{
  "type": "URL",
  "indicator": "https://ns2.cloudbox10.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://ns2.cloudbox10.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3753796550,
      "indicator": "https://ns2.cloudbox10.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 20,
      "pulses": [
        {
          "id": "6952fbca42c1b0da7431e6a7",
          "name": "Pegasus / Pegacloud - Infiltration (10-2013 or 2014 to Current/ Ongoing) ",
          "description": "",
          "modified": "2025-12-29T22:08:10.280000",
          "created": "2025-12-29T22:08:10.280000",
          "tags": [
            "backdoor",
            "cyprus",
            "trojan",
            "mtb sep",
            "passive dns",
            "ddos",
            "mtb oct",
            "mtb aug",
            "ipv4 add",
            "smokeloader",
            "trojandropper",
            "extraction",
            "se extraction",
            "failed",
            "data upload",
            "enter s",
            "enter sc",
            "data u",
            "extrac please",
            "prop",
            "extre data",
            "type",
            "extr data",
            "include review",
            "exclude",
            "find s",
            "typ data",
            "source tir",
            "extri",
            "exclude sugges",
            "se type",
            "extra",
            "include data",
            "exclude review",
            "show",
            "showinil tvnes",
            "dom dom",
            "sc cat959",
            "drop",
            "pulse pulses",
            "worm",
            "files show",
            "date hash",
            "avast avg",
            "win32",
            "susp",
            "cyprus showing",
            "entries",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "server",
            "registrar abuse",
            "iana id",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "registrar",
            "se cre",
            "pul use",
            "url list",
            "status http",
            "linkid182227",
            "linkid151642",
            "first",
            "domain list",
            "ii llc",
            "sc data",
            "ukl extract",
            "hiloti style",
            "msle",
            "win3 data",
            "onio",
            "observea",
            "data data",
            "stop data",
            "monitored target",
            "tsara",
            "pegasus",
            "social engineering"
          ],
          "references": [
            "http://fakejuko.site40/",
            "pegacloud.net",
            "IDS: Hiloti Style GET to PHP with invalid terse MSIE headers",
            "IDS: Win32/Ibashade CnC Beacon",
            "IDS: Win32.Scar.hhrw POST",
            "IDS: Trojan.Win32.Cosmu.cdqg Checkin",
            "IDS: OnionDuke CnC Beacon 1",
            "IDS: Observed Suspicious UA (Mozilla/5.0)",
            "IDS: Data POST to an image file (jpg)",
            "cwt-cwtcxp1-dt1.pegacloud.net\t\u2022 fortrea-prod1.pegacloud.net \u2022 ssl-ssldmp-dt1-sftp.pegacloud.net \u2022 13.40.20.221 \u2022 44.215.155.206 \u2022 44.226.180.214"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:WormX-gen [Wrm]",
              "display_name": "Win32:WormX-gen [Wrm]",
              "target": null
            },
            {
              "id": "Worm:Win32:Drolnux",
              "display_name": "Worm:Win32:Drolnux",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": "6877422df67773a07ef450c2",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1630,
            "URL": 4078,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 246,
            "FileHash-SHA256": 2561,
            "CVE": 2,
            "domain": 1307,
            "email": 1
          },
          "indicator_count": 10070,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "111 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68a956460f257cf96c454071",
          "name": "Piracy \u2022 Cloudfront \u2022 Ransom \u2022 Code Overlaps \u2022 Unrelenting attacks.",
          "description": "Indie songwriter , publisher,  promoter, producer & her artists affected by years long copyright infringement , hacking & reputation damage. Website now downed.\n\nBrashears had been involved in music under  pseudonyms for decades as a was songwriter , ghostwriter, sold catalogs , charting singles,  chops was sponsored. In this instance music was grossly pirated. Initially asked for hook rights then told  hook would be used without her permission. Believed dispute resolved verbally + copyright.\n\nTsara learned from an insider/s her hook was pirated & used by artists listed. Modifications  make songs pirated samples.\nBrashears song written in 2010 later vaulted in a  private catalog later released by her artist.  YouTube audio quality tampering on pirated song. \n\nBrashears loved music, not the industry as an artist; preferring business. Always held her  privacy to remain unknown. Tsara lived 10 lives at once.\n\nLikely involves male who contacted her @ by email as mentioned in earlier pulse.\n#trulymissed",
          "modified": "2025-09-21T21:03:28.771000",
          "created": "2025-08-23T05:48:54.534000",
          "tags": [
            "domains",
            "hashes",
            "passive dns",
            "urls",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "a domains",
            "entries",
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "trojanspy",
            "entries http",
            "scans show",
            "search",
            "body",
            "body doctype",
            "dynamicloader",
            "medium",
            "reg add",
            "regsz d",
            "high",
            "windows",
            "audio drivers",
            "write c",
            "virtool",
            "copy",
            "write",
            "june",
            "united",
            "unknown ns",
            "samsara",
            "new york",
            "city ny",
            "ip address",
            "record value",
            "meta",
            "date",
            "music",
            "encrypt",
            "win32",
            "dangeroussig",
            "lowfi",
            "msie",
            "chrome",
            "precondition",
            "trojan",
            "title",
            "canada unknown",
            "unknown cname",
            "domain add",
            "files",
            "location united",
            "hostname add",
            "verdict",
            "domain",
            "files ip",
            "address",
            "asn as13335",
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "file",
            "size",
            "ascii text",
            "pattern match",
            "august",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "roboto",
            "mozilla",
            "contact",
            "t1179 hooking",
            "installs",
            "t1035 service",
            "crlf line",
            "runtime process",
            "malicious",
            "unknown",
            "ssl certificate",
            "defense evasion",
            "amazon02",
            "americachicago",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "found",
            "geo menifee",
            "california",
            "as30148",
            "us note",
            "route",
            "ptr record",
            "information",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "t1082",
            "t1112",
            "modify registry",
            "t1119",
            "t1129",
            "service",
            "capture",
            "url http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "ipv6",
            "ipv4",
            "dicator role",
            "title added",
            "active related",
            "sweden",
            "netherlands",
            "scan",
            "iocs",
            "learn more",
            "types of",
            "kingdom",
            "united kingdom",
            "denmark",
            "icator role",
            "malware attacks",
            "find encrypted",
            "t1021",
            "remote",
            "t1068",
            "ta0043",
            "t1016",
            "discovery",
            "t1221",
            "nobody love",
            "tori",
            "kelley",
            "dj khaled",
            "justin bieber",
            "sophos video",
            "x rack",
            "x frame",
            "october",
            "songculture",
            "song culture",
            "tsara brashears",
            "jess 4",
            "queryfoundry",
            "beyond sampling",
            "pirated",
            "youtube",
            "spotify",
            "twitter",
            "spy",
            "tracking"
          ],
          "references": [
            "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
            "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
            "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)",
            "8-25-220-162-static.reverse.queryfoundry.net",
            "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
            "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
            "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
            "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
            "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
            "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
            "I apologize if you don\u2019t like my background stories",
            "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Nivdort",
              "display_name": "Nivdort",
              "target": null
            },
            {
              "id": "Virtool",
              "display_name": "Virtool",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Trojanspy",
              "display_name": "Trojanspy",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Malware Gen",
              "display_name": "Malware Gen",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1221",
              "name": "Template Injection",
              "display_name": "T1221 - Template Injection"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1593.001",
              "name": "Social Media",
              "display_name": "T1593.001 - Social Media"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [
            "Media",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1833,
            "hostname": 902,
            "domain": 386,
            "FileHash-MD5": 406,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 1437,
            "email": 2,
            "SSLCertFingerprint": 5,
            "CIDR": 2
          },
          "indicator_count": 5375,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "210 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6877422df67773a07ef450c2",
          "name": "Pegasus / Pegacloud - Infiltration",
          "description": "Pegasus IoC\u2019s found in the periphery of research. Appears target contacted a \u2018fake host\u2019 after finding name in multiple highly malicious domains. May have appeared between 12/2013 - 11-2014. Target was contacted by telephone and asked \u2018 have you checked Googled yourself\u2019, to which target answered \u2018Not really\u2019. Target was told \u2018you really should Google yourself\u2019. Target, upset about content clicked and began a takedown effort with host.\n\nThis seems to be at the start of many malicious campaigns. Requires further investigation.",
          "modified": "2025-08-15T05:01:22.570000",
          "created": "2025-07-16T06:09:49.704000",
          "tags": [
            "backdoor",
            "cyprus",
            "trojan",
            "mtb sep",
            "passive dns",
            "ddos",
            "mtb oct",
            "mtb aug",
            "ipv4 add",
            "smokeloader",
            "trojandropper",
            "extraction",
            "se extraction",
            "failed",
            "data upload",
            "enter s",
            "enter sc",
            "data u",
            "extrac please",
            "prop",
            "extre data",
            "type",
            "extr data",
            "include review",
            "exclude",
            "find s",
            "typ data",
            "source tir",
            "extri",
            "exclude sugges",
            "se type",
            "extra",
            "include data",
            "exclude review",
            "show",
            "showinil tvnes",
            "dom dom",
            "sc cat959",
            "drop",
            "pulse pulses",
            "worm",
            "files show",
            "date hash",
            "avast avg",
            "win32",
            "susp",
            "cyprus showing",
            "entries",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "server",
            "registrar abuse",
            "iana id",
            "contact phone",
            "dnssec",
            "domain status",
            "registrar url",
            "registrar whois",
            "date",
            "registrar",
            "se cre",
            "pul use",
            "url list",
            "status http",
            "linkid182227",
            "linkid151642",
            "first",
            "domain list",
            "ii llc",
            "sc data",
            "ukl extract",
            "hiloti style",
            "msle",
            "win3 data",
            "onio",
            "observea",
            "data data",
            "stop data",
            "monitored target",
            "tsara",
            "pegasus",
            "social engineering"
          ],
          "references": [
            "http://fakejuko.site40/",
            "pegacloud.net",
            "IDS: Hiloti Style GET to PHP with invalid terse MSIE headers",
            "IDS: Win32/Ibashade CnC Beacon",
            "IDS: Win32.Scar.hhrw POST",
            "IDS: Trojan.Win32.Cosmu.cdqg Checkin",
            "IDS: OnionDuke CnC Beacon 1",
            "IDS: Observed Suspicious UA (Mozilla/5.0)",
            "IDS: Data POST to an image file (jpg)",
            "cwt-cwtcxp1-dt1.pegacloud.net\t\u2022 fortrea-prod1.pegacloud.net \u2022 ssl-ssldmp-dt1-sftp.pegacloud.net \u2022 13.40.20.221 \u2022 44.215.155.206 \u2022 44.226.180.214"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:WormX-gen [Wrm]",
              "display_name": "Win32:WormX-gen [Wrm]",
              "target": null
            },
            {
              "id": "Worm:Win32:Drolnux",
              "display_name": "Worm:Win32:Drolnux",
              "target": null
            },
            {
              "id": "Pegasus - MOB-S0005",
              "display_name": "Pegasus - MOB-S0005",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1630,
            "URL": 4078,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 246,
            "FileHash-SHA256": 2561,
            "CVE": 2,
            "domain": 1307,
            "email": 1
          },
          "indicator_count": 10070,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "247 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "684a93360163e8802e213158",
          "name": "ELF:Mirai AMAZON-02 - Autonomous System  65.0.0.0/14",
          "description": "ELF:Mirai-BHZ\\ [Trj]\t\n65.0.0.0/14\nAutonomous System Number\n16509\nAutonomous System Label\nAMAZON-02\nRelated to \u2022 103.252.236.26 | \n\u2022 sr2.reliedhosting.com | \n.\u2022 http://planitair.com/ |\n\u2022 bgptools-wildcard-confirmed.acemalibu.com | \n\u2022 https://www.anyxxxtube.net/search-porn/tsara-brashears/ | \t\t\t\n\u2022 static.ads-twitter.com\t\n\u2022 https://twitter.com/PORNO_SEXYBABES\t\n\u2022 analytics.twitter.com\n\u2022 appleupdate.org\n\u2022 apps.apple.com\n\u2022 pin.it |\n\u2022 https://pin.it/ |\n\u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  Critical issue. Cyber weaponry [Unclear] Stealth contractual US cyber defense entity, endless DGA\u2019s. India IP block.\nAdversary named by bupyeongop:\n\ubd80\ud3c9\uc624\ud53c \ucd9c\uc7a5\ub9c8\uc0ac\uc9c0\uc548\ub0b4.COM \ubd80\ud3c9OP (massage service?)\n*DoS with many OTX features",
          "modified": "2025-07-12T07:04:05.635000",
          "created": "2025-06-12T08:43:34.719000",
          "tags": [
            "thumbprint",
            "apnic",
            "apnic whois",
            "database",
            "please",
            "arin whois",
            "north america",
            "caribbean",
            "africa",
            "internet",
            "iana",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "algorithm",
            "v3 serial",
            "number",
            "cbe oglobalsign",
            "r6 alphassl",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "link",
            "search",
            "united",
            "a domains",
            "ip address",
            "creation date",
            "record value",
            "date",
            "showing",
            "india unknown",
            "status",
            "passive dns",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "location india",
            "india asn",
            "as133296 web",
            "dns resolutions"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 27,
            "domain": 2499,
            "hostname": 2651,
            "URL": 10986,
            "CIDR": 2,
            "FileHash-SHA256": 3596,
            "email": 1,
            "FileHash-MD5": 23,
            "CVE": 7
          },
          "indicator_count": 19792,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "281 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4bc7487548e66d6f004",
          "name": "Virus:DOS/Goma",
          "description": "",
          "modified": "2023-12-06T16:43:40.375000",
          "created": "2023-12-06T16:43:40.375000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4b4259cafcf79907b2f",
          "name": "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection and Distribution",
          "description": "",
          "modified": "2023-12-06T16:43:32.408000",
          "created": "2023-12-06T16:43:32.408000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4ac54885a7e866cedca",
          "name": "Elevated Exposure",
          "description": "",
          "modified": "2023-12-06T16:43:24.027000",
          "created": "2023-12-06T16:43:24.027000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4a3ac21d7733c8e1040",
          "name": "Malvertising",
          "description": "",
          "modified": "2023-12-06T16:43:15.632000",
          "created": "2023-12-06T16:43:15.632000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a49b0b6595444a3fdd9a",
          "name": "passkey.tracker.net",
          "description": "",
          "modified": "2023-12-06T16:43:07.031000",
          "created": "2023-12-06T16:43:07.031000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a49207f81d6791c30194",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:58.146000",
          "created": "2023-12-06T16:42:58.146000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4876f8d1d174f717e7b",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:47.591000",
          "created": "2023-12-06T16:42:47.591000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a47e33876ed78e19e1da",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:38.479000",
          "created": "2023-12-06T16:42:38.479000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65035fea189a32c0498667d9",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "Alert: nr-data.net private Apple) iOS Data Collection & Distribution. Automatically flags as an investigation. Tag 'police agency's auto generated. It's possible with Edward Snowden disclosures, it seems unlikely and completely unethical. Extremely graphic adult content with, beacons, tracking Malicious content poses a cyber threat to the general public , iOS privileges, mouse control, phishing, scanning, open registry, service execution, hooking, passkeys and more. \nAppears in a Japanese themed video game and paired targets. Male subject common name have a profession, many with same name. Female target is singular, occupation & professions. Verdict: cyber espionage threat targeting overtly tarnished female. Potential Spreading issues: False distribution by false distributers of targets, hacked, malware singed, intangible downloads.  \nAdult content doesn't portray targets.  Tagging. \n(New-Issued by Cloudflare \nshi(.)cloudflaressl(.)com)",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:32:58.552000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "650361b276a56506778d9231",
          "name": "Virus:DOS/Goma",
          "description": "",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:40:34.562000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6503618b59e32805d0bbead7",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6503618b59e32805d0bbead7",
          "name": "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection and Distribution ",
          "description": "",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:39:55.364000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6503612851bdda6828f488da",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6503612851bdda6828f488da",
          "name": "Elevated Exposure ",
          "description": "",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:38:16.617000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6503610f5f100cd8acad748e",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6503610f5f100cd8acad748e",
          "name": "Malvertising",
          "description": "",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:37:51.730000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65036040d3847fa5df0b8496",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65036040d3847fa5df0b8496",
          "name": "passkey.tracker.net",
          "description": "",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:34:24.232000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65035fea189a32c0498667d9",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65035fee309320821ec82f95",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "Alert: nr-data.net private Apple) iOS Data Collection & Distribution. Automatically flags as an investigation. Tag 'police agency's auto generated. It's possible with Edward Snowden disclosures, it seems unlikely and completely unethical. Extremely graphic adult content with, beacons, tracking Malicious content poses a cyber threat to the general public , iOS privileges, mouse control, phishing, scanning, open registry, service execution, hooking, passkeys and more. \nAppears in a Japanese themed video game and paired targets. Male subject common name have a profession, many with same name. Female target is singular, occupation & professions. Verdict: cyber espionage threat targeting overtly tarnished female. Potential Spreading issues: False distribution by false distributers of targets, hacked, malware singed, intangible downloads.  \nAdult content doesn't portray targets.  Tagging. \n(New-Issued by Cloudflare \nshi(.)cloudflaressl(.)com)",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:33:02.262000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65035fec3cd7bba66ebcef0b",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "Alert: nr-data.net private Apple) iOS Data Collection & Distribution. Automatically flags as an investigation. Tag 'police agency's auto generated. It's possible with Edward Snowden disclosures, it seems unlikely and completely unethical. Extremely graphic adult content with, beacons, tracking Malicious content poses a cyber threat to the general public , iOS privileges, mouse control, phishing, scanning, open registry, service execution, hooking, passkeys and more. \nAppears in a Japanese themed video game and paired targets. Male subject common name have a profession, many with same name. Female target is singular, occupation & professions. Verdict: cyber espionage threat targeting overtly tarnished female. Potential Spreading issues: False distribution by false distributers of targets, hacked, malware singed, intangible downloads.  \nAdult content doesn't portray targets.  Tagging. \n(New-Issued by Cloudflare \nshi(.)cloudflaressl(.)com)",
          "modified": "2023-10-14T17:02:29.483000",
          "created": "2023-09-14T19:33:00.802000",
          "tags": [
            "resolutions",
            "referrer",
            "elevated exposure",
            "malformed links",
            "fraud",
            "abuse",
            "united",
            "cyber threat",
            "phishing",
            "blockchain",
            "covid19",
            "coalition",
            "engineering",
            "facebook",
            "police agency",
            "japan",
            "download",
            "blacklist",
            "site",
            "cisco umbrella",
            "assassin's pride chapter 12 scans",
            "chapter",
            "pride chapter",
            "assassin",
            "read",
            "viewed today",
            "promise",
            "apotheosis",
            "rampage",
            "magister",
            "goma",
            "conan",
            "magician",
            "click",
            "Suricata Alert",
            "Malvertising",
            "ssl certificate",
            "contacted",
            "execution",
            "whois record",
            "pfqlnhi4ex http",
            "pe resource",
            "investigation",
            "team",
            "metro",
            "malicious",
            "social engineering",
            "cyber crime Alina",
            "tracker(.)net",
            "spyware",
            "monitoring",
            "tracking",
            "MITRE ATT&CKS",
            "malware",
            "http://www.evantrah.com/b0ar/ (phishing)",
            "https(:)//b(.)link / infringement (tracking)",
            "37.235.49.205 (scan host)",
            "scan hosts",
            "passkey",
            "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection",
            "nr-data.net",
            "iOS Unlocker",
            "iOS Data Collection",
            "Private Data",
            "distribution",
            "hacking"
          ],
          "references": [
            "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
            "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
            "Data Analysis",
            "Pattern Behavior Research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Japan",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Alina POS",
              "display_name": "Alina POS",
              "target": null
            },
            {
              "id": "Virus:DOS/Goma",
              "display_name": "Virus:DOS/Goma",
              "target": "/malware/Virus:DOS/Goma"
            },
            {
              "id": "DEcovid19",
              "display_name": "DEcovid19",
              "target": null
            },
            {
              "id": "Assassin",
              "display_name": "Assassin",
              "target": null
            },
            {
              "id": "Virus:Win32/Magistr",
              "display_name": "Virus:Win32/Magistr",
              "target": "/malware/Virus:Win32/Magistr"
            },
            {
              "id": "Darktrack RAT",
              "display_name": "Darktrack RAT",
              "target": null
            },
            {
              "id": "B.link/infringement (tracking)",
              "display_name": "B.link/infringement (tracking)",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Trojan.Agent",
              "display_name": "Trojan.Agent",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/MalSpam",
              "display_name": "TrojanDownloader:JS/MalSpam",
              "target": "/malware/TrojanDownloader:JS/MalSpam"
            }
          ],
          "attack_ids": [
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2931,
            "domain": 1095,
            "hostname": 1798,
            "URL": 5593,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "CVE": 1
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "918 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "IDS: Win32.Scar.hhrw POST",
        "IDS: Observed Suspicious UA (Mozilla/5.0)",
        "IDS: OnionDuke CnC Beacon 1",
        "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
        "http://fakejuko.site40/",
        "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
        "http://mangahasu.se/assassins-pride/chapter-12-a-promise-c629157.html?__cf_chl_jschl_tk__=7b4aeee234e6fcb906189a0ee99bff391aedad3f-1591653736-0-ATuxnw3UaJxen2hXCyv",
        "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
        "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet",
        "pegacloud.net",
        "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
        "IDS: Trojan.Win32.Cosmu.cdqg Checkin",
        "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
        "https://hifiporn.pw/xxx/1/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/she-loves-how-i-pound-her-pussy",
        "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
        "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
        "IDS: Win32/Ibashade CnC Beacon",
        "cwt-cwtcxp1-dt1.pegacloud.net\t\u2022 fortrea-prod1.pegacloud.net \u2022 ssl-ssldmp-dt1-sftp.pegacloud.net \u2022 13.40.20.221 \u2022 44.215.155.206 \u2022 44.226.180.214",
        "8-25-220-162-static.reverse.queryfoundry.net",
        "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
        "Data Analysis",
        "IDS: Data POST to an image file (jpg)",
        "IDS: Hiloti Style GET to PHP with invalid terse MSIE headers",
        "Pattern Behavior Research",
        "I apologize if you don\u2019t like my background stories",
        "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Worm:win32:drolnux",
            "Nivdort",
            "Trojanspy:win32/nivdort",
            "Alina pos",
            "Win32:wormx-gen [wrm]",
            "Apnic",
            "B.link/infringement (tracking)",
            "Virus:dos/goma",
            "Assassin",
            "Decovid19",
            "Trojanspy",
            "Pegasus - mob-s0005",
            "Darktrack rat",
            "Evo",
            "Trojandownloader:js/malspam",
            "Virtool",
            "Virus:win32/magistr",
            "Trojan.agent",
            "Malware",
            "Emotet",
            "Malware gen",
            "Ransom"
          ],
          "industries": [
            "Media",
            "Government",
            "Technology",
            "Telecommunications"
          ],
          "unique_indicators": 44792
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/cloudbox10.com",
    "whois": "http://whois.domaintools.com/cloudbox10.com",
    "domain": "cloudbox10.com",
    "hostname": "ns2.cloudbox10.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 20,
  "pulses": [
    {
      "id": "6952fbca42c1b0da7431e6a7",
      "name": "Pegasus / Pegacloud - Infiltration (10-2013 or 2014 to Current/ Ongoing) ",
      "description": "",
      "modified": "2025-12-29T22:08:10.280000",
      "created": "2025-12-29T22:08:10.280000",
      "tags": [
        "backdoor",
        "cyprus",
        "trojan",
        "mtb sep",
        "passive dns",
        "ddos",
        "mtb oct",
        "mtb aug",
        "ipv4 add",
        "smokeloader",
        "trojandropper",
        "extraction",
        "se extraction",
        "failed",
        "data upload",
        "enter s",
        "enter sc",
        "data u",
        "extrac please",
        "prop",
        "extre data",
        "type",
        "extr data",
        "include review",
        "exclude",
        "find s",
        "typ data",
        "source tir",
        "extri",
        "exclude sugges",
        "se type",
        "extra",
        "include data",
        "exclude review",
        "show",
        "showinil tvnes",
        "dom dom",
        "sc cat959",
        "drop",
        "pulse pulses",
        "worm",
        "files show",
        "date hash",
        "avast avg",
        "win32",
        "susp",
        "cyprus showing",
        "entries",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "server",
        "registrar abuse",
        "iana id",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "registrar",
        "se cre",
        "pul use",
        "url list",
        "status http",
        "linkid182227",
        "linkid151642",
        "first",
        "domain list",
        "ii llc",
        "sc data",
        "ukl extract",
        "hiloti style",
        "msle",
        "win3 data",
        "onio",
        "observea",
        "data data",
        "stop data",
        "monitored target",
        "tsara",
        "pegasus",
        "social engineering"
      ],
      "references": [
        "http://fakejuko.site40/",
        "pegacloud.net",
        "IDS: Hiloti Style GET to PHP with invalid terse MSIE headers",
        "IDS: Win32/Ibashade CnC Beacon",
        "IDS: Win32.Scar.hhrw POST",
        "IDS: Trojan.Win32.Cosmu.cdqg Checkin",
        "IDS: OnionDuke CnC Beacon 1",
        "IDS: Observed Suspicious UA (Mozilla/5.0)",
        "IDS: Data POST to an image file (jpg)",
        "cwt-cwtcxp1-dt1.pegacloud.net\t\u2022 fortrea-prod1.pegacloud.net \u2022 ssl-ssldmp-dt1-sftp.pegacloud.net \u2022 13.40.20.221 \u2022 44.215.155.206 \u2022 44.226.180.214"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:WormX-gen [Wrm]",
          "display_name": "Win32:WormX-gen [Wrm]",
          "target": null
        },
        {
          "id": "Worm:Win32:Drolnux",
          "display_name": "Worm:Win32:Drolnux",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": "6877422df67773a07ef450c2",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1630,
        "URL": 4078,
        "FileHash-MD5": 245,
        "FileHash-SHA1": 246,
        "FileHash-SHA256": 2561,
        "CVE": 2,
        "domain": 1307,
        "email": 1
      },
      "indicator_count": 10070,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "111 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68a956460f257cf96c454071",
      "name": "Piracy \u2022 Cloudfront \u2022 Ransom \u2022 Code Overlaps \u2022 Unrelenting attacks.",
      "description": "Indie songwriter , publisher,  promoter, producer & her artists affected by years long copyright infringement , hacking & reputation damage. Website now downed.\n\nBrashears had been involved in music under  pseudonyms for decades as a was songwriter , ghostwriter, sold catalogs , charting singles,  chops was sponsored. In this instance music was grossly pirated. Initially asked for hook rights then told  hook would be used without her permission. Believed dispute resolved verbally + copyright.\n\nTsara learned from an insider/s her hook was pirated & used by artists listed. Modifications  make songs pirated samples.\nBrashears song written in 2010 later vaulted in a  private catalog later released by her artist.  YouTube audio quality tampering on pirated song. \n\nBrashears loved music, not the industry as an artist; preferring business. Always held her  privacy to remain unknown. Tsara lived 10 lives at once.\n\nLikely involves male who contacted her @ by email as mentioned in earlier pulse.\n#trulymissed",
      "modified": "2025-09-21T21:03:28.771000",
      "created": "2025-08-23T05:48:54.534000",
      "tags": [
        "domains",
        "hashes",
        "passive dns",
        "urls",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "a domains",
        "entries",
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "trojanspy",
        "entries http",
        "scans show",
        "search",
        "body",
        "body doctype",
        "dynamicloader",
        "medium",
        "reg add",
        "regsz d",
        "high",
        "windows",
        "audio drivers",
        "write c",
        "virtool",
        "copy",
        "write",
        "june",
        "united",
        "unknown ns",
        "samsara",
        "new york",
        "city ny",
        "ip address",
        "record value",
        "meta",
        "date",
        "music",
        "encrypt",
        "win32",
        "dangeroussig",
        "lowfi",
        "msie",
        "chrome",
        "precondition",
        "trojan",
        "title",
        "canada unknown",
        "unknown cname",
        "domain add",
        "files",
        "location united",
        "hostname add",
        "verdict",
        "domain",
        "files ip",
        "address",
        "asn as13335",
        "hash avast",
        "avg clamav",
        "msdefender feb",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "file",
        "size",
        "ascii text",
        "pattern match",
        "august",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "roboto",
        "mozilla",
        "contact",
        "t1179 hooking",
        "installs",
        "t1035 service",
        "crlf line",
        "runtime process",
        "malicious",
        "unknown",
        "ssl certificate",
        "defense evasion",
        "amazon02",
        "americachicago",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "found",
        "geo menifee",
        "california",
        "as30148",
        "us note",
        "route",
        "ptr record",
        "information",
        "t1053",
        "taskjob",
        "t1055",
        "injection",
        "t1082",
        "t1112",
        "modify registry",
        "t1119",
        "t1129",
        "service",
        "capture",
        "url http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "ipv6",
        "ipv4",
        "dicator role",
        "title added",
        "active related",
        "sweden",
        "netherlands",
        "scan",
        "iocs",
        "learn more",
        "types of",
        "kingdom",
        "united kingdom",
        "denmark",
        "icator role",
        "malware attacks",
        "find encrypted",
        "t1021",
        "remote",
        "t1068",
        "ta0043",
        "t1016",
        "discovery",
        "t1221",
        "nobody love",
        "tori",
        "kelley",
        "dj khaled",
        "justin bieber",
        "sophos video",
        "x rack",
        "x frame",
        "october",
        "songculture",
        "song culture",
        "tsara brashears",
        "jess 4",
        "queryfoundry",
        "beyond sampling",
        "pirated",
        "youtube",
        "spotify",
        "twitter",
        "spy",
        "tracking"
      ],
      "references": [
        "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
        "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
        "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)",
        "8-25-220-162-static.reverse.queryfoundry.net",
        "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
        "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
        "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
        "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
        "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
        "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
        "I apologize if you don\u2019t like my background stories",
        "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Nivdort",
          "display_name": "Nivdort",
          "target": null
        },
        {
          "id": "Virtool",
          "display_name": "Virtool",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Trojanspy",
          "display_name": "Trojanspy",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        },
        {
          "id": "Malware Gen",
          "display_name": "Malware Gen",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1221",
          "name": "Template Injection",
          "display_name": "T1221 - Template Injection"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1593.001",
          "name": "Social Media",
          "display_name": "T1593.001 - Social Media"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [
        "Media",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1833,
        "hostname": 902,
        "domain": 386,
        "FileHash-MD5": 406,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 1437,
        "email": 2,
        "SSLCertFingerprint": 5,
        "CIDR": 2
      },
      "indicator_count": 5375,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 144,
      "modified_text": "210 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6877422df67773a07ef450c2",
      "name": "Pegasus / Pegacloud - Infiltration",
      "description": "Pegasus IoC\u2019s found in the periphery of research. Appears target contacted a \u2018fake host\u2019 after finding name in multiple highly malicious domains. May have appeared between 12/2013 - 11-2014. Target was contacted by telephone and asked \u2018 have you checked Googled yourself\u2019, to which target answered \u2018Not really\u2019. Target was told \u2018you really should Google yourself\u2019. Target, upset about content clicked and began a takedown effort with host.\n\nThis seems to be at the start of many malicious campaigns. Requires further investigation.",
      "modified": "2025-08-15T05:01:22.570000",
      "created": "2025-07-16T06:09:49.704000",
      "tags": [
        "backdoor",
        "cyprus",
        "trojan",
        "mtb sep",
        "passive dns",
        "ddos",
        "mtb oct",
        "mtb aug",
        "ipv4 add",
        "smokeloader",
        "trojandropper",
        "extraction",
        "se extraction",
        "failed",
        "data upload",
        "enter s",
        "enter sc",
        "data u",
        "extrac please",
        "prop",
        "extre data",
        "type",
        "extr data",
        "include review",
        "exclude",
        "find s",
        "typ data",
        "source tir",
        "extri",
        "exclude sugges",
        "se type",
        "extra",
        "include data",
        "exclude review",
        "show",
        "showinil tvnes",
        "dom dom",
        "sc cat959",
        "drop",
        "pulse pulses",
        "worm",
        "files show",
        "date hash",
        "avast avg",
        "win32",
        "susp",
        "cyprus showing",
        "entries",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "server",
        "registrar abuse",
        "iana id",
        "contact phone",
        "dnssec",
        "domain status",
        "registrar url",
        "registrar whois",
        "date",
        "registrar",
        "se cre",
        "pul use",
        "url list",
        "status http",
        "linkid182227",
        "linkid151642",
        "first",
        "domain list",
        "ii llc",
        "sc data",
        "ukl extract",
        "hiloti style",
        "msle",
        "win3 data",
        "onio",
        "observea",
        "data data",
        "stop data",
        "monitored target",
        "tsara",
        "pegasus",
        "social engineering"
      ],
      "references": [
        "http://fakejuko.site40/",
        "pegacloud.net",
        "IDS: Hiloti Style GET to PHP with invalid terse MSIE headers",
        "IDS: Win32/Ibashade CnC Beacon",
        "IDS: Win32.Scar.hhrw POST",
        "IDS: Trojan.Win32.Cosmu.cdqg Checkin",
        "IDS: OnionDuke CnC Beacon 1",
        "IDS: Observed Suspicious UA (Mozilla/5.0)",
        "IDS: Data POST to an image file (jpg)",
        "cwt-cwtcxp1-dt1.pegacloud.net\t\u2022 fortrea-prod1.pegacloud.net \u2022 ssl-ssldmp-dt1-sftp.pegacloud.net \u2022 13.40.20.221 \u2022 44.215.155.206 \u2022 44.226.180.214"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:WormX-gen [Wrm]",
          "display_name": "Win32:WormX-gen [Wrm]",
          "target": null
        },
        {
          "id": "Worm:Win32:Drolnux",
          "display_name": "Worm:Win32:Drolnux",
          "target": null
        },
        {
          "id": "Pegasus - MOB-S0005",
          "display_name": "Pegasus - MOB-S0005",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1630,
        "URL": 4078,
        "FileHash-MD5": 245,
        "FileHash-SHA1": 246,
        "FileHash-SHA256": 2561,
        "CVE": 2,
        "domain": 1307,
        "email": 1
      },
      "indicator_count": 10070,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "247 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "684a93360163e8802e213158",
      "name": "ELF:Mirai AMAZON-02 - Autonomous System  65.0.0.0/14",
      "description": "ELF:Mirai-BHZ\\ [Trj]\t\n65.0.0.0/14\nAutonomous System Number\n16509\nAutonomous System Label\nAMAZON-02\nRelated to \u2022 103.252.236.26 | \n\u2022 sr2.reliedhosting.com | \n.\u2022 http://planitair.com/ |\n\u2022 bgptools-wildcard-confirmed.acemalibu.com | \n\u2022 https://www.anyxxxtube.net/search-porn/tsara-brashears/ | \t\t\t\n\u2022 static.ads-twitter.com\t\n\u2022 https://twitter.com/PORNO_SEXYBABES\t\n\u2022 analytics.twitter.com\n\u2022 appleupdate.org\n\u2022 apps.apple.com\n\u2022 pin.it |\n\u2022 https://pin.it/ |\n\u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  Critical issue. Cyber weaponry [Unclear] Stealth contractual US cyber defense entity, endless DGA\u2019s. India IP block.\nAdversary named by bupyeongop:\n\ubd80\ud3c9\uc624\ud53c \ucd9c\uc7a5\ub9c8\uc0ac\uc9c0\uc548\ub0b4.COM \ubd80\ud3c9OP (massage service?)\n*DoS with many OTX features",
      "modified": "2025-07-12T07:04:05.635000",
      "created": "2025-06-12T08:43:34.719000",
      "tags": [
        "thumbprint",
        "apnic",
        "apnic whois",
        "database",
        "please",
        "arin whois",
        "north america",
        "caribbean",
        "africa",
        "internet",
        "iana",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "whois server",
        "algorithm",
        "v3 serial",
        "number",
        "cbe oglobalsign",
        "r6 alphassl",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "link",
        "search",
        "united",
        "a domains",
        "ip address",
        "creation date",
        "record value",
        "date",
        "showing",
        "india unknown",
        "status",
        "passive dns",
        "ipv4 add",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "location india",
        "india asn",
        "as133296 web",
        "dns resolutions"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 27,
        "domain": 2499,
        "hostname": 2651,
        "URL": 10986,
        "CIDR": 2,
        "FileHash-SHA256": 3596,
        "email": 1,
        "FileHash-MD5": 23,
        "CVE": 7
      },
      "indicator_count": 19792,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "281 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4bc7487548e66d6f004",
      "name": "Virus:DOS/Goma",
      "description": "",
      "modified": "2023-12-06T16:43:40.375000",
      "created": "2023-12-06T16:43:40.375000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4b4259cafcf79907b2f",
      "name": "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection and Distribution",
      "description": "",
      "modified": "2023-12-06T16:43:32.408000",
      "created": "2023-12-06T16:43:32.408000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4ac54885a7e866cedca",
      "name": "Elevated Exposure",
      "description": "",
      "modified": "2023-12-06T16:43:24.027000",
      "created": "2023-12-06T16:43:24.027000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a4a3ac21d7733c8e1040",
      "name": "Malvertising",
      "description": "",
      "modified": "2023-12-06T16:43:15.632000",
      "created": "2023-12-06T16:43:15.632000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a49b0b6595444a3fdd9a",
      "name": "passkey.tracker.net",
      "description": "",
      "modified": "2023-12-06T16:43:07.031000",
      "created": "2023-12-06T16:43:07.031000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a49207f81d6791c30194",
      "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
      "description": "",
      "modified": "2023-12-06T16:42:58.146000",
      "created": "2023-12-06T16:42:58.146000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 2931,
        "hostname": 1798,
        "FileHash-MD5": 23,
        "FileHash-SHA1": 17,
        "URL": 5593,
        "domain": 1095
      },
      "indicator_count": 11458,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://ns2.cloudbox10.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://ns2.cloudbox10.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638895.38026
}