08-14T02:59:33.036000",
      "tags": [
        "url https",
        "url http",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "entries",
        "present sep",
        "united",
        "present aug",
        "present jul",
        "present jun",
        "moved",
        "unknown ns",
        "present may",
        "present apr",
        "passive dns",
        "date",
        "encrypt",
        "body",
        "cookie",
        "gmt server",
        "content type",
        "dynamicloader",
        "medium",
        "x17x03x01",
        "download studio",
        "high",
        "read c",
        "show",
        "windows",
        "copy",
        "powershell",
        "write",
        "anomaly",
        "next",
        "unknown",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "yara detections",
        "delphi",
        "codeoverlap",
        "win32",
        "rgba",
        "memcommit",
        "delete",
        "png image",
        "hash",
        "dock",
        "execution",
        "malware",
        "wine emulator",
        "dynamic",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "capture",
        "persistence",
        "sha256",
        "submitted",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "script",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "null",
        "august",
        "span",
        "refresh",
        "meta",
        "mirai",
        "february",
        "april",
        "june",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "caribe",
        "rest",
        "accept",
        "friday",
        "look",
        "verify",
        "restart"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1539",
          "name": "Steal Web Session Cookie",
          "display_name": "T1539 - Steal Web Session Cookie"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6211,
        "domain": 682,
        "hostname": 1661,
        "FileHash-MD5": 117,
        "FileHash-SHA1": 100,
        "FileHash-SHA256": 1386,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 10162,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689d14258dd07e26a3bb1d46",
      "name": "PalantirFoundry.com (?) Multiple Remote Controlled Devices",
      "description": "Hacking.\nI\u2019m not sure if this is masquerading or not yet. Anything with \u2018PalantirFoundry.com\u2019 redirects to actual Palanrir login. Multiple users. Potentially 5000+ devices included in pulse. All monitored targets.",
      "modified": "2025-09-12T22:00:43.252000",
      "created": "2025-08-13T22:39:33.511000",
      "tags": [
        "passive dns",
        "urls",
        "files",
        "ip address",
        "asn as16509",
        "less whois",
        "registrar",
        "unknown related",
        "servers",
        "status",
        "hostname",
        "domain",
        "files ip",
        "address",
        "united",
        "unknown ns",
        "a domains",
        "search",
        "script urls",
        "authority",
        "record value",
        "service",
        "mirai",
        "cloud provider",
        "reverse dns",
        "sydney",
        "australia asn",
        "as16509",
        "dns resolutions",
        "related tags",
        "none indicator",
        "write c",
        "mozilla",
        "nsisinetc",
        "show",
        "medium",
        "entries",
        "high",
        "http",
        "delete",
        "write",
        "malware",
        "data upload",
        "ms windows",
        "intel",
        "pe32",
        "lowfi",
        "next",
        "showing",
        "present feb",
        "present jun",
        "present dec",
        "present aug",
        "present may",
        "present jul",
        "moved",
        "media",
        "segoe ui",
        "ipv4",
        "url analysis",
        "location united",
        "error",
        "regopenkeyexa",
        "regsetvalueexa",
        "read c",
        "port",
        "destination",
        "regdword",
        "windows nt",
        "hostile",
        "win32",
        "unknown",
        "delphi",
        "persistence",
        "execution",
        "extraction",
        "l data",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "file defense",
        "sha1",
        "sha256",
        "ascii text",
        "mitre att",
        "pattern match",
        "show technique",
        "null",
        "refresh",
        "body",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "type",
        "please",
        "pulse submit",
        "url add",
        "pulse pulses",
        "related nids",
        "files location",
        "flag united",
        "ddos",
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "virtool",
        "downloader",
        "dadobra",
        "date",
        "certificate",
        "montreal",
        "canada",
        "asn16509",
        "amazon02",
        "screenshot",
        "title login",
        "palantir",
        "page url",
        "history https",
        "evasion att",
        "remember",
        "label",
        "button",
        "form",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "software envoy",
        "value",
        "domainpath name",
        "header value",
        "self",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "returnur",
        "south korea",
        "as9318 sk",
        "sqlite rollback",
        "journal",
        "as701 verizon",
        "bittorrent dht",
        "win64",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFi:LinkularNSIS",
          "display_name": "#LowFi:LinkularNSIS",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
          "display_name": "#Lowfi:HSTR:Win32/ObfuscatorDynMemJmpAPI",
          "target": null
        },
        {
          "id": "Fareit",
          "display_name": "Fareit",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Dadobra.E",
          "display_name": "TrojanDownloader:Win32/Dadobra.E",
          "target": "/malware/TrojanDownloader:Win32/Dadobra.E"
        }
      ],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 3149,
        "domain": 1304,
        "URL": 5269,
        "FileHash-SHA256": 968,
        "FileHash-SHA1": 206,
        "email": 7,
        "FileHash-MD5": 274,
        "SSLCertFingerprint": 1,
        "CVE": 1
      },
      "indicator_count": 11179,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "689cc89e77327602780be49e",
      "name": "Remotewd Devices \u2022 Spectrum / Charter Communications & AT&T",
      "description": "Remotewd Devices expanded \u2022 Spectrum / Charter Communications & AT&T.\nAdvesarial. Polymorphic.",
      "modified": "2025-09-12T16:05:33.542000",
      "created": "2025-08-13T17:17:18.456000",
      "tags": [
        "url https",
        "domain",
        "types of",
        "united kingdom",
        "sweden",
        "virgin islands",
        "china",
        "germany",
        "date",
        "status",
        "ip address",
        "search",
        "domain add",
        "passive dns",
        "urls",
        "files",
        "error sep",
        "present jul",
        "address google",
        "safe browsing",
        "united",
        "unknown ns",
        "moved",
        "body",
        "cloudfront x",
        "hio52 p1",
        "certificate",
        "win32",
        "trojan",
        "entries",
        "next associated",
        "title error",
        "ipv4",
        "host gh",
        "secure path",
        "httponly cache",
        "x github",
        "request id",
        "accept",
        "encrypt",
        "formbook cnc",
        "checkin",
        "a domains",
        "lowfi",
        "mtb jun",
        "github pages",
        "as11427",
        "us note",
        "route",
        "ptr record",
        "hostname add",
        "url analysis",
        "verdict",
        "general info",
        "geo mckinney",
        "texas",
        "spectrum",
        "charter communications",
        "charter collection",
        "auth",
        "files ip",
        "address",
        "asn as16509",
        "record value",
        "germany unknown",
        "meta",
        "gmt cache",
        "sans400",
        "condensed300",
        "feel lost",
        "h1 div",
        "server",
        "gmt connection",
        "keep alive",
        "pragma",
        "ipv4 add",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "unknown aaaa",
        "china unknown",
        "beijing",
        "unknown soa",
        "hostname",
        "present aug",
        "name servers",
        "aaaa",
        "windows nt",
        "dynamicloader",
        "generic http",
        "exe upload",
        "inbound",
        "outbound",
        "host",
        "medium",
        "write",
        "markus",
        "malware",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "showing",
        "error",
        "extraction",
        "se enter",
        "sc type",
        "data upload",
        "failed",
        "extr data",
        "ox sunnort",
        "include review",
        "exclude data",
        "iocs",
        "pdf report",
        "pcap",
        "stix",
        "openloc",
        "pul data",
        "move",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "spawns",
        "mitre att",
        "ck techniques",
        "evasion att",
        "pattern match",
        "ascii text",
        "show technique",
        "null",
        "refresh",
        "span",
        "august",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "class",
        "adversaries",
        "defense evasion",
        "initial access",
        "msie",
        "chrome",
        "gmt content",
        "main",
        "virtool",
        "idran anv",
        "exti",
        "concor referen",
        "running webserver",
        "review iocs",
        "suggested iocs",
        "show",
        "http traffic",
        "intel",
        "ms windows",
        "pe32",
        "high",
        "write c",
        "explorer",
        "unknown",
        "worm",
        "next",
        "comman_and_control",
        "et",
        "vtapi",
        "dos",
        "persistence",
        "polymorphic",
        "virus",
        "device",
        "script",
        "style",
        "endcolorstr",
        "regexp",
        "link",
        "powershell",
        "form",
        "push",
        "active",
        "remote_access",
        "general full",
        "protocol h2",
        "security tls",
        "austin",
        "asn7018",
        "attinternet4",
        "reverse dns",
        "software",
        "domains",
        "hashes",
        "at&t",
        "injection",
        "rwx",
        "hackers",
        "attack",
        "cape",
        "stealth hidden extension",
        "antivm generic",
        "cape detected",
        "threat stealth",
        "public folder",
        "deletes",
        "files anomalous",
        "disables system",
        "restore dead",
        "mail procmem",
        "yara suricata",
        "queries user name"
      ],
      "references": [
        "Remotewd.com research - Devices under command and control. Malicious / adversarial | 3000 + devices in Pulse",
        "https://hybrid-analysis.com/sample/713944cb1accb541622bf99d55f34876b5ff13d042c6c203bab89632a15b9248/689c0eca8dd0033cbb064d12",
        "device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com TWC-11427-TEXAS, US \u2022 Spectrum",
        "Geo\tMcKinney, Texas, United States (US) \u2014  AS \u2022AS11427 - TWC-11427-TEXAS, US",
        "Note: An IP might be announced by multiple ASs.Spectrum | Charter Communications",
        "This is not shown. Route \u2022 184.92.0.0/16 (Route of ASN) PTR",
        "syn-184-092-221-096.res.spectrum.com(PTR record of primary IP) IPv4\t184.92.221.96",
        "https://urlscan.io/domain/device-f016b9a7-792b-4b35-a277-04a408ab1703.remotewd.com",
        "truist.palantirfoundry.com \u2022 nissansandbox.palantirfoundry.com",
        "device-7de2fab7-44a1-494e-8f36-8d135628c33a.remotewd.com 104.190.139.162 AT&T",
        "Stealth Hiddenreg Cape Detected Threat Stealth Timeout Accesses Public Folder Deletes",
        "Executed Files Anomalous Deletefile Dropper Disables System Restore Dead Connect",
        "Infostealer Cookies Infostealer Mail Procmem Yara Suricata Alert Modify Proxy Powershell",
        "Ransomware File Modifications Exec Crash",
        "Location Antisandbox Sleep Antidebug Setunhandledexceptionfilter Packer Unknown Pe Section Name Packer Entropy Network Bind Antivm Network Adapters Http Request Infostealer Browser Recon Fingerprint Antivm Checks Available Memory Antivm Generic Bios Reads Self Polymorphic Enumerates Physical Drives Network Http Network Cnc Http Antivm Bochs Keys",
        "Request Queries Keyboard Layout Antivm Generic Disk Resumethread",
        "Remote Process Static Pe Anomaly Https Urls Virus Process Creation Suspicious",
        "Contains Pe Overlay Queries Locale Api Language Check Registry"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Vflooder",
          "display_name": "Trojan:Win32/Vflooder",
          "target": "/malware/Trojan:Win32/Vflooder"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        },
        {
          "id": "VirTool:Win32/Obfuscator.JM",
          "display_name": "VirTool:Win32/Obfuscator.JM",
          "target": "/malware/VirTool:Win32/Obfuscator.JM"
        },
        {
          "id": "Win.Trojan.Cycbot-1584",
          "display_name": "Win.Trojan.Cycbot-1584",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [
        "Telecommunications",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6171,
        "domain": 1823,
        "hostname": 3155,
        "email": 8,
        "FileHash-SHA256": 950,
        "FileHash-MD5": 345,
        "FileHash-SHA1": 317,
        "CVE": 1,
        "CIDR": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 12772,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "218 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6854d01e3a8bc3deabb0f2a5",
      "name": "show_user_auctions.php  uid=265889 allegro.pl",
      "description": "https://www.virustotal.com/gui/file/8b33f59bb8a1a16bc5cd762a71d9ea902c7a301da2009517bfb34b0694e17049/relationshttps://www.virustotal.com/gui/ip-address/5.134.210.65/relations\nhttps://www.virustotal.com/gui/url/0d7d3ffc146887baef5a536bd7c7aa32392c2293b212266af89f782fb1c55fbc/details\nhttps://www.virustotal.com/gui/file/85e128a2b18df434c7d09c9360359e74c30711172a9075369c9ca4681dd5d498/details",
      "modified": "2025-09-01T08:05:11.054000",
      "created": "2025-06-20T03:06:06.379000",
      "tags": [
        "vhash",
        "ssdeep",
        "chrome",
        "typ pliku",
        "wpis",
        "web open",
        "font format",
        "truetype",
        "rgba",
        "obraz svg",
        "scalable vector",
        "graphics",
        "function",
        "silent failure",
        "regexp",
        "gethostname",
        "date",
        "saves",
        "return",
        "cmsg",
        "iframe",
        "issafari",
        "null",
        "meta"
      ],
      "references": [
        "http://allegro.pl/show_user_auctions.php?uid=265889",
        "http://5.134.210.65",
        "5.134.210.65",
        "MD5  4234121dd739b4426ef27c2dc31661f2",
        "https://ct.captcha-delivery.com/c.js",
        "http://allegro.pl/uzytkownik/adam_f./sklep",
        "77d947c44255241fc5669daca69bd3906d70d03f0c07b0af8b89c0b2ae1351bc"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 3,
        "FileHash-SHA1": 2,
        "FileHash-SHA256": 23,
        "URL": 109,
        "domain": 17,
        "hostname": 16
      },
      "indicator_count": 170,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 123,
      "modified_text": "230 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://n.location.search/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://n.location.search/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591899.661132
}