{
  "type": "URL",
  "indicator": "https://preview.presspage.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://preview.presspage.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4177623830,
      "indicator": "https://preview.presspage.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "69b2b7cb05b2098c1d2bf20f",
          "name": "federal goverment clone cellbrite credit q vashti",
          "description": "",
          "modified": "2026-03-12T12:55:39.046000",
          "created": "2026-03-12T12:55:39.046000",
          "tags": [
            "url https",
            "url http",
            "germany",
            "united",
            "ukraine",
            "japan",
            "extraction",
            "data upload",
            "urls",
            "url analysis",
            "enter sc",
            "extr",
            "iocs",
            "active",
            "france unknown",
            "present jan",
            "servers",
            "homair sweet",
            "grabber",
            "encrypt",
            "ipv4",
            "role title",
            "divx",
            "pitfall",
            "internet",
            "ip role",
            "america asn",
            "extraction data",
            "leveibielabs",
            "all se",
            "enter source",
            "url or",
            "texirag",
            "drop",
            "present nov",
            "united states",
            "america",
            "levdibidelabs",
            "failed",
            "idron anv",
            "include manualv",
            "review data",
            "iterng",
            "name servers",
            "passive dns",
            "incapsula",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "script head",
            "request",
            "cookie",
            "indicator",
            "msie",
            "chrome",
            "backdoor",
            "gmt content",
            "ipv4 add",
            "twitter",
            "title",
            "process32nextw",
            "ms windows",
            "intel",
            "pe32",
            "regopenkeyexa",
            "read c",
            "medium",
            "class",
            "write",
            "template",
            "present oct",
            "present jul",
            "aaaa",
            "present sep",
            "present aug",
            "url add",
            "http",
            "hostname",
            "related tags",
            "kx81xdbx0f",
            "x86xd3",
            "xa7xe28x06",
            "x82xd4",
            "delete c",
            "regsetvalueexa",
            "regbinary",
            "xa1xf1",
            "xe8xc2x14",
            "malware",
            "stream",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "push",
            "present dec",
            "italy",
            "present jun",
            "embeddedwb",
            "whitelisted",
            "windows nt",
            "dns traffic",
            "russia",
            "cname",
            "accept",
            "destination",
            "port",
            "et smtp",
            "message",
            "et trojan",
            "components",
            "suspicious",
            "download",
            "hostile",
            "next",
            "logic",
            "gather victim",
            "et info",
            "etpro trojan",
            "trojan",
            "report spam",
            "interesting",
            "created",
            "pegasus",
            "manipulation",
            "service",
            "capture",
            "et",
            "etpro",
            "host",
            "attack",
            "mtb description",
            "windows",
            "shellexecuteexw",
            "writeconsolew",
            "registry",
            "t1031",
            "modify existing",
            "dock",
            "type indicator",
            "added active",
            "related pulses",
            "arcflex",
            "filehashsha1",
            "types of",
            "learn more",
            "filehashsha256",
            "cellebrite",
            "white label",
            "search",
            "sha1",
            "france",
            "cmanual jan",
            "expiration date",
            "domain add",
            "pulse submit",
            "files",
            "ip address",
            "gmt cache",
            "sameorigin",
            "reverse dns",
            "unknown ns",
            "admin org",
            "zipcode",
            "gmt server",
            "pulse pulses",
            "entries",
            "hostname add",
            "verdict",
            "germany unknown",
            "status",
            "domain",
            "xpirat",
            "netherlands",
            "netherlands asn",
            "as35280 acorus",
            "dns resolutions",
            "error",
            "files ip",
            "copy",
            "telnet login",
            "suspicious path",
            "busybox",
            "login attempt",
            "gpl telnet",
            "high",
            "tcp syn",
            "telnet root",
            "path",
            "mirai",
            "emails",
            "domain name",
            "jlu11q",
            "tqbplo",
            "hours ago",
            "found",
            "yahoo",
            "gmail",
            "yandex",
            "https://cellebrite.com/en/federal-government/",
            "monitoring",
            "monitored target",
            "dangerous",
            "spyware",
            "80211",
            "colorado",
            "x amz",
            "government",
            "mirai login attempt",
            "emotet",
            "c2",
            ".ru",
            ".com",
            "denver",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "dead connect",
            "hostile",
            "adversarial",
            "abuse",
            "criminal intent",
            "block messages",
            "botnet"
          ],
          "references": [
            "fastwebnet.it | Cellebrite White Label Spyware Service",
            "putrhnwl.exe",
            "Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
            "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
            "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
            "IP\u2019s Contacted : 54.230.129.165",
            "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
            "Domains Contacted: pitfall.divx.com www.google.com",
            "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Yara: Detections Tofsee",
            "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
            "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
            "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
            "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
            "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
            "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
            "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
            "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
            "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
            "ET TROJAN Suspicious double Server Header",
            "ET DNS DNS Query to a .tk domain - Likey",
            "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
            "Needs to be sorted. Actively being exploited on US",
            "162.159.134.42 \u2022 https://cellebrite.com/",
            "https://cellebrite.com/en/federal-government/",
            "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
            "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
            "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
            "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
            "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
            "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Germany",
            "Ireland",
            "Switzerland",
            "Poland",
            "Belgium",
            "Netherlands",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "ETPRO",
              "display_name": "ETPRO",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.PC!MTB",
              "display_name": "Trojan:Win32/Emotet.PC!MTB",
              "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aptdrop.RU",
              "display_name": "Trojan:Win32/Aptdrop.RU",
              "target": "/malware/Trojan:Win32/Aptdrop.RU"
            },
            {
              "id": "Ransomware/Win.Stop.R4529",
              "display_name": "Ransomware/Win.Stop.R4529",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32/BackdoorX",
              "display_name": "Win32/BackdoorX",
              "target": null
            },
            {
              "id": "Win.Trojan.Dialog-9873788-0",
              "display_name": "Win.Trojan.Dialog-9873788-0",
              "target": null
            },
            {
              "id": "Tsunami-6981155-0",
              "display_name": "Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1195",
              "name": "Supply Chain Compromise",
              "display_name": "T1195 - Supply Chain Compromise"
            },
            {
              "id": "T1196",
              "name": "Control Panel Items",
              "display_name": "T1196 - Control Panel Items"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1556",
              "name": "Modify Authentication Process",
              "display_name": "T1556 - Modify Authentication Process"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1581",
              "name": "Geofencing",
              "display_name": "T1581 - Geofencing"
            },
            {
              "id": "T1582",
              "name": "SMS Control",
              "display_name": "T1582 - SMS Control"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1587",
              "name": "Develop Capabilities",
              "display_name": "T1587 - Develop Capabilities"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [
            "Journalists",
            "Government",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": "696f7d467763ed4d4e74d133",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4994,
            "domain": 2519,
            "hostname": 3281,
            "FileHash-SHA256": 4467,
            "FileHash-MD5": 1118,
            "FileHash-SHA1": 1056,
            "email": 12,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 17448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "38 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "696f7d467763ed4d4e74d133",
          "name": "Federal Government-Cellebrite Attack found actively targeting iOS and other devices | Mirai login attempts | TelNet Login",
          "description": "https://cellebrite.com/en/federal-government/ | Found on a crime victims devices. Targets abused by spyware in an unethical manner by andvesarial \u2018governmental\u2019 possibly \u2018contracted\u2019 entities. Waged against targets such as victims of crime , journalists , researchers , students. Target Users: Serves public safety, enterprise, and government sectors, aiding first responders, investigators, prosecutors, and analysts. How it's Used Law enforcement uses it to unlock devices and retrieve evidence like messages, location history, and app data for criminal investigations. It helps uncover critical information from digital devices, even recovering data that users thought was permanently deleted. Controversy & Privacy Concerns While marketed as a tool for lawful investigations, its powerful data extraction capabilities raise significant privacy concerns and ethical debates.",
          "modified": "2026-02-19T12:05:47.166000",
          "created": "2026-01-20T13:04:06.622000",
          "tags": [
            "url https",
            "url http",
            "germany",
            "united",
            "ukraine",
            "japan",
            "extraction",
            "data upload",
            "urls",
            "url analysis",
            "enter sc",
            "extr",
            "iocs",
            "active",
            "france unknown",
            "present jan",
            "servers",
            "homair sweet",
            "grabber",
            "encrypt",
            "ipv4",
            "role title",
            "divx",
            "pitfall",
            "internet",
            "ip role",
            "america asn",
            "extraction data",
            "leveibielabs",
            "all se",
            "enter source",
            "url or",
            "texirag",
            "drop",
            "present nov",
            "united states",
            "america",
            "levdibidelabs",
            "failed",
            "idron anv",
            "include manualv",
            "review data",
            "iterng",
            "name servers",
            "passive dns",
            "incapsula",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "script head",
            "request",
            "cookie",
            "indicator",
            "msie",
            "chrome",
            "backdoor",
            "gmt content",
            "ipv4 add",
            "twitter",
            "title",
            "process32nextw",
            "ms windows",
            "intel",
            "pe32",
            "regopenkeyexa",
            "read c",
            "medium",
            "class",
            "write",
            "template",
            "present oct",
            "present jul",
            "aaaa",
            "present sep",
            "present aug",
            "url add",
            "http",
            "hostname",
            "related tags",
            "kx81xdbx0f",
            "x86xd3",
            "xa7xe28x06",
            "x82xd4",
            "delete c",
            "regsetvalueexa",
            "regbinary",
            "xa1xf1",
            "xe8xc2x14",
            "malware",
            "stream",
            "unknown",
            "win32",
            "persistence",
            "execution",
            "push",
            "present dec",
            "italy",
            "present jun",
            "embeddedwb",
            "whitelisted",
            "windows nt",
            "dns traffic",
            "russia",
            "cname",
            "accept",
            "destination",
            "port",
            "et smtp",
            "message",
            "et trojan",
            "components",
            "suspicious",
            "download",
            "hostile",
            "next",
            "logic",
            "gather victim",
            "et info",
            "etpro trojan",
            "trojan",
            "report spam",
            "interesting",
            "created",
            "pegasus",
            "manipulation",
            "service",
            "capture",
            "et",
            "etpro",
            "host",
            "attack",
            "mtb description",
            "windows",
            "shellexecuteexw",
            "writeconsolew",
            "registry",
            "t1031",
            "modify existing",
            "dock",
            "type indicator",
            "added active",
            "related pulses",
            "arcflex",
            "filehashsha1",
            "types of",
            "learn more",
            "filehashsha256",
            "cellebrite",
            "white label",
            "search",
            "sha1",
            "france",
            "cmanual jan",
            "expiration date",
            "domain add",
            "pulse submit",
            "files",
            "ip address",
            "gmt cache",
            "sameorigin",
            "reverse dns",
            "unknown ns",
            "admin org",
            "zipcode",
            "gmt server",
            "pulse pulses",
            "entries",
            "hostname add",
            "verdict",
            "germany unknown",
            "status",
            "domain",
            "xpirat",
            "netherlands",
            "netherlands asn",
            "as35280 acorus",
            "dns resolutions",
            "error",
            "files ip",
            "copy",
            "telnet login",
            "suspicious path",
            "busybox",
            "login attempt",
            "gpl telnet",
            "high",
            "tcp syn",
            "telnet root",
            "path",
            "mirai",
            "emails",
            "domain name",
            "jlu11q",
            "tqbplo",
            "hours ago",
            "found",
            "yahoo",
            "gmail",
            "yandex",
            "https://cellebrite.com/en/federal-government/",
            "monitoring",
            "monitored target",
            "dangerous",
            "spyware",
            "80211",
            "colorado",
            "x amz",
            "government",
            "mirai login attempt",
            "emotet",
            "c2",
            ".ru",
            ".com",
            "denver",
            "indicator role",
            "title added",
            "active related",
            "pulses hostname",
            "dead connect",
            "hostile",
            "adversarial",
            "abuse",
            "criminal intent",
            "block messages",
            "botnet"
          ],
          "references": [
            "fastwebnet.it | Cellebrite White Label Spyware Service",
            "putrhnwl.exe",
            "Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
            "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
            "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
            "IP\u2019s Contacted : 54.230.129.165",
            "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
            "Domains Contacted: pitfall.divx.com www.google.com",
            "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Yara: Detections Tofsee",
            "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
            "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
            "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
            "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
            "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
            "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
            "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
            "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
            "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
            "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
            "ET TROJAN Suspicious double Server Header",
            "ET DNS DNS Query to a .tk domain - Likey",
            "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
            "Needs to be sorted. Actively being exploited on US",
            "162.159.134.42 \u2022 https://cellebrite.com/",
            "https://cellebrite.com/en/federal-government/",
            "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
            "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
            "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
            "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
            "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
            "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Italy",
            "Germany",
            "Ireland",
            "Switzerland",
            "Poland",
            "Belgium",
            "Netherlands",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "ETPRO",
              "display_name": "ETPRO",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet.PC!MTB",
              "display_name": "Trojan:Win32/Emotet.PC!MTB",
              "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Aptdrop.RU",
              "display_name": "Trojan:Win32/Aptdrop.RU",
              "target": "/malware/Trojan:Win32/Aptdrop.RU"
            },
            {
              "id": "Ransomware/Win.Stop.R4529",
              "display_name": "Ransomware/Win.Stop.R4529",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "Win32/BackdoorX",
              "display_name": "Win32/BackdoorX",
              "target": null
            },
            {
              "id": "Win.Trojan.Dialog-9873788-0",
              "display_name": "Win.Trojan.Dialog-9873788-0",
              "target": null
            },
            {
              "id": "Tsunami-6981155-0",
              "display_name": "Tsunami-6981155-0",
              "target": null
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Backdoor:Linux/DemonBot",
              "display_name": "Backdoor:Linux/DemonBot",
              "target": "/malware/Backdoor:Linux/DemonBot"
            },
            {
              "id": "Unix.Trojan.Tsunami-6981155-0",
              "display_name": "Unix.Trojan.Tsunami-6981155-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1195",
              "name": "Supply Chain Compromise",
              "display_name": "T1195 - Supply Chain Compromise"
            },
            {
              "id": "T1196",
              "name": "Control Panel Items",
              "display_name": "T1196 - Control Panel Items"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1505",
              "name": "Server Software Component",
              "display_name": "T1505 - Server Software Component"
            },
            {
              "id": "T1556",
              "name": "Modify Authentication Process",
              "display_name": "T1556 - Modify Authentication Process"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1581",
              "name": "Geofencing",
              "display_name": "T1581 - Geofencing"
            },
            {
              "id": "T1582",
              "name": "SMS Control",
              "display_name": "T1582 - SMS Control"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1587",
              "name": "Develop Capabilities",
              "display_name": "T1587 - Develop Capabilities"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1591",
              "name": "Gather Victim Org Information",
              "display_name": "T1591 - Gather Victim Org Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1608",
              "name": "Stage Capabilities",
              "display_name": "T1608 - Stage Capabilities"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [
            "Journalists",
            "Government",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4994,
            "domain": 2519,
            "hostname": 3281,
            "FileHash-SHA256": 4467,
            "FileHash-MD5": 1118,
            "FileHash-SHA1": 1056,
            "email": 12,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 17448,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "59 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69640c0afc9805a6fa2da07b",
          "name": "MUSO.AI Malware \u2018Incredimail\u2019 Palantir in use[OTX auto populated title -Tsara Brashears]",
          "description": "MUSO.Ai , Is have to do more research. Some searches on reports MUSO as an opt in resource for artist to view, sort, and manage legacy credits, MUSO also collects royalties. Research and investigation confirms no one on music team is associated with  or l thinks they may have heard of MUSO. Is MUSO. AI Palantir customer or service ,spy app services by the folks at Palantir. . [otx auto pop praise:  Tsara Brashears is the most popular songwriter in the world, but can you use the app to find out more about the artist and the musicians behind the tracks?] cute. \n#dembiak #palantir #muso #ai",
          "modified": "2026-02-10T20:03:47.214000",
          "created": "2026-01-11T20:46:02.176000",
          "tags": [
            "lark kdence",
            "zack dare",
            "zafira",
            "jon bonus",
            "andy flebbe",
            "div div",
            "present nov",
            "a domains",
            "united",
            "script urls",
            "div a",
            "script domains",
            "discover",
            "moved",
            "insert",
            "x0 tw",
            "urls",
            "cloudfront x",
            "title error",
            "url analysis",
            "reverse dns",
            "servers",
            "name servers",
            "united states",
            "all ipv4",
            "aaaa",
            "ip address",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "evasion att",
            "t1480 execution",
            "ascii text",
            "mitre att",
            "pattern match",
            "null",
            "error",
            "click",
            "hybrid",
            "general",
            "local",
            "path",
            "starfield",
            "strings",
            "refresh",
            "tools",
            "meta",
            "onload",
            "span",
            "data upload",
            "extraction",
            "type",
            "extra",
            "referen https",
            "include review",
            "exclude sugges",
            "stop",
            "aivoes typ",
            "passive dns",
            "date",
            "united states",
            "status",
            "domain add",
            "files",
            "hostname",
            "read c",
            "medium",
            "search",
            "show",
            "memcommit",
            "high",
            "checks",
            "windows",
            "delete",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "next",
            "amazon02",
            "as autonomous",
            "system",
            "asn16509",
            "domain",
            "current dns",
            "a record",
            "as16509",
            "december",
            "ip information",
            "ipasns ip",
            "google",
            "fastly",
            "googlecl",
            "akamaias",
            "cloudflar",
            "domain tree",
            "links ip",
            "address as",
            "cisco",
            "umbrella rank",
            "general full",
            "url https",
            "software",
            "resource hash",
            "protocol h2",
            "security tls",
            "hostname add",
            "challengescript",
            "captchascript",
            "name",
            "value",
            "source level",
            "url text",
            "automatic",
            "webgl",
            "please",
            "extr data",
            "data",
            "size",
            "title",
            "yara detections",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "entries",
            "rgba",
            "unicode",
            "asnone",
            "malware",
            "port",
            "destination",
            "tlsv1",
            "tls handshake",
            "failure",
            "roboto",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "expiration",
            "url http",
            "no expiration",
            "present jan",
            "unknown ns",
            "certificate",
            "body",
            "present oct",
            "present may",
            "present dec",
            "present sep",
            "present feb",
            "showing",
            "next associated",
            "all se",
            "pulse pulses",
            "http",
            "files domain",
            "files related",
            "pulses none",
            "debiak",
            "tsara brashears",
            "ai",
            "palantir",
            "muso ai",
            "sort",
            "artists",
            "royalties",
            "music",
            "songwriter",
            "collect",
            "view",
            "malicious app",
            "false claims"
          ],
          "references": [
            "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
            "22.hio52.r.cloudfront.net",
            "us-gov-west-1.gov.reveal-global.com",
            "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
            "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
            "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
            "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
            "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
            "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
            "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
            "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
            "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
            "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
            "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
            "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
            "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
            "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
            "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
            "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
            "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
            "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
            "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
            "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
            "https://glare.pali om. \u2022 http://engage.palantirfou?",
            "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
            "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
            "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
            "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
            "campdeadwood2026.com",
            "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
            "Pornhub to your phone. Dumping or by request?",
            "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
            "www.killer333.club So I\u2019m right."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Malware.Incredimail-6804483-0",
              "display_name": "Win.Malware.Incredimail-6804483-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "TA0028",
              "name": "Persistence",
              "display_name": "TA0028 - Persistence"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10686,
            "hostname": 2427,
            "domain": 1094,
            "FileHash-MD5": 175,
            "FileHash-SHA1": 65,
            "FileHash-SHA256": 1118,
            "email": 4,
            "SSLCertFingerprint": 14
          },
          "indicator_count": 15583,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "67 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
        "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
        "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "Yara Detections: Nullsoft_NSIS",
        "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
        "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
        "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
        "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
        "https://glare.pali om. \u2022 http://engage.palantirfou?",
        "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
        "ET DNS DNS Query to a .tk domain - Likey",
        "IP\u2019s Contacted : 54.230.129.165",
        "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
        "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "22.hio52.r.cloudfront.net",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "us-gov-west-1.gov.reveal-global.com",
        "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
        "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "ET TROJAN Suspicious double Server Header",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
        "campdeadwood2026.com",
        "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "Pornhub to your phone. Dumping or by request?",
        "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "putrhnwl.exe",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/",
        "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
        "Needs to be sorted. Actively being exploited on US",
        "https://cellebrite.com/en/federal-government/",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "www.killer333.club So I\u2019m right.",
        "Yara: Detections Tofsee",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Tsunami-6981155-0",
            "Win.trojan.dialog-9873788-0",
            "Trojan:win32/danabot",
            "Win32:trojan-gen",
            "Etpro",
            "Backdoor:linux/demonbot",
            "Win.malware.incredimail-6804483-0",
            "Win32/backdoorx",
            "Ransomware/win.stop.r4529",
            "Unix.trojan.tsunami-6981155-0",
            "Trojan:win32/emotet.pc!mtb",
            "Backdoor:win32/tofsee.t",
            "Mirai",
            "Et",
            "Pegasus",
            "Trojan:win32/aptdrop.ru",
            "Crypt3.bxvc"
          ],
          "industries": [
            "Government",
            "Civil society",
            "Journalists"
          ],
          "unique_indicators": 33317
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/presspage.com",
    "whois": "http://whois.domaintools.com/presspage.com",
    "domain": "presspage.com",
    "hostname": "preview.presspage.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "69b2b7cb05b2098c1d2bf20f",
      "name": "federal goverment clone cellbrite credit q vashti",
      "description": "",
      "modified": "2026-03-12T12:55:39.046000",
      "created": "2026-03-12T12:55:39.046000",
      "tags": [
        "url https",
        "url http",
        "germany",
        "united",
        "ukraine",
        "japan",
        "extraction",
        "data upload",
        "urls",
        "url analysis",
        "enter sc",
        "extr",
        "iocs",
        "active",
        "france unknown",
        "present jan",
        "servers",
        "homair sweet",
        "grabber",
        "encrypt",
        "ipv4",
        "role title",
        "divx",
        "pitfall",
        "internet",
        "ip role",
        "america asn",
        "extraction data",
        "leveibielabs",
        "all se",
        "enter source",
        "url or",
        "texirag",
        "drop",
        "present nov",
        "united states",
        "america",
        "levdibidelabs",
        "failed",
        "idron anv",
        "include manualv",
        "review data",
        "iterng",
        "name servers",
        "passive dns",
        "incapsula",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "script head",
        "request",
        "cookie",
        "indicator",
        "msie",
        "chrome",
        "backdoor",
        "gmt content",
        "ipv4 add",
        "twitter",
        "title",
        "process32nextw",
        "ms windows",
        "intel",
        "pe32",
        "regopenkeyexa",
        "read c",
        "medium",
        "class",
        "write",
        "template",
        "present oct",
        "present jul",
        "aaaa",
        "present sep",
        "present aug",
        "url add",
        "http",
        "hostname",
        "related tags",
        "kx81xdbx0f",
        "x86xd3",
        "xa7xe28x06",
        "x82xd4",
        "delete c",
        "regsetvalueexa",
        "regbinary",
        "xa1xf1",
        "xe8xc2x14",
        "malware",
        "stream",
        "unknown",
        "win32",
        "persistence",
        "execution",
        "push",
        "present dec",
        "italy",
        "present jun",
        "embeddedwb",
        "whitelisted",
        "windows nt",
        "dns traffic",
        "russia",
        "cname",
        "accept",
        "destination",
        "port",
        "et smtp",
        "message",
        "et trojan",
        "components",
        "suspicious",
        "download",
        "hostile",
        "next",
        "logic",
        "gather victim",
        "et info",
        "etpro trojan",
        "trojan",
        "report spam",
        "interesting",
        "created",
        "pegasus",
        "manipulation",
        "service",
        "capture",
        "et",
        "etpro",
        "host",
        "attack",
        "mtb description",
        "windows",
        "shellexecuteexw",
        "writeconsolew",
        "registry",
        "t1031",
        "modify existing",
        "dock",
        "type indicator",
        "added active",
        "related pulses",
        "arcflex",
        "filehashsha1",
        "types of",
        "learn more",
        "filehashsha256",
        "cellebrite",
        "white label",
        "search",
        "sha1",
        "france",
        "cmanual jan",
        "expiration date",
        "domain add",
        "pulse submit",
        "files",
        "ip address",
        "gmt cache",
        "sameorigin",
        "reverse dns",
        "unknown ns",
        "admin org",
        "zipcode",
        "gmt server",
        "pulse pulses",
        "entries",
        "hostname add",
        "verdict",
        "germany unknown",
        "status",
        "domain",
        "xpirat",
        "netherlands",
        "netherlands asn",
        "as35280 acorus",
        "dns resolutions",
        "error",
        "files ip",
        "copy",
        "telnet login",
        "suspicious path",
        "busybox",
        "login attempt",
        "gpl telnet",
        "high",
        "tcp syn",
        "telnet root",
        "path",
        "mirai",
        "emails",
        "domain name",
        "jlu11q",
        "tqbplo",
        "hours ago",
        "found",
        "yahoo",
        "gmail",
        "yandex",
        "https://cellebrite.com/en/federal-government/",
        "monitoring",
        "monitored target",
        "dangerous",
        "spyware",
        "80211",
        "colorado",
        "x amz",
        "government",
        "mirai login attempt",
        "emotet",
        "c2",
        ".ru",
        ".com",
        "denver",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "dead connect",
        "hostile",
        "adversarial",
        "abuse",
        "criminal intent",
        "block messages",
        "botnet"
      ],
      "references": [
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "putrhnwl.exe",
        "Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "IP\u2019s Contacted : 54.230.129.165",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Yara: Detections Tofsee",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "ET TROJAN Suspicious double Server Header",
        "ET DNS DNS Query to a .tk domain - Likey",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "Needs to be sorted. Actively being exploited on US",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "https://cellebrite.com/en/federal-government/",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Germany",
        "Ireland",
        "Switzerland",
        "Poland",
        "Belgium",
        "Netherlands",
        "Sweden"
      ],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "ETPRO",
          "display_name": "ETPRO",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.PC!MTB",
          "display_name": "Trojan:Win32/Emotet.PC!MTB",
          "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aptdrop.RU",
          "display_name": "Trojan:Win32/Aptdrop.RU",
          "target": "/malware/Trojan:Win32/Aptdrop.RU"
        },
        {
          "id": "Ransomware/Win.Stop.R4529",
          "display_name": "Ransomware/Win.Stop.R4529",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32/BackdoorX",
          "display_name": "Win32/BackdoorX",
          "target": null
        },
        {
          "id": "Win.Trojan.Dialog-9873788-0",
          "display_name": "Win.Trojan.Dialog-9873788-0",
          "target": null
        },
        {
          "id": "Tsunami-6981155-0",
          "display_name": "Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1195",
          "name": "Supply Chain Compromise",
          "display_name": "T1195 - Supply Chain Compromise"
        },
        {
          "id": "T1196",
          "name": "Control Panel Items",
          "display_name": "T1196 - Control Panel Items"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1556",
          "name": "Modify Authentication Process",
          "display_name": "T1556 - Modify Authentication Process"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1581",
          "name": "Geofencing",
          "display_name": "T1581 - Geofencing"
        },
        {
          "id": "T1582",
          "name": "SMS Control",
          "display_name": "T1582 - SMS Control"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1587",
          "name": "Develop Capabilities",
          "display_name": "T1587 - Develop Capabilities"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [
        "Journalists",
        "Government",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": "696f7d467763ed4d4e74d133",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4994,
        "domain": 2519,
        "hostname": 3281,
        "FileHash-SHA256": 4467,
        "FileHash-MD5": 1118,
        "FileHash-SHA1": 1056,
        "email": 12,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 17448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "38 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "696f7d467763ed4d4e74d133",
      "name": "Federal Government-Cellebrite Attack found actively targeting iOS and other devices | Mirai login attempts | TelNet Login",
      "description": "https://cellebrite.com/en/federal-government/ | Found on a crime victims devices. Targets abused by spyware in an unethical manner by andvesarial \u2018governmental\u2019 possibly \u2018contracted\u2019 entities. Waged against targets such as victims of crime , journalists , researchers , students. Target Users: Serves public safety, enterprise, and government sectors, aiding first responders, investigators, prosecutors, and analysts. How it's Used Law enforcement uses it to unlock devices and retrieve evidence like messages, location history, and app data for criminal investigations. It helps uncover critical information from digital devices, even recovering data that users thought was permanently deleted. Controversy & Privacy Concerns While marketed as a tool for lawful investigations, its powerful data extraction capabilities raise significant privacy concerns and ethical debates.",
      "modified": "2026-02-19T12:05:47.166000",
      "created": "2026-01-20T13:04:06.622000",
      "tags": [
        "url https",
        "url http",
        "germany",
        "united",
        "ukraine",
        "japan",
        "extraction",
        "data upload",
        "urls",
        "url analysis",
        "enter sc",
        "extr",
        "iocs",
        "active",
        "france unknown",
        "present jan",
        "servers",
        "homair sweet",
        "grabber",
        "encrypt",
        "ipv4",
        "role title",
        "divx",
        "pitfall",
        "internet",
        "ip role",
        "america asn",
        "extraction data",
        "leveibielabs",
        "all se",
        "enter source",
        "url or",
        "texirag",
        "drop",
        "present nov",
        "united states",
        "america",
        "levdibidelabs",
        "failed",
        "idron anv",
        "include manualv",
        "review data",
        "iterng",
        "name servers",
        "passive dns",
        "incapsula",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "script head",
        "request",
        "cookie",
        "indicator",
        "msie",
        "chrome",
        "backdoor",
        "gmt content",
        "ipv4 add",
        "twitter",
        "title",
        "process32nextw",
        "ms windows",
        "intel",
        "pe32",
        "regopenkeyexa",
        "read c",
        "medium",
        "class",
        "write",
        "template",
        "present oct",
        "present jul",
        "aaaa",
        "present sep",
        "present aug",
        "url add",
        "http",
        "hostname",
        "related tags",
        "kx81xdbx0f",
        "x86xd3",
        "xa7xe28x06",
        "x82xd4",
        "delete c",
        "regsetvalueexa",
        "regbinary",
        "xa1xf1",
        "xe8xc2x14",
        "malware",
        "stream",
        "unknown",
        "win32",
        "persistence",
        "execution",
        "push",
        "present dec",
        "italy",
        "present jun",
        "embeddedwb",
        "whitelisted",
        "windows nt",
        "dns traffic",
        "russia",
        "cname",
        "accept",
        "destination",
        "port",
        "et smtp",
        "message",
        "et trojan",
        "components",
        "suspicious",
        "download",
        "hostile",
        "next",
        "logic",
        "gather victim",
        "et info",
        "etpro trojan",
        "trojan",
        "report spam",
        "interesting",
        "created",
        "pegasus",
        "manipulation",
        "service",
        "capture",
        "et",
        "etpro",
        "host",
        "attack",
        "mtb description",
        "windows",
        "shellexecuteexw",
        "writeconsolew",
        "registry",
        "t1031",
        "modify existing",
        "dock",
        "type indicator",
        "added active",
        "related pulses",
        "arcflex",
        "filehashsha1",
        "types of",
        "learn more",
        "filehashsha256",
        "cellebrite",
        "white label",
        "search",
        "sha1",
        "france",
        "cmanual jan",
        "expiration date",
        "domain add",
        "pulse submit",
        "files",
        "ip address",
        "gmt cache",
        "sameorigin",
        "reverse dns",
        "unknown ns",
        "admin org",
        "zipcode",
        "gmt server",
        "pulse pulses",
        "entries",
        "hostname add",
        "verdict",
        "germany unknown",
        "status",
        "domain",
        "xpirat",
        "netherlands",
        "netherlands asn",
        "as35280 acorus",
        "dns resolutions",
        "error",
        "files ip",
        "copy",
        "telnet login",
        "suspicious path",
        "busybox",
        "login attempt",
        "gpl telnet",
        "high",
        "tcp syn",
        "telnet root",
        "path",
        "mirai",
        "emails",
        "domain name",
        "jlu11q",
        "tqbplo",
        "hours ago",
        "found",
        "yahoo",
        "gmail",
        "yandex",
        "https://cellebrite.com/en/federal-government/",
        "monitoring",
        "monitored target",
        "dangerous",
        "spyware",
        "80211",
        "colorado",
        "x amz",
        "government",
        "mirai login attempt",
        "emotet",
        "c2",
        ".ru",
        ".com",
        "denver",
        "indicator role",
        "title added",
        "active related",
        "pulses hostname",
        "dead connect",
        "hostile",
        "adversarial",
        "abuse",
        "criminal intent",
        "block messages",
        "botnet"
      ],
      "references": [
        "fastwebnet.it | Cellebrite White Label Spyware Service",
        "putrhnwl.exe",
        "Yara Detections: Nullsoft_NSIS",
        "Alerts: network_icmp network_http allocates_rwx antivm_disk_size creates_exe creates_shortcut",
        "Alerts: exe_appdata injection_process_search privilege_luid_check process_interest",
        "Alerts: queries_programs antivm_queries_computername antivm_memory_available",
        "IP\u2019s Contacted : 54.230.129.165",
        "Domains Contacted: download.divx.com dns.msftncsi.com versions.divx.com",
        "Domains Contacted: pitfall.divx.com www.google.com",
        "RECORD VALUE:Org \u2022 FastWeb: S.p.a. Status: OK",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "IDS Detections: Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "Yara: Detections Tofsee",
        "Alerts: dead_host network_icmp nolookup_communication persistence_ads creates_largekey",
        "Alerts: dumped_buffer network_http antisandbox_sleep antivm_network_adapters antivm_queries_computername",
        "https://otx.alienvault.com/indicator/file/c3ea30ad1090fb9f1de847eaf0b68e6f42a58147d3497628d4d7adbf1e0e0966",
        "FileDescription: DivX OVS Bundle, L:EN;ES;DE;FR;JA;PT;ZH-CN;ZH-TW, DivX Codec 6.9.1,",
        "DivX Player 7.2.0, DivX Web Player 1.5.0 OriginalFilename: bundle-ovs.exe",
        "ET INFO Exectuable Download from dotted-quad Host 192.168.56.101 95.69.199.116",
        "ET TROJAN Possible Kelihos.F EXE Download Common Structure 192.168.56.101 95.69.199.116",
        "ET POLICY PE EXE or DLL Windows file download HTTP 95.69.199.116 192.168.56.101",
        "ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download 95.69.199.116 192.168.56.101",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 37.115.100.238",
        "ETPRO TROJAN Win32/Kryptik.BLYP Checkin 192.168.56.101 212.2.128.108",
        "ET TROJAN Suspicious double Server Header",
        "ET DNS DNS Query to a .tk domain - Likey",
        "ET SMTP Abuseat.org Block Message 85.218.0.110 192.168.56.101",
        "Needs to be sorted. Actively being exploited on US",
        "162.159.134.42 \u2022 https://cellebrite.com/",
        "https://cellebrite.com/en/federal-government/",
        "moon-foundry.com shoparc.palantirfoundry.com Relentless ksuite.ikm.gov.in",
        "skillsfuture.gov.sg app.pr-21.apprenticeships-vic-gov-au.sdp4.sdp.vic.gov.au",
        "http://www.cityofvacaville.gov/accessvacaville dev.login.theblackpuma.com",
        "applev2.platform.int.iberia.es \u2022 applestyle.cz \u2022  66.196.118.33",
        "mta6.am0.yahoodns.net \u2022  appleatwork.noventiq.my",
        "http://2026c1ff-ede2-494c-9a91-8867e50d918d.applestyle.cz/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Italy",
        "Germany",
        "Ireland",
        "Switzerland",
        "Poland",
        "Belgium",
        "Netherlands",
        "Sweden"
      ],
      "malware_families": [
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "ETPRO",
          "display_name": "ETPRO",
          "target": null
        },
        {
          "id": "Trojan:Win32/Emotet.PC!MTB",
          "display_name": "Trojan:Win32/Emotet.PC!MTB",
          "target": "/malware/Trojan:Win32/Emotet.PC!MTB"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Crypt3.BXVC",
          "display_name": "Crypt3.BXVC",
          "target": null
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Aptdrop.RU",
          "display_name": "Trojan:Win32/Aptdrop.RU",
          "target": "/malware/Trojan:Win32/Aptdrop.RU"
        },
        {
          "id": "Ransomware/Win.Stop.R4529",
          "display_name": "Ransomware/Win.Stop.R4529",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        },
        {
          "id": "Win32/BackdoorX",
          "display_name": "Win32/BackdoorX",
          "target": null
        },
        {
          "id": "Win.Trojan.Dialog-9873788-0",
          "display_name": "Win.Trojan.Dialog-9873788-0",
          "target": null
        },
        {
          "id": "Tsunami-6981155-0",
          "display_name": "Tsunami-6981155-0",
          "target": null
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Backdoor:Linux/DemonBot",
          "display_name": "Backdoor:Linux/DemonBot",
          "target": "/malware/Backdoor:Linux/DemonBot"
        },
        {
          "id": "Unix.Trojan.Tsunami-6981155-0",
          "display_name": "Unix.Trojan.Tsunami-6981155-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1043",
          "name": "Commonly Used Port",
          "display_name": "T1043 - Commonly Used Port"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1123",
          "name": "Audio Capture",
          "display_name": "T1123 - Audio Capture"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1195",
          "name": "Supply Chain Compromise",
          "display_name": "T1195 - Supply Chain Compromise"
        },
        {
          "id": "T1196",
          "name": "Control Panel Items",
          "display_name": "T1196 - Control Panel Items"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1505",
          "name": "Server Software Component",
          "display_name": "T1505 - Server Software Component"
        },
        {
          "id": "T1556",
          "name": "Modify Authentication Process",
          "display_name": "T1556 - Modify Authentication Process"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1581",
          "name": "Geofencing",
          "display_name": "T1581 - Geofencing"
        },
        {
          "id": "T1582",
          "name": "SMS Control",
          "display_name": "T1582 - SMS Control"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1587",
          "name": "Develop Capabilities",
          "display_name": "T1587 - Develop Capabilities"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1591",
          "name": "Gather Victim Org Information",
          "display_name": "T1591 - Gather Victim Org Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1608",
          "name": "Stage Capabilities",
          "display_name": "T1608 - Stage Capabilities"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1584.005",
          "name": "Botnet",
          "display_name": "T1584.005 - Botnet"
        }
      ],
      "industries": [
        "Journalists",
        "Government",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4994,
        "domain": 2519,
        "hostname": 3281,
        "FileHash-SHA256": 4467,
        "FileHash-MD5": 1118,
        "FileHash-SHA1": 1056,
        "email": 12,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 17448,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "59 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69640c0afc9805a6fa2da07b",
      "name": "MUSO.AI Malware \u2018Incredimail\u2019 Palantir in use[OTX auto populated title -Tsara Brashears]",
      "description": "MUSO.Ai , Is have to do more research. Some searches on reports MUSO as an opt in resource for artist to view, sort, and manage legacy credits, MUSO also collects royalties. Research and investigation confirms no one on music team is associated with  or l thinks they may have heard of MUSO. Is MUSO. AI Palantir customer or service ,spy app services by the folks at Palantir. . [otx auto pop praise:  Tsara Brashears is the most popular songwriter in the world, but can you use the app to find out more about the artist and the musicians behind the tracks?] cute. \n#dembiak #palantir #muso #ai",
      "modified": "2026-02-10T20:03:47.214000",
      "created": "2026-01-11T20:46:02.176000",
      "tags": [
        "lark kdence",
        "zack dare",
        "zafira",
        "jon bonus",
        "andy flebbe",
        "div div",
        "present nov",
        "a domains",
        "united",
        "script urls",
        "div a",
        "script domains",
        "discover",
        "moved",
        "insert",
        "x0 tw",
        "urls",
        "cloudfront x",
        "title error",
        "url analysis",
        "reverse dns",
        "servers",
        "name servers",
        "united states",
        "all ipv4",
        "aaaa",
        "ip address",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "evasion att",
        "t1480 execution",
        "ascii text",
        "mitre att",
        "pattern match",
        "null",
        "error",
        "click",
        "hybrid",
        "general",
        "local",
        "path",
        "starfield",
        "strings",
        "refresh",
        "tools",
        "meta",
        "onload",
        "span",
        "data upload",
        "extraction",
        "type",
        "extra",
        "referen https",
        "include review",
        "exclude sugges",
        "stop",
        "aivoes typ",
        "passive dns",
        "date",
        "united states",
        "status",
        "domain add",
        "files",
        "hostname",
        "read c",
        "medium",
        "search",
        "show",
        "memcommit",
        "high",
        "checks",
        "windows",
        "delete",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "next",
        "amazon02",
        "as autonomous",
        "system",
        "asn16509",
        "domain",
        "current dns",
        "a record",
        "as16509",
        "december",
        "ip information",
        "ipasns ip",
        "google",
        "fastly",
        "googlecl",
        "akamaias",
        "cloudflar",
        "domain tree",
        "links ip",
        "address as",
        "cisco",
        "umbrella rank",
        "general full",
        "url https",
        "software",
        "resource hash",
        "protocol h2",
        "security tls",
        "hostname add",
        "challengescript",
        "captchascript",
        "name",
        "value",
        "source level",
        "url text",
        "automatic",
        "webgl",
        "please",
        "extr data",
        "data",
        "size",
        "title",
        "yara detections",
        "filehash",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "entries",
        "rgba",
        "unicode",
        "asnone",
        "malware",
        "port",
        "destination",
        "tlsv1",
        "tls handshake",
        "failure",
        "roboto",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "expiration",
        "url http",
        "no expiration",
        "present jan",
        "unknown ns",
        "certificate",
        "body",
        "present oct",
        "present may",
        "present dec",
        "present sep",
        "present feb",
        "showing",
        "next associated",
        "all se",
        "pulse pulses",
        "http",
        "files domain",
        "files related",
        "pulses none",
        "debiak",
        "tsara brashears",
        "ai",
        "palantir",
        "muso ai",
        "sort",
        "artists",
        "royalties",
        "music",
        "songwriter",
        "collect",
        "view",
        "malicious app",
        "false claims"
      ],
      "references": [
        "https://credits.muso.ai/profile/ad62a9c1-de4a-4b3a-91d4-8f1ca6b5ad7a",
        "22.hio52.r.cloudfront.net",
        "us-gov-west-1.gov.reveal-global.com",
        "us-g0v-wact-1anvrav\u0645al=\u0635\u0639 \u0627\u062d\u0637\u0645\u0644\u0647",
        "MD5 be5eae9bd85769bce02d6e52a4927bcd Pulses Integrations C EXIF Data: HTML:Title\tINetSim default HTML page",
        "External Hosts Israel Unique Countries 2 Unique ASNs 2 IP",
        "ASN 82.80.204.63 www5.incredimail.com \u2022 Israel",
        "United States | ASNone 82.80.204.5 cen.incredibar.com \u2022 Israel",
        "AS8551 bezeq international-Itd 3.163.24.31 www5l.incredimail.com \u2022 Israel",
        "Antivirus Detections: Win.Malware.Incredimail-6804483-0 IDS Detections: Misspelled Mozilla User-Agent (Mozila)",
        "IP\u2019s Contacted : 82.80.204.63  3.163.24.31  82.80.204.5",
        "Domains Contacted: cen.incredibar.com www5l.incredimail.com www5.incredimail.com",
        "medallion-compute.washington.palantircloud.com \u2022 graviera-compute.palantirfedstart.com",
        "caerphilly-containers.palantirfedstart.com \u2022 equilibrium.palantirfoundry.com \u2022  palantirfoundry.com",
        "upstreamx.palantirfoundry.com \u2022 https://usw-2-dev.palantirfoundry.com",
        "https://upstreamx.palantirfoundry.com \u2022 edwards.palantirfoundry.com \u2022 stagwellmarketingcloud.palantirfoundry.com",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.ce31c01d-0b84-4e29-906f-1b8057568d49/master",
        "https://paloma.palantirfoundry.com/workspace/data-health/redirect/ri.foundry.main.dataset.878cb49b-395c-4c82-8db8-5e2bb0e628ce/master",
        "https://paloma.palantirfoundry.com https://lucyw.palantirfoundry.com  \u2022 http://edwards.palantirfoundry.com/",
        "http://dasima-containers.palantirfoundry.com \u2022 http://usw-2-dev.palantirfoundry.com",
        "https://kt-presales.palantirfoundry.co \u2022 https://glare.palantirfoundry.com",
        "engage.palantirfoundry.com \u2022  http://engage.palantirfoundry.com",
        "https://equilibrium.palantirfoundry.com \u2022\u2019https://engage.palantirfoundry.com",
        "http://upstreamx.palantirfoundry.com/ \u2022 https://equilibrium.palantirfoundry.com/",
        "https://glare.pali om. \u2022 http://engage.palantirfou?",
        "What?  patch.virtualworldweb.com \u2022 s.palantirfoundry.com \u2022 http://u tirfoundry.co",
        "(patch.virtualworldweb.com) why does this sound so creepy? DIT , simulation, OWO ,sentient weird.",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\t\u2022",
        "www.endgame \u2022 http://battlefront.com/matrixgames.html \u2022 prometheus.services.myscript.com - Wild!",
        "campdeadwood2026.com",
        "http://www.mobile-connection-alert.fyi/eb/bn/bn-9-nopop/9-nopop-1.html?var=&var2=&var3=$device=MOBILE&brand=Apple&model=iPhone&city=San%20Antonio&os=IOS&osversion=IOS%2011.4&country=US&countryname=United%20States&carrier=&referrerdomain=&language=en&connectiontype=CABLE&ip=76.185.246.58&region=Texas&cep=W-gWTncHS9Jzl2WpUnQW3DI5dgjcKdwNWM11yWj-BtNBDFNTD52Baezh0F6DNui3qOYcu9zUPktlUvTulBlF6GONqMgW0w5NXdG42lOJGAp8P79kEUkAM3xGHBcIuf2PfSpz0mTGxnhbXyAteh4g-wCUR45SdW6fMtSANbFpDDpNDCq8LpN8mLeQJjdLUA_TGOXW9mubTgOyAGy",
        "Pornhub to your phone. Dumping or by request?",
        "https://soerkvingo.msnstyle.dk/vaginas-escort-girl-ukraina-pure-nudisme-dyresex-noveller-sukker-pris-porno-med-norsk-tale/",
        "www.killer333.club So I\u2019m right."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Malware.Incredimail-6804483-0",
          "display_name": "Win.Malware.Incredimail-6804483-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "TA0028",
          "name": "Persistence",
          "display_name": "TA0028 - Persistence"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 10686,
        "hostname": 2427,
        "domain": 1094,
        "FileHash-MD5": 175,
        "FileHash-SHA1": 65,
        "FileHash-SHA256": 1118,
        "email": 4,
        "SSLCertFingerprint": 14
      },
      "indicator_count": 15583,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 144,
      "modified_text": "67 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://preview.presspage.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://preview.presspage.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776627773.7158923
}