{
  "type": "URL",
  "indicator": "https://platform-akam.linkedin.cn",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://platform-akam.linkedin.cn",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4113819450,
      "indicator": "https://platform-akam.linkedin.cn",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "6958780c8479a9d69920c3d8",
          "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
          "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
          "modified": "2026-02-02T01:02:46.327000",
          "created": "2026-01-03T01:59:40.530000",
          "tags": [
            "united",
            "moved",
            "title",
            "passive dns",
            "ipv4 add",
            "urls",
            "files",
            "hosting",
            "reverse dns",
            "location united",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "read c",
            "create c",
            "medium",
            "search",
            "memcommit",
            "high",
            "checks",
            "windows",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "local",
            "ref b",
            "wed may",
            "backdoor",
            "mtb aug",
            "next associated",
            "mtb dec",
            "twitter",
            "smoke loader",
            "malware",
            "virtool",
            "hacktool",
            "data upload",
            "present dec",
            "mtb apr",
            "win32",
            "trojan",
            "worm",
            "lowfi",
            "cybota",
            "expiration date",
            "name servers",
            "ipv4",
            "url analysis",
            "port",
            "destination",
            "telnet login",
            "bad login",
            "gpl telnet",
            "suspicious path",
            "busybox",
            "tcp syn",
            "et telnet",
            "path",
            "mirai",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "america",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "learn",
            "t1179 hooking",
            "installs",
            "t1035 service",
            "adversaries",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "y013",
            "flag",
            "span",
            "accept",
            "core",
            "february",
            "hybrid",
            "malicious",
            "general",
            "click",
            "strings",
            "roboto",
            "next",
            "usa windows",
            "finished",
            "queueprogress",
            "timestamp input",
            "threat level",
            "october",
            "september",
            "hwp support",
            "fresh",
            "win64",
            "khtml",
            "gecko",
            "brand",
            "microsoft edge",
            "programfiles",
            "comspec",
            "model",
            "iframe",
            "form",
            "listeners",
            "initial access",
            "t1590 gather",
            "victim network",
            "ssl certificate",
            "quasi government",
            "jeffrey reimer",
            "palantir",
            "Regis university",
            "otx hp",
            "apple",
            "pegasus",
            "h5 data center",
            "florence colorado",
            "brian sabey",
            "target : Tsara Brasheaers",
            "aig",
            "industry and commerce",
            "united states",
            "State of Colorado.",
            "date",
            "status",
            "domain",
            "hostname add",
            "pulse pulses",
            "files ip",
            "address",
            "url https",
            "url http",
            "hostname",
            "show",
            "type indicator",
            "source hostname",
            "entries",
            "Prometheus Intelligence Technology",
            "pulse submit",
            "america flag",
            "body",
            "dynamicloader",
            "microsoft azure",
            "tls issuing",
            "named pipe",
            "json",
            "ascii text",
            "lredmond",
            "Apple",
            "Telnet",
            "BusyBox",
            "Pegasus",
            "Colorado State Fixer: Christopher P. Ahmann",
            "Hijacker: Brian Sabey",
            "For: Concentra",
            "Protecting Assaulter: Jeffrey Reimer",
            "For: AIG",
            "For Industry and Commerce",
            "For: Quasi Government",
            "For: Workers Compensation",
            "Authorities",
            "Law Enforcement Dark",
            "Silencing",
            "Tampering with a Victim",
            "Meta",
            "Palantir",
            "Google",
            "Bing",
            "Microsoft",
            "ColoCrossing",
            "Associates",
            "hit men"
          ],
          "references": [
            "ET Telnet |  https://www.colocrossing.com | velocity servers",
            "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
            "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
            "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
            "(legitimate services will remain up-and-running usually) High |  ID dead_host",
            "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
            "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
            "Yara Detections is__elf",
            "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
            "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
            "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
            "https://www.colocrossing.com/",
            "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
            "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
            "104.21.51.140, 172.67.181.41",
            "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
            "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
            "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
            "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
            "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
            "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
            "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
            "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
            "This is hard to comprehend or put into indelible words."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "HackTool:MSIL/Boilod.C!bit",
              "display_name": "HackTool:MSIL/Boilod.C!bit",
              "target": "/malware/HackTool:MSIL/Boilod.C!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1204.002",
              "name": "Malicious File",
              "display_name": "T1204.002 - Malicious File"
            },
            {
              "id": "T1462",
              "name": "Malicious Software Development Tools",
              "display_name": "T1462 - Malicious Software Development Tools"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Technology",
            "Healthcare",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6390,
            "domain": 723,
            "hostname": 1978,
            "FileHash-SHA256": 1912,
            "FileHash-MD5": 410,
            "FileHash-SHA1": 306,
            "email": 3,
            "SSLCertFingerprint": 28,
            "CVE": 3
          },
          "indicator_count": 11753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "77 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "690b39b3cf3cb86d14ccd811",
          "name": "VirusTotal Graph - 11.05.25 - UAlberta Insiders",
          "description": "I was just looking for a Dark Gate and came across this...hmmmm....\nI enriched on import, vet out and refer to virustotal graph referenced.\nRefer to References below - am unable to get them in. Profiled student group (OSINT) - unclear if potential allies or not.",
          "modified": "2025-12-05T11:00:41.797000",
          "created": "2025-11-05T11:49:07.495000",
          "tags": [
            "chadsualberta"
          ],
          "references": [
            "https://www.virustotal.com/graph/embed/ge8fc36dfbe1c48cab7c6efb0398cc30cb5aaebda2bf24123bb6a282436cc5bab?theme=dark",
            "https://www.filescan.io/uploads/690baf5e85b61a93a738d0d5/reports/ecaf45a2-956f-4d4e-8ebd-00813d966614/ioc",
            "ThreatZone - Malicious",
            "https://tria.ge/251105-yvvzgssldn",
            "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495",
            "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495/690baf2999a0659ae9046188",
            "Email: chads@ualberta[.]ca"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 120,
            "FileHash-SHA1": 120,
            "FileHash-SHA256": 1809,
            "URL": 603,
            "domain": 396,
            "hostname": 514
          },
          "indicator_count": 3562,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "135 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d3699de4af81580993ca94",
          "name": "Bloat-A Checkin | AutoRun | server.de \u2022 tvapp-server.de",
          "description": "Downloads to targeted person\u2019s networks, Smart TV, and other devices , Win.Trojan.Emotet-9850453-0\n,\nWorm:Win32/AutoRun!atmn\nIDS Detections\nW32.Bloat-A Checkin\nSuspicious Dynamic DNS Update Request\nSuspicious User-Agent (MyApp)\nDYNAMIC_DNS Query to Abused Domain *.mooo.com\nYara Detections\nZeppelin_30\n, \nZeppelin_19\n, \nConventionEngine_Term_Desktop\n, \nConventionEngine_Term_Users\n, \nDelphi\nAlerts:\nprocmem_yara\nprocess_creation_suspicious_location\nmultiple_useragents\nnetwork_bind\nnetwork_cnc_https_socialmedia\npersistence_autorun\ncape_detected_threat\nnetwork_cnc_https_socialmedia\nantivm_generic_disk\ninfostealer_cookies\ninfostealer_keylog ,\nFile Win.Trojan.Emotet-9850453-0\n,\nWorm:Win32/AutoRun!atmn\nIDS Detections :\nW32.Bloat-A Checkin |\nSuspicious Dynamic DNS Update Request |\nSuspicious User-Agent (MyApp) |\nDYNAMIC_DNS Query to Abused Domain | *.mooo.com\nBobSoft Mini Delphi -> BoB / BobSoft",
          "modified": "2025-10-24T02:02:14.846000",
          "created": "2025-09-24T03:46:37.702000",
          "tags": [
            "united",
            "present sep",
            "passive dns",
            "ip address",
            "entries",
            "present may",
            "body doctype",
            "html public",
            "ietfdtd html",
            "found title",
            "germany unknown",
            "next associated",
            "gmt content",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "worm",
            "title",
            "date",
            "accept",
            "read c",
            "search",
            "show",
            "rgba",
            "unicode",
            "medium",
            "memcommit",
            "crlf line",
            "yara detections",
            "high",
            "next",
            "dock",
            "write",
            "execution",
            "copy",
            "name servers",
            "arial",
            "present jun",
            "domain",
            "trojan",
            "meta",
            "establishes",
            "myapp",
            "showing",
            "yara rule",
            "delphi",
            "guard",
            "malware",
            "suspicious",
            "unknown",
            "ids detections",
            "dns update",
            "useragent",
            "zeppelin30",
            "zeppelin19",
            "delphi alerts",
            "contacted"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2471,
            "domain": 248,
            "hostname": 929,
            "FileHash-SHA256": 419,
            "FileHash-MD5": 181,
            "FileHash-SHA1": 157,
            "email": 1,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 4408,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "178 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68923ea4efbf58b7ba48acec",
          "name": "Hosted App",
          "description": "",
          "modified": "2025-09-04T16:03:17.037000",
          "created": "2025-08-05T17:25:56.454000",
          "tags": [
            "issuer wr3",
            "log id",
            "gmtn",
            "abn timestamp",
            "ad180b80",
            "full name",
            "extensionsstr",
            "web server",
            "ca issuers",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "spawns",
            "mitre att",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "ascii text",
            "pattern match",
            "show technique",
            "date",
            "format",
            "august",
            "hybrid",
            "local",
            "path",
            "click",
            "strings",
            "flag",
            "usa windows",
            "hwp support",
            "march",
            "december",
            "united",
            "markmonitor",
            "overview dns",
            "requests domain",
            "country",
            "contacted hosts",
            "ip address",
            "process details",
            "t1179 hooking",
            "access windows",
            "installs",
            "control att",
            "found",
            "development att",
            "name server",
            "show process",
            "programfiles",
            "command decode",
            "suricata ipv4",
            "ck matrix",
            "comspec",
            "model",
            "general",
            "dynamicloader",
            "unknown",
            "as16509",
            "whitelisted",
            "medium",
            "write c",
            "as15169",
            "search",
            "high",
            "write",
            "android",
            "malware",
            "copy",
            "next",
            "formbook cnc",
            "checkin",
            "entries",
            "passive dns",
            "next associated",
            "site",
            "neue",
            "ipv4",
            "pulse pulses",
            "exploit",
            "trojan",
            "virtool",
            "body",
            "refer",
            "present dec",
            "epub",
            "present jan",
            "present nov",
            "present oct",
            "showing",
            "urls show",
            "win32",
            "win64",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "prefetch8",
            "localappdata",
            "prefetch1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3409,
            "hostname": 4127,
            "URL": 8408,
            "SSLCertFingerprint": 9,
            "FileHash-SHA256": 1175,
            "FileHash-MD5": 144,
            "FileHash-SHA1": 134,
            "CVE": 2
          },
          "indicator_count": 17408,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "227 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "ThreatZone - Malicious",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "Email: chads@ualberta[.]ca",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "https://www.filescan.io/uploads/690baf5e85b61a93a738d0d5/reports/ecaf45a2-956f-4d4e-8ebd-00813d966614/ioc",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
        "This is hard to comprehend or put into indelible words.",
        "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495/690baf2999a0659ae9046188",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "https://tria.ge/251105-yvvzgssldn",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "https://www.colocrossing.com/",
        "104.21.51.140, 172.67.181.41",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "https://www.virustotal.com/graph/embed/ge8fc36dfbe1c48cab7c6efb0398cc30cb5aaebda2bf24123bb6a282436cc5bab?theme=dark",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "Yara Detections is__elf"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Mirai",
            "Unix.trojan.darknexus-7679166-0",
            "Hacktool:msil/boilod.c!bit"
          ],
          "industries": [
            "Insurance",
            "Civil society",
            "Education",
            "Technology",
            "Healthcare"
          ],
          "unique_indicators": 37325
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/linkedin.cn",
    "whois": "http://whois.domaintools.com/linkedin.cn",
    "domain": "linkedin.cn",
    "hostname": "platform-akam.linkedin.cn"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "6958780c8479a9d69920c3d8",
      "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
      "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
      "modified": "2026-02-02T01:02:46.327000",
      "created": "2026-01-03T01:59:40.530000",
      "tags": [
        "united",
        "moved",
        "title",
        "passive dns",
        "ipv4 add",
        "urls",
        "files",
        "hosting",
        "reverse dns",
        "location united",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "read c",
        "create c",
        "medium",
        "search",
        "memcommit",
        "high",
        "checks",
        "windows",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "local",
        "ref b",
        "wed may",
        "backdoor",
        "mtb aug",
        "next associated",
        "mtb dec",
        "twitter",
        "smoke loader",
        "malware",
        "virtool",
        "hacktool",
        "data upload",
        "present dec",
        "mtb apr",
        "win32",
        "trojan",
        "worm",
        "lowfi",
        "cybota",
        "expiration date",
        "name servers",
        "ipv4",
        "url analysis",
        "port",
        "destination",
        "telnet login",
        "bad login",
        "gpl telnet",
        "suspicious path",
        "busybox",
        "tcp syn",
        "et telnet",
        "path",
        "mirai",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "america",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "learn",
        "t1179 hooking",
        "installs",
        "t1035 service",
        "adversaries",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "y013",
        "flag",
        "span",
        "accept",
        "core",
        "february",
        "hybrid",
        "malicious",
        "general",
        "click",
        "strings",
        "roboto",
        "next",
        "usa windows",
        "finished",
        "queueprogress",
        "timestamp input",
        "threat level",
        "october",
        "september",
        "hwp support",
        "fresh",
        "win64",
        "khtml",
        "gecko",
        "brand",
        "microsoft edge",
        "programfiles",
        "comspec",
        "model",
        "iframe",
        "form",
        "listeners",
        "initial access",
        "t1590 gather",
        "victim network",
        "ssl certificate",
        "quasi government",
        "jeffrey reimer",
        "palantir",
        "Regis university",
        "otx hp",
        "apple",
        "pegasus",
        "h5 data center",
        "florence colorado",
        "brian sabey",
        "target : Tsara Brasheaers",
        "aig",
        "industry and commerce",
        "united states",
        "State of Colorado.",
        "date",
        "status",
        "domain",
        "hostname add",
        "pulse pulses",
        "files ip",
        "address",
        "url https",
        "url http",
        "hostname",
        "show",
        "type indicator",
        "source hostname",
        "entries",
        "Prometheus Intelligence Technology",
        "pulse submit",
        "america flag",
        "body",
        "dynamicloader",
        "microsoft azure",
        "tls issuing",
        "named pipe",
        "json",
        "ascii text",
        "lredmond",
        "Apple",
        "Telnet",
        "BusyBox",
        "Pegasus",
        "Colorado State Fixer: Christopher P. Ahmann",
        "Hijacker: Brian Sabey",
        "For: Concentra",
        "Protecting Assaulter: Jeffrey Reimer",
        "For: AIG",
        "For Industry and Commerce",
        "For: Quasi Government",
        "For: Workers Compensation",
        "Authorities",
        "Law Enforcement Dark",
        "Silencing",
        "Tampering with a Victim",
        "Meta",
        "Palantir",
        "Google",
        "Bing",
        "Microsoft",
        "ColoCrossing",
        "Associates",
        "hit men"
      ],
      "references": [
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "Yara Detections is__elf",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "https://www.colocrossing.com/",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "104.21.51.140, 172.67.181.41",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "This is hard to comprehend or put into indelible words."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "HackTool:MSIL/Boilod.C!bit",
          "display_name": "HackTool:MSIL/Boilod.C!bit",
          "target": "/malware/HackTool:MSIL/Boilod.C!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1204.002",
          "name": "Malicious File",
          "display_name": "T1204.002 - Malicious File"
        },
        {
          "id": "T1462",
          "name": "Malicious Software Development Tools",
          "display_name": "T1462 - Malicious Software Development Tools"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Technology",
        "Healthcare",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6390,
        "domain": 723,
        "hostname": 1978,
        "FileHash-SHA256": 1912,
        "FileHash-MD5": 410,
        "FileHash-SHA1": 306,
        "email": 3,
        "SSLCertFingerprint": 28,
        "CVE": 3
      },
      "indicator_count": 11753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "77 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "690b39b3cf3cb86d14ccd811",
      "name": "VirusTotal Graph - 11.05.25 - UAlberta Insiders",
      "description": "I was just looking for a Dark Gate and came across this...hmmmm....\nI enriched on import, vet out and refer to virustotal graph referenced.\nRefer to References below - am unable to get them in. Profiled student group (OSINT) - unclear if potential allies or not.",
      "modified": "2025-12-05T11:00:41.797000",
      "created": "2025-11-05T11:49:07.495000",
      "tags": [
        "chadsualberta"
      ],
      "references": [
        "https://www.virustotal.com/graph/embed/ge8fc36dfbe1c48cab7c6efb0398cc30cb5aaebda2bf24123bb6a282436cc5bab?theme=dark",
        "https://www.filescan.io/uploads/690baf5e85b61a93a738d0d5/reports/ecaf45a2-956f-4d4e-8ebd-00813d966614/ioc",
        "ThreatZone - Malicious",
        "https://tria.ge/251105-yvvzgssldn",
        "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495",
        "https://hybrid-analysis.com/sample/30df68083e80263898ac56e2ef458811cec5fa73b92ad60f14b96ce676a11495/690baf2999a0659ae9046188",
        "Email: chads@ualberta[.]ca"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 120,
        "FileHash-SHA1": 120,
        "FileHash-SHA256": 1809,
        "URL": 603,
        "domain": 396,
        "hostname": 514
      },
      "indicator_count": 3562,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "135 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d3699de4af81580993ca94",
      "name": "Bloat-A Checkin | AutoRun | server.de \u2022 tvapp-server.de",
      "description": "Downloads to targeted person\u2019s networks, Smart TV, and other devices , Win.Trojan.Emotet-9850453-0\n,\nWorm:Win32/AutoRun!atmn\nIDS Detections\nW32.Bloat-A Checkin\nSuspicious Dynamic DNS Update Request\nSuspicious User-Agent (MyApp)\nDYNAMIC_DNS Query to Abused Domain *.mooo.com\nYara Detections\nZeppelin_30\n, \nZeppelin_19\n, \nConventionEngine_Term_Desktop\n, \nConventionEngine_Term_Users\n, \nDelphi\nAlerts:\nprocmem_yara\nprocess_creation_suspicious_location\nmultiple_useragents\nnetwork_bind\nnetwork_cnc_https_socialmedia\npersistence_autorun\ncape_detected_threat\nnetwork_cnc_https_socialmedia\nantivm_generic_disk\ninfostealer_cookies\ninfostealer_keylog ,\nFile Win.Trojan.Emotet-9850453-0\n,\nWorm:Win32/AutoRun!atmn\nIDS Detections :\nW32.Bloat-A Checkin |\nSuspicious Dynamic DNS Update Request |\nSuspicious User-Agent (MyApp) |\nDYNAMIC_DNS Query to Abused Domain | *.mooo.com\nBobSoft Mini Delphi -> BoB / BobSoft",
      "modified": "2025-10-24T02:02:14.846000",
      "created": "2025-09-24T03:46:37.702000",
      "tags": [
        "united",
        "present sep",
        "passive dns",
        "ip address",
        "entries",
        "present may",
        "body doctype",
        "html public",
        "ietfdtd html",
        "found title",
        "germany unknown",
        "next associated",
        "gmt content",
        "ipv4 add",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "worm",
        "title",
        "date",
        "accept",
        "read c",
        "search",
        "show",
        "rgba",
        "unicode",
        "medium",
        "memcommit",
        "crlf line",
        "yara detections",
        "high",
        "next",
        "dock",
        "write",
        "execution",
        "copy",
        "name servers",
        "arial",
        "present jun",
        "domain",
        "trojan",
        "meta",
        "establishes",
        "myapp",
        "showing",
        "yara rule",
        "delphi",
        "guard",
        "malware",
        "suspicious",
        "unknown",
        "ids detections",
        "dns update",
        "useragent",
        "zeppelin30",
        "zeppelin19",
        "delphi alerts",
        "contacted"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2471,
        "domain": 248,
        "hostname": 929,
        "FileHash-SHA256": 419,
        "FileHash-MD5": 181,
        "FileHash-SHA1": 157,
        "email": 1,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 4408,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "178 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68923ea4efbf58b7ba48acec",
      "name": "Hosted App",
      "description": "",
      "modified": "2025-09-04T16:03:17.037000",
      "created": "2025-08-05T17:25:56.454000",
      "tags": [
        "issuer wr3",
        "log id",
        "gmtn",
        "abn timestamp",
        "ad180b80",
        "full name",
        "extensionsstr",
        "web server",
        "ca issuers",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "spawns",
        "mitre att",
        "sha1",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "ascii text",
        "pattern match",
        "show technique",
        "date",
        "format",
        "august",
        "hybrid",
        "local",
        "path",
        "click",
        "strings",
        "flag",
        "usa windows",
        "hwp support",
        "march",
        "december",
        "united",
        "markmonitor",
        "overview dns",
        "requests domain",
        "country",
        "contacted hosts",
        "ip address",
        "process details",
        "t1179 hooking",
        "access windows",
        "installs",
        "control att",
        "found",
        "development att",
        "name server",
        "show process",
        "programfiles",
        "command decode",
        "suricata ipv4",
        "ck matrix",
        "comspec",
        "model",
        "general",
        "dynamicloader",
        "unknown",
        "as16509",
        "whitelisted",
        "medium",
        "write c",
        "as15169",
        "search",
        "high",
        "write",
        "android",
        "malware",
        "copy",
        "next",
        "formbook cnc",
        "checkin",
        "entries",
        "passive dns",
        "next associated",
        "site",
        "neue",
        "ipv4",
        "pulse pulses",
        "exploit",
        "trojan",
        "virtool",
        "body",
        "refer",
        "present dec",
        "epub",
        "present jan",
        "present nov",
        "present oct",
        "showing",
        "urls show",
        "win32",
        "win64",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "prefetch8",
        "localappdata",
        "prefetch1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 3409,
        "hostname": 4127,
        "URL": 8408,
        "SSLCertFingerprint": 9,
        "FileHash-SHA256": 1175,
        "FileHash-MD5": 144,
        "FileHash-SHA1": 134,
        "CVE": 2
      },
      "indicator_count": 17408,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "227 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://platform-akam.linkedin.cn",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://platform-akam.linkedin.cn",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776675366.2829013
}