{
  "type": "URL",
  "indicator": "https://nextgen.lloydslistintelligence.com/auth",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://nextgen.lloydslistintelligence.com/auth",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3818151455,
      "indicator": "https://nextgen.lloydslistintelligence.com/auth",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "659864357d1d3185efc5c112",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
          "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-05T20:19:01.457000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659864448507cc1752ff6456",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
          "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-05T20:19:16.886000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a4898fa85cad0af83e032d",
          "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus ",
          "description": "",
          "modified": "2024-02-04T18:00:29.833000",
          "created": "2024-01-15T01:25:35.060000",
          "tags": [
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "dropped",
            "historical ssl",
            "communicating",
            "referrer",
            "stolec kradnie",
            "vt graph",
            "first",
            "utc submissions",
            "submitters",
            "amazonaes",
            "amazon02",
            "cloudflarenet",
            "gandi sas",
            "csc corporate",
            "ltd dba",
            "com laude",
            "facebook",
            "paris",
            "twitter",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "url https",
            "samples",
            "bundled",
            "tracking",
            "tsara brashears",
            "malware hunting",
            "hacktool",
            "emotet",
            "copy",
            "brashears",
            "dynadot inc",
            "enom",
            "srsplus",
            "spaceship",
            "CVE-2017-0147",
            "spy cve",
            "pegasus",
            "CVE-2017-0147 also  found in Pegasus",
            "mile high",
            "logos",
            "trademarks",
            "aylo premium",
            "click",
            "record keeping",
            "statement",
            "all rights",
            "reserved",
            "vendo",
            "hostnames",
            "urls https",
            "namecheap inc",
            "feeds ioc",
            "maltiverse",
            "analyze",
            "fastly",
            "mb installer",
            "helper",
            "summary iocs",
            "graph community",
            "urls",
            "urls http",
            "united",
            "unknown",
            "msie",
            "chrome",
            "passive dns",
            "body",
            "date",
            "gmt server",
            "user agent",
            "content type",
            "encrypt",
            "accept",
            "as136800 sun",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "location hong",
            "kong asn",
            "dns resolutions",
            "dinkle threat",
            "mirai",
            "hallrender",
            "briansabey",
            "brian sabey",
            "mark sabey",
            "uche6vol",
            "uc health medical campus colorado medical campus",
            "abuse"
          ],
          "references": [
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "CVE-2017-0147",
            "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
            "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
            "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
            "114.114.114.114 - Tulach Malware",
            "Targeting",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "tsarabrashears.com",
            "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
            "sweetheartvideo.com",
            "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
            "www.dead-speak.com",
            "Certificate Subject CN=brazzerspesonals.com",
            "http://r3.o.lencr.org",
            "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
            "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
            "104.247.75.218 |      [cnc ]",
            "www.governmentattic.org [privilege: malicious malware downloading]",
            "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "BRASHEARS",
              "display_name": "BRASHEARS",
              "target": null
            },
            {
              "id": "SABEY",
              "display_name": "SABEY",
              "target": null
            },
            {
              "id": "TULACH",
              "display_name": "TULACH",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "HallGrand",
              "display_name": "HallGrand",
              "target": null
            },
            {
              "id": "CVE-2017-0147",
              "display_name": "CVE-2017-0147",
              "target": null
            },
            {
              "id": "SPACESHIP",
              "display_name": "SPACESHIP",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Virus:DOS/Paris",
              "display_name": "Virus:DOS/Paris",
              "target": "/malware/Virus:DOS/Paris"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "659864448507cc1752ff6456",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 885,
            "FileHash-SHA1": 505,
            "FileHash-SHA256": 5051,
            "URL": 12316,
            "domain": 3944,
            "hostname": 4449,
            "CVE": 2
          },
          "indicator_count": 27152,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597f9c7542ffc6fffaecb30",
          "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
          "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:44:55.030000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4d4b5e060fb8a606a8",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.403000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6597fa4da16bd99cc5c02528",
          "name": "Botnet Campaign",
          "description": "",
          "modified": "2024-02-04T12:05:19.275000",
          "created": "2024-01-05T12:47:09.406000",
          "tags": [
            "ciphersuite",
            "delete c",
            "search",
            "entries",
            "united",
            "stcalifornia",
            "lmenlo park",
            "ometa platforms",
            "odigicert inc",
            "cndigicert sha2",
            "copy",
            "write",
            "unknown",
            "no expiration",
            "expiration",
            "filehashsha256",
            "hostname",
            "domain",
            "ipv4",
            "url http",
            "url https",
            "filehashmd5",
            "filehashsha1",
            "next",
            "iocs",
            "pdf report",
            "pcap",
            "scan endpoints",
            "win64",
            "stix",
            "openioc",
            "enter",
            "ssl certificate",
            "whois record",
            "apple ios",
            "communicating",
            "referrer",
            "contacted",
            "resolutions",
            "threat roundup",
            "password",
            "networks",
            "hacktool",
            "crypto",
            "twitter",
            "june",
            "probe",
            "ransomware",
            "malware",
            "tsara brashears",
            "botnet campaign",
            "january",
            "content reputation",
            "et"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Content Reputation",
              "display_name": "Content Reputation",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6597f9c7542ffc6fffaecb30",
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2469,
            "FileHash-SHA1": 2295,
            "FileHash-SHA256": 4925,
            "SSLCertFingerprint": 2,
            "URL": 4484,
            "domain": 2044,
            "hostname": 2375,
            "email": 18,
            "CVE": 4
          },
          "indicator_count": 18616,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "805 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659560d63178b32f07838efb",
          "name": "Covert | Big O Tires active cyber threat | Dark Power | Emotet|",
          "description": "Active, ongoing cyber threat, multiple malicious activities including, network rat, ransomware encryption, social engineering,  spammers, infostealer, botnet activity.\nConsumers may also be contacted by mail or phone or find account seized. I haven't benn able to properly access the magnitude of the issue, there has been at least a handful of customers in good standing , with higher limits on paid of cards that ended up being stolen or according to Big O Representatives 'closed' for unfounded reasons; failure to confirm citizenship, identity, unknown patriot act offences, failure to comply Big O Tires via mail.",
          "modified": "2024-02-02T12:04:41.638000",
          "created": "2024-01-03T13:27:50.685000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "unsafeeval",
            "path",
            "expiressat",
            "auto",
            "wheels online",
            "o tires",
            "shop tires",
            "html info",
            "title shop",
            "tires",
            "meta tags",
            "big o",
            "tires language",
            "name verdict",
            "falcon sandbox",
            "samples",
            "localappdata",
            "json data",
            "temp",
            "getprocaddress",
            "ascii text",
            "windir",
            "file",
            "indicator",
            "mitre att",
            "ck id",
            "factory",
            "hybrid",
            "model",
            "comspec",
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "historical ssl",
            "whois whois",
            "simda http",
            "collections",
            "historical",
            "dropped",
            "backdoor",
            "unknown",
            "united",
            "asnone",
            "show",
            "entries",
            "search",
            "intel",
            "ms windows",
            "pe32",
            "windows nt",
            "copy",
            "write",
            "logic",
            "download",
            "malware",
            "suspicious",
            "next",
            "destination",
            "port",
            "components",
            "globalnpf",
            "china as23724",
            "music",
            "data c",
            "mexico",
            "as15169 google",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "win32",
            "united kingdom",
            "explorer",
            "xserver",
            "mtb aug",
            "location united",
            "america asn",
            "open",
            "trojan",
            "worm",
            "dataadobereader",
            "as397240",
            "msie",
            "etpro trojan",
            "virgin islands",
            "script urls",
            "creation date",
            "record value",
            "date",
            "a domains",
            "all search",
            "otx octoseek",
            "url http",
            "http",
            "related nids",
            "pulse http",
            "url https",
            "files location",
            "as20940",
            "aaaa",
            "as2914 ntt",
            "canada unknown",
            "japan unknown",
            "as16625 akamai",
            "domain",
            "hostname",
            "gmt content",
            "gmt report",
            "0 report",
            "sea alt",
            "body",
            "encrypt",
            "social engineering",
            "revenge rat",
            "rat",
            "identity theft",
            "credit card",
            "referrer",
            "communicating",
            "bundled",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "ransomware",
            "cobalt strike",
            "attack",
            "core",
            "emotet",
            "exploit",
            "hacktool",
            "mail spammer",
            "as63949 linode",
            "mtb dec",
            "checkin m1",
            "trojanspy",
            "artro",
            "remote",
            "infostealer"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Ukraine",
            "Georgia",
            "India",
            "Hong Kong",
            "Canada",
            "China",
            "Indonesia",
            "South Africa",
            "Germany",
            "Slovenia",
            "Mexico",
            "Netherlands",
            "Japan",
            "Spain",
            "Argentina",
            "France",
            "Chile",
            "Italy",
            "Aruba",
            "Switzerland",
            "United Kingdom of Great Britain and Northern Ireland",
            "Denmark",
            "Poland",
            "Colombia",
            "Taiwan",
            "Bulgaria",
            "Austria",
            "Russian Federation",
            "Australia",
            "Philippines",
            "Norway",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "display_name": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "Trojan:MSIL/ClipBanker.GB!MTB",
              "display_name": "Trojan:MSIL/ClipBanker.GB!MTB",
              "target": "/malware/Trojan:MSIL/ClipBanker.GB!MTB"
            },
            {
              "id": "Virus:Win32/Floxif.H",
              "display_name": "Virus:Win32/Floxif.H",
              "target": "/malware/Virus:Win32/Floxif.H"
            },
            {
              "id": "Win.Packed.Zusy-7170176-0",
              "display_name": "Win.Packed.Zusy-7170176-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-9880005-0",
              "display_name": "Win.Trojan.Zbot-9880005-0",
              "target": null
            },
            {
              "id": "'Win32:Trojan-gen",
              "display_name": "'Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "display_name": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.B",
              "display_name": "Worm:Win32/Mofksys.B",
              "target": "/malware/Worm:Win32/Mofksys.B"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Worm:LOGO/Logic",
              "display_name": "Worm:LOGO/Logic",
              "target": "/malware/Worm:LOGO/Logic"
            },
            {
              "id": "ETPro Trojan",
              "display_name": "ETPro Trojan",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Swisyn",
              "display_name": "TrojanSpy:Win32/Swisyn",
              "target": "/malware/TrojanSpy:Win32/Swisyn"
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 560,
            "FileHash-SHA1": 350,
            "FileHash-SHA256": 4371,
            "URL": 8165,
            "domain": 2548,
            "hostname": 2813,
            "CVE": 4,
            "email": 3
          },
          "indicator_count": 18814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "807 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "tsarabrashears.com",
        "104.247.75.218 |      [cnc ]",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "www.dead-speak.com",
        "http://r3.o.lencr.org",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "Certificate Subject CN=brazzerspesonals.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc",
        "Targeting",
        "CVE-2017-0147",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]",
        "sweetheartvideo.com",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "114.114.114.114 - Tulach Malware",
        "www.governmentattic.org [privilege: malicious malware downloading]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Virus:dos/paris",
            "Dark power",
            "Win.trojan.zbot-9880005-0",
            "Content reputation",
            "'win32:trojan-gen",
            "Pws:win32/vb.cu",
            "Worm:logo/logic",
            "Artro",
            "Hacktool",
            "Tel:trojandownloader:o97m/msiexecabuse",
            "Mirai",
            "Trojanspy:win32/swisyn",
            "Worm:win32/mofksys.b",
            "Sabey",
            "Trojan:win32/comspec",
            "Ransomware",
            "Hallgrand",
            "Trojanspy",
            "Crypt3.blxp",
            "#lowfi:scpt:kiraasciiobfuscator",
            "Spaceship",
            "Backdoor:win32/simda",
            "Brashears",
            "Cve-2017-0147",
            "Etpro trojan",
            "Worm:win32/mofksys.rnd!mtb",
            "Virus:win32/floxif.h",
            "Hallrender",
            "Cobalt strike",
            "Lolkek",
            "Emotet",
            "Win.packed.zusy-7170176-0",
            "Trojan:msil/clipbanker.gb!mtb",
            "Quasar rat",
            "Tulach",
            "Et"
          ],
          "industries": [
            "Telecommunications"
          ],
          "unique_indicators": 65058
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/lloydslistintelligence.com",
    "whois": "http://whois.domaintools.com/lloydslistintelligence.com",
    "domain": "lloydslistintelligence.com",
    "hostname": "nextgen.lloydslistintelligence.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "659864357d1d3185efc5c112",
      "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
      "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
      "modified": "2024-02-04T18:00:29.833000",
      "created": "2024-01-05T20:19:01.457000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "contacted",
        "dropped",
        "historical ssl",
        "communicating",
        "referrer",
        "stolec kradnie",
        "vt graph",
        "first",
        "utc submissions",
        "submitters",
        "amazonaes",
        "amazon02",
        "cloudflarenet",
        "gandi sas",
        "csc corporate",
        "ltd dba",
        "com laude",
        "facebook",
        "paris",
        "twitter",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "url https",
        "samples",
        "bundled",
        "tracking",
        "tsara brashears",
        "malware hunting",
        "hacktool",
        "emotet",
        "copy",
        "brashears",
        "dynadot inc",
        "enom",
        "srsplus",
        "spaceship",
        "CVE-2017-0147",
        "spy cve",
        "pegasus",
        "CVE-2017-0147 also  found in Pegasus",
        "mile high",
        "logos",
        "trademarks",
        "aylo premium",
        "click",
        "record keeping",
        "statement",
        "all rights",
        "reserved",
        "vendo",
        "hostnames",
        "urls https",
        "namecheap inc",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "fastly",
        "mb installer",
        "helper",
        "summary iocs",
        "graph community",
        "urls",
        "urls http",
        "united",
        "unknown",
        "msie",
        "chrome",
        "passive dns",
        "body",
        "date",
        "gmt server",
        "user agent",
        "content type",
        "encrypt",
        "accept",
        "as136800 sun",
        "ipv4",
        "pulse submit",
        "url analysis",
        "files",
        "location hong",
        "kong asn",
        "dns resolutions",
        "dinkle threat",
        "mirai",
        "hallrender",
        "briansabey",
        "brian sabey",
        "mark sabey",
        "uche6vol",
        "uc health medical campus colorado medical campus",
        "abuse"
      ],
      "references": [
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "CVE-2017-0147",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "114.114.114.114 - Tulach Malware",
        "Targeting",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "tsarabrashears.com",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "sweetheartvideo.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "www.dead-speak.com",
        "Certificate Subject CN=brazzerspesonals.com",
        "http://r3.o.lencr.org",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "104.247.75.218 |      [cnc ]",
        "www.governmentattic.org [privilege: malicious malware downloading]",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "SABEY",
          "display_name": "SABEY",
          "target": null
        },
        {
          "id": "TULACH",
          "display_name": "TULACH",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "SPACESHIP",
          "display_name": "SPACESHIP",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Virus:DOS/Paris",
          "display_name": "Virus:DOS/Paris",
          "target": "/malware/Virus:DOS/Paris"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 885,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 5051,
        "URL": 12316,
        "domain": 3944,
        "hostname": 4449,
        "CVE": 2
      },
      "indicator_count": 27152,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659864448507cc1752ff6456",
      "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus",
      "description": "CVE-2017-0147 and other malware is attacking a large Colorado Hospital. A report was posted by colleague but is somehow deleted. This has been exploited in a major way. The ability to have full cnc of all Medical center computers, will interact, listen,attend remotely, can login to system. Can run unauthorized systems in the background, access microphone, computer, ability to freeze system,imaging, records modification, appointment, diagnosis modification, records can and have been removed from facility. I only noticed today's that it appears to have been created by an entity targeting Tsara Brashears in every way possible. Report in references. Low confidence  of having been exploited, CVE and Network attack has been quite active for some time.",
      "modified": "2024-02-04T18:00:29.833000",
      "created": "2024-01-05T20:19:16.886000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "contacted",
        "dropped",
        "historical ssl",
        "communicating",
        "referrer",
        "stolec kradnie",
        "vt graph",
        "first",
        "utc submissions",
        "submitters",
        "amazonaes",
        "amazon02",
        "cloudflarenet",
        "gandi sas",
        "csc corporate",
        "ltd dba",
        "com laude",
        "facebook",
        "paris",
        "twitter",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "url https",
        "samples",
        "bundled",
        "tracking",
        "tsara brashears",
        "malware hunting",
        "hacktool",
        "emotet",
        "copy",
        "brashears",
        "dynadot inc",
        "enom",
        "srsplus",
        "spaceship",
        "CVE-2017-0147",
        "spy cve",
        "pegasus",
        "CVE-2017-0147 also  found in Pegasus",
        "mile high",
        "logos",
        "trademarks",
        "aylo premium",
        "click",
        "record keeping",
        "statement",
        "all rights",
        "reserved",
        "vendo",
        "hostnames",
        "urls https",
        "namecheap inc",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "fastly",
        "mb installer",
        "helper",
        "summary iocs",
        "graph community",
        "urls",
        "urls http",
        "united",
        "unknown",
        "msie",
        "chrome",
        "passive dns",
        "body",
        "date",
        "gmt server",
        "user agent",
        "content type",
        "encrypt",
        "accept",
        "as136800 sun",
        "ipv4",
        "pulse submit",
        "url analysis",
        "files",
        "location hong",
        "kong asn",
        "dns resolutions",
        "dinkle threat",
        "mirai",
        "hallrender",
        "briansabey",
        "brian sabey",
        "mark sabey",
        "uche6vol",
        "uc health medical campus colorado medical campus",
        "abuse"
      ],
      "references": [
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "CVE-2017-0147",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "114.114.114.114 - Tulach Malware",
        "Targeting",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "tsarabrashears.com",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "sweetheartvideo.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "www.dead-speak.com",
        "Certificate Subject CN=brazzerspesonals.com",
        "http://r3.o.lencr.org",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "104.247.75.218 |      [cnc ]",
        "www.governmentattic.org [privilege: malicious malware downloading]",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "SABEY",
          "display_name": "SABEY",
          "target": null
        },
        {
          "id": "TULACH",
          "display_name": "TULACH",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "SPACESHIP",
          "display_name": "SPACESHIP",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Virus:DOS/Paris",
          "display_name": "Virus:DOS/Paris",
          "target": "/malware/Virus:DOS/Paris"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 885,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 5051,
        "URL": 12316,
        "domain": 3944,
        "hostname": 4449,
        "CVE": 2
      },
      "indicator_count": 27152,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a4898fa85cad0af83e032d",
      "name": "SPACESHIP | CVE-2017-0147 - has been exploited at large Colorado Medical Campus ",
      "description": "",
      "modified": "2024-02-04T18:00:29.833000",
      "created": "2024-01-15T01:25:35.060000",
      "tags": [
        "ssl certificate",
        "whois record",
        "execution",
        "contacted",
        "dropped",
        "historical ssl",
        "communicating",
        "referrer",
        "stolec kradnie",
        "vt graph",
        "first",
        "utc submissions",
        "submitters",
        "amazonaes",
        "amazon02",
        "cloudflarenet",
        "gandi sas",
        "csc corporate",
        "ltd dba",
        "com laude",
        "facebook",
        "paris",
        "twitter",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "url https",
        "samples",
        "bundled",
        "tracking",
        "tsara brashears",
        "malware hunting",
        "hacktool",
        "emotet",
        "copy",
        "brashears",
        "dynadot inc",
        "enom",
        "srsplus",
        "spaceship",
        "CVE-2017-0147",
        "spy cve",
        "pegasus",
        "CVE-2017-0147 also  found in Pegasus",
        "mile high",
        "logos",
        "trademarks",
        "aylo premium",
        "click",
        "record keeping",
        "statement",
        "all rights",
        "reserved",
        "vendo",
        "hostnames",
        "urls https",
        "namecheap inc",
        "feeds ioc",
        "maltiverse",
        "analyze",
        "fastly",
        "mb installer",
        "helper",
        "summary iocs",
        "graph community",
        "urls",
        "urls http",
        "united",
        "unknown",
        "msie",
        "chrome",
        "passive dns",
        "body",
        "date",
        "gmt server",
        "user agent",
        "content type",
        "encrypt",
        "accept",
        "as136800 sun",
        "ipv4",
        "pulse submit",
        "url analysis",
        "files",
        "location hong",
        "kong asn",
        "dns resolutions",
        "dinkle threat",
        "mirai",
        "hallrender",
        "briansabey",
        "brian sabey",
        "mark sabey",
        "uche6vol",
        "uc health medical campus colorado medical campus",
        "abuse"
      ],
      "references": [
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "CVE-2017-0147",
        "https://www.virustotal.com/gui/url/76b30b054701dd52394b91dd11937fefc8888994ee214f02d22ebc2c8cb7e057/summary",
        "https://otx.alienvault.com/indicator/cve/CVE-2017-0147",
        "https://www.virustotal.com/gui/url/9fa23b2600cf067195442b801633ec4e67e17d0b0e807561cd6001808a8930bf/summary",
        "114.114.114.114 - Tulach Malware",
        "Targeting",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "tsarabrashears.com",
        "https://pin.it/ malicious Pinterest redirect targets Tsara Brashears",
        "sweetheartvideo.com",
        "https://www.sweetheartvideo.com/tsara-brashears/ [Tracking & BotNet campaign]",
        "www.dead-speak.com",
        "Certificate Subject CN=brazzerspesonals.com",
        "http://r3.o.lencr.org",
        "156.254.243.90     [cnc] Unix.Trojan.Mirai-6981169-0",
        "Mirai: a90557a4165401091b1d8d0132465170475508f810e7a5c7f585c17c2120447 ELF:DDoS-S\\ [Trj]",
        "104.247.75.218 |      [cnc ]",
        "www.governmentattic.org [privilege: malicious malware downloading]",
        "https://www.adultforce.com/ [malvertizing Tsara Brashears]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "BRASHEARS",
          "display_name": "BRASHEARS",
          "target": null
        },
        {
          "id": "SABEY",
          "display_name": "SABEY",
          "target": null
        },
        {
          "id": "TULACH",
          "display_name": "TULACH",
          "target": null
        },
        {
          "id": "HallRender",
          "display_name": "HallRender",
          "target": null
        },
        {
          "id": "HallGrand",
          "display_name": "HallGrand",
          "target": null
        },
        {
          "id": "CVE-2017-0147",
          "display_name": "CVE-2017-0147",
          "target": null
        },
        {
          "id": "SPACESHIP",
          "display_name": "SPACESHIP",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Virus:DOS/Paris",
          "display_name": "Virus:DOS/Paris",
          "target": "/malware/Virus:DOS/Paris"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "659864448507cc1752ff6456",
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 885,
        "FileHash-SHA1": 505,
        "FileHash-SHA256": 5051,
        "URL": 12316,
        "domain": 3944,
        "hostname": 4449,
        "CVE": 2
      },
      "indicator_count": 27152,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597f9c7542ffc6fffaecb30",
      "name": "Injection (RunPE) |Win.Packer - https://myminiweb.com",
      "description": "polypragmonic, dns, win.packer, ig hacking, network bind, tracking",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:44:55.030000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4d4b5e060fb8a606a8",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.403000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6597fa4da16bd99cc5c02528",
      "name": "Botnet Campaign",
      "description": "",
      "modified": "2024-02-04T12:05:19.275000",
      "created": "2024-01-05T12:47:09.406000",
      "tags": [
        "ciphersuite",
        "delete c",
        "search",
        "entries",
        "united",
        "stcalifornia",
        "lmenlo park",
        "ometa platforms",
        "odigicert inc",
        "cndigicert sha2",
        "copy",
        "write",
        "unknown",
        "no expiration",
        "expiration",
        "filehashsha256",
        "hostname",
        "domain",
        "ipv4",
        "url http",
        "url https",
        "filehashmd5",
        "filehashsha1",
        "next",
        "iocs",
        "pdf report",
        "pcap",
        "scan endpoints",
        "win64",
        "stix",
        "openioc",
        "enter",
        "ssl certificate",
        "whois record",
        "apple ios",
        "communicating",
        "referrer",
        "contacted",
        "resolutions",
        "threat roundup",
        "password",
        "networks",
        "hacktool",
        "crypto",
        "twitter",
        "june",
        "probe",
        "ransomware",
        "malware",
        "tsara brashears",
        "botnet campaign",
        "january",
        "content reputation",
        "et"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Content Reputation",
          "display_name": "Content Reputation",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6597f9c7542ffc6fffaecb30",
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2469,
        "FileHash-SHA1": 2295,
        "FileHash-SHA256": 4925,
        "SSLCertFingerprint": 2,
        "URL": 4484,
        "domain": 2044,
        "hostname": 2375,
        "email": 18,
        "CVE": 4
      },
      "indicator_count": 18616,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "805 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "659560d63178b32f07838efb",
      "name": "Covert | Big O Tires active cyber threat | Dark Power | Emotet|",
      "description": "Active, ongoing cyber threat, multiple malicious activities including, network rat, ransomware encryption, social engineering,  spammers, infostealer, botnet activity.\nConsumers may also be contacted by mail or phone or find account seized. I haven't benn able to properly access the magnitude of the issue, there has been at least a handful of customers in good standing , with higher limits on paid of cards that ended up being stolen or according to Big O Representatives 'closed' for unfounded reasons; failure to confirm citizenship, identity, unknown patriot act offences, failure to comply Big O Tires via mail.",
      "modified": "2024-02-02T12:04:41.638000",
      "created": "2024-01-03T13:27:50.685000",
      "tags": [
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "unsafeeval",
        "path",
        "expiressat",
        "auto",
        "wheels online",
        "o tires",
        "shop tires",
        "html info",
        "title shop",
        "tires",
        "meta tags",
        "big o",
        "tires language",
        "name verdict",
        "falcon sandbox",
        "samples",
        "localappdata",
        "json data",
        "temp",
        "getprocaddress",
        "ascii text",
        "windir",
        "file",
        "indicator",
        "mitre att",
        "ck id",
        "factory",
        "hybrid",
        "model",
        "comspec",
        "ssl certificate",
        "whois record",
        "execution",
        "contacted",
        "historical ssl",
        "whois whois",
        "simda http",
        "collections",
        "historical",
        "dropped",
        "backdoor",
        "unknown",
        "united",
        "asnone",
        "show",
        "entries",
        "search",
        "intel",
        "ms windows",
        "pe32",
        "windows nt",
        "copy",
        "write",
        "logic",
        "download",
        "malware",
        "suspicious",
        "next",
        "destination",
        "port",
        "components",
        "globalnpf",
        "china as23724",
        "music",
        "data c",
        "mexico",
        "as15169 google",
        "passive dns",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "win32",
        "united kingdom",
        "explorer",
        "xserver",
        "mtb aug",
        "location united",
        "america asn",
        "open",
        "trojan",
        "worm",
        "dataadobereader",
        "as397240",
        "msie",
        "etpro trojan",
        "virgin islands",
        "script urls",
        "creation date",
        "record value",
        "date",
        "a domains",
        "all search",
        "otx octoseek",
        "url http",
        "http",
        "related nids",
        "pulse http",
        "url https",
        "files location",
        "as20940",
        "aaaa",
        "as2914 ntt",
        "canada unknown",
        "japan unknown",
        "as16625 akamai",
        "domain",
        "hostname",
        "gmt content",
        "gmt report",
        "0 report",
        "sea alt",
        "body",
        "encrypt",
        "social engineering",
        "revenge rat",
        "rat",
        "identity theft",
        "credit card",
        "referrer",
        "communicating",
        "bundled",
        "family",
        "roots",
        "lolkek",
        "tzw variants",
        "quasar rat",
        "dark power",
        "swisyn",
        "wiper",
        "ransomware",
        "cobalt strike",
        "attack",
        "core",
        "emotet",
        "exploit",
        "hacktool",
        "mail spammer",
        "as63949 linode",
        "mtb dec",
        "checkin m1",
        "trojanspy",
        "artro",
        "remote",
        "infostealer"
      ],
      "references": [
        "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Ukraine",
        "Georgia",
        "India",
        "Hong Kong",
        "Canada",
        "China",
        "Indonesia",
        "South Africa",
        "Germany",
        "Slovenia",
        "Mexico",
        "Netherlands",
        "Japan",
        "Spain",
        "Argentina",
        "France",
        "Chile",
        "Italy",
        "Aruba",
        "Switzerland",
        "United Kingdom of Great Britain and Northern Ireland",
        "Denmark",
        "Poland",
        "Colombia",
        "Taiwan",
        "Bulgaria",
        "Austria",
        "Russian Federation",
        "Australia",
        "Philippines",
        "Norway",
        "Sweden"
      ],
      "malware_families": [
        {
          "id": "Trojan:Win32/Comspec",
          "display_name": "Trojan:Win32/Comspec",
          "target": "/malware/Trojan:Win32/Comspec"
        },
        {
          "id": "#Lowfi:SCPT:KiraAsciiObfuscator",
          "display_name": "#Lowfi:SCPT:KiraAsciiObfuscator",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Simda",
          "display_name": "Backdoor:Win32/Simda",
          "target": "/malware/Backdoor:Win32/Simda"
        },
        {
          "id": "Crypt3.BLXP",
          "display_name": "Crypt3.BLXP",
          "target": null
        },
        {
          "id": "PWS:Win32/VB.CU",
          "display_name": "PWS:Win32/VB.CU",
          "target": "/malware/PWS:Win32/VB.CU"
        },
        {
          "id": "Trojan:MSIL/ClipBanker.GB!MTB",
          "display_name": "Trojan:MSIL/ClipBanker.GB!MTB",
          "target": "/malware/Trojan:MSIL/ClipBanker.GB!MTB"
        },
        {
          "id": "Virus:Win32/Floxif.H",
          "display_name": "Virus:Win32/Floxif.H",
          "target": "/malware/Virus:Win32/Floxif.H"
        },
        {
          "id": "Win.Packed.Zusy-7170176-0",
          "display_name": "Win.Packed.Zusy-7170176-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Zbot-9880005-0",
          "display_name": "Win.Trojan.Zbot-9880005-0",
          "target": null
        },
        {
          "id": "'Win32:Trojan-gen",
          "display_name": "'Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
          "display_name": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.B",
          "display_name": "Worm:Win32/Mofksys.B",
          "target": "/malware/Worm:Win32/Mofksys.B"
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Worm:LOGO/Logic",
          "display_name": "Worm:LOGO/Logic",
          "target": "/malware/Worm:LOGO/Logic"
        },
        {
          "id": "ETPro Trojan",
          "display_name": "ETPro Trojan",
          "target": null
        },
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Swisyn",
          "display_name": "TrojanSpy:Win32/Swisyn",
          "target": "/malware/TrojanSpy:Win32/Swisyn"
        },
        {
          "id": "Dark Power",
          "display_name": "Dark Power",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1546.015",
          "name": "Component Object Model Hijacking",
          "display_name": "T1546.015 - Component Object Model Hijacking"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 29,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 560,
        "FileHash-SHA1": 350,
        "FileHash-SHA256": 4371,
        "URL": 8165,
        "domain": 2548,
        "hostname": 2813,
        "CVE": 4,
        "email": 3
      },
      "indicator_count": 18814,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "807 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://nextgen.lloydslistintelligence.com/auth",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://nextgen.lloydslistintelligence.com/auth",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776640529.6220765
}