{
  "type": "URL",
  "indicator": "https://pull.zzciai.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://pull.zzciai.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3837968421,
      "indicator": "https://pull.zzciai.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "65eb9b88c811f35e060a2aa5",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Crimes of Tracey Richter\"",
          "description": "",
          "modified": "2024-08-14T06:01:01.267000",
          "created": "2024-03-08T23:13:12.950000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65ea64dbc3938c6472fd5e7b",
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 121,
            "FileHash-SHA1": 120,
            "FileHash-SHA256": 1086,
            "URL": 391,
            "domain": 285,
            "hostname": 369,
            "email": 1
          },
          "indicator_count": 2373,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "613 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eff46bdd371899ca5be7d7",
          "name": "CrypterX-gen | Video-lal.com | M. Brian Sabey \u2022 Hall Render | Rexxfield",
          "description": "Videolal results. Parked. Owner of domain has subsidiaries including Huge Domains. It's possible for attacker to post a 404 error page,  park, post it for sale, malvertize. HoneyPotBot? \n\nFireeye. A bit much. william.ballenthin@fireeye.com\t\ncontain a resource (.rsrc) section moritz.raabe@fireeye.com. Overkill. What would Scooby Doo? Scooby!? \nTarget reports opening her MacBook Pro after it was replaced by Apple. It hadn't been in use. She opened it, surprised it was on, automatically connected to a store wifi (she was home) A worker was typing away in terminal. Fought hacker for recordings app containing Jeffrey Reimers aggressions. She lost. Terrified she murdered her MacBook by drowning  & dismemberment. Big mistake. Cloned MacBook.  Clicked on links trigger malicious downloads, network & DNS issues.",
          "modified": "2024-04-11T04:01:24.166000",
          "created": "2024-03-12T06:21:31.484000",
          "tags": [
            "upatre malware",
            "rwi dtools",
            "page dow",
            "security",
            "bitfender",
            "yandex",
            "malware",
            "all octoseek",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "file score",
            "fireeye",
            "injection",
            "worm",
            "trojan",
            "network",
            "poster",
            "honeybots",
            "united",
            "unknown",
            "win32upatre mar",
            "passive dns",
            "entries",
            "ipv4",
            "body",
            "artro",
            "generic malware",
            "formbook",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "generic",
            "hostnames",
            "pattern match",
            "ascii text",
            "png image",
            "root ca",
            "file",
            "authority",
            "indicator",
            "mitre att",
            "ck id",
            "class",
            "date",
            "enterprise",
            "hybrid",
            "accept",
            "general",
            "local",
            "click",
            "strings",
            "trident",
            "as47846",
            "germany unknown",
            "as2906 netflix",
            "scan endpoints",
            "domain",
            "urls",
            "files",
            "trojanspy",
            "mozilla",
            "dynamicloader",
            "medium",
            "title",
            "ms windows",
            "head",
            "intel",
            "inetsim http",
            "delete c",
            "show",
            "winnt",
            "copy",
            "powershell",
            "write",
            "next",
            "suspicious",
            "shop",
            "graph api",
            "status",
            "join",
            "vt community",
            "api key",
            "xcitium verdict",
            "cloud",
            "contacted",
            "contacted urls",
            "ssl certificate",
            "referrer",
            "historical ssl",
            "parent domain",
            "apple ios",
            "resolutions",
            "execution",
            "hacktool",
            "outbound connection",
            "detection list",
            "blacklist"
          ],
          "references": [
            "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/ \u2022",
            "http://systemforex.de/search/redirect.php?f= | http://it.marksypark.com | dont-delete.hugedomains.com | http://selfsparkcentral.com",
            "william.ballenthin@fireeye.com contain a resource (.rsrc) section\tmoritz.raabe@fireeye.com | Pattern match: \"jloup@gzip.org\" & \"fancybox@3.5.7\"",
            "FormBook: 104.247.81.53 \u2022 http://www.nimtax.com/k9/,Formbook,Medium,9/9/2019,1/7/2020",
            "Win32:CrypterX-gen\\ [Trj] | FileHash-MD5   6878e9896fdd84dcc11c997c9b7330ba",
            "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA1   2e586f8db46953532b5e25e07add4dbaeea83a79",
            "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA256  00027d11309d55312ae77f32d4ae79671c91f541e577bace7a5a5abde05563ad",
            "Win32/Renos: https://otx.alienvault.com/malware/ALF:JASYP:TrojanDownloader:Win32%2FRenos/",
            "Other:Malware-gen\\ [Trj] | FileHash-MD5 b5168dab50187b33460201b35b96dea7",
            "Other:Malware-gen\\ [Trj] | FileHash-SHA1 68868b3d0115e3d06f5fddb9d2ea6ad54270166c",
            "Other:Malware-gen\\ [Trj] | FileHash-SHA256 0000ba467dd40046e240c11251d9db03636d0e7c6f9f96354a46a441c2003143",
            "allocates_execute_remote_process \u2022 injection_write_memory \u2022 injection_resumethread \u2022 packer_entropy \u2022 network _icmp \u2022 injection_runpe",
            "injection_write_memory_exe \u2022 injection_ntsetcontextthread \u2022 dumped_buffer \u2022 checks_debugger \u2022 generates_crypto_key  \u2022 antivm_memory_available",
            "CnC IP Addresses: 104.247.81.53 \u2022 185.64.219.6 \u2022 199.191.50.82 \u2022 203.107.45.167 \u2022 91.195.240.94 \u2022 167.235.143.33",
            "AA47 More AV Detection Ratio 984  / 1000 IDS Detections Win32.Renos/ArtroMALWARETrojan Checkin M1 Possible Fake AV Checkin Fakealert. AA47 More AV Detection Ratio 984  / 1000 IDS Detections /Trojan Checkin M1 Possible Fake AV Checkin Fakealert.",
            "Videolal: 18.119.154.66:80 (endpoint request) \u2022 54.209.32.212 \u2022 http://videolal.com (phishing) \u2022 http://videolal.com/ \u2022 videolal.com \u2022 www.videolal.com \u2022",
            "www.videolal.com \u2022 httpvideolal.com \u2022 https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html",
            "https://www.hugedomains.com/domain_profile.cfm?d=videolal.com \u2022 https://www.hugedomains.com/domain_profile.cfm?d=videolal.com\"",
            "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html \u2022",
            "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
            "https://videolal.com/videos/tsara-brashears-assaulted-by-jeffrey-reimer-metlife-login-retirement.html \u2022 https://videolal.com/css/js/jquery-ui.min.js",
            "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html \u2022 https://videolal.com/css/jquery-ui.css \u2022 http://videolal.com/tsara-brashears.html",
            "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/tsara-brashears.html \u2022 http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
            "http://videolal.com/jeffrey-reimer-dpt-sexual-misconduct.html \u2022 http://videolal.com/tsara-brashears.html",
            "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html \u2022 http://videolal.com/the-man-who-built-america-1.html",
            "http://videolal.com/the-man-who-built-america-1.html \u2022 http://videolal.com/pinnacol-assurance-assaulted-by-jeffrey-",
            "http://videolal.com/jeffrey-reimer-dpt-physical-therapy-assaulted-patient.html \u2022 http://videolal.com/jeff-reimer-",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html \u2022",
            "http://videolal.com/jeff-reimer-dpt-buys-assault-victims-silence.html \u2022 http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/4998a7eac2a056833d01ee1e60c68c1f83f9ad6cd790ced9511e73cc12780f3c",
            "https://otx.alienvault.com/malware/Trojan:Win32%2FCrypterX/",
            "\u2192https://otx.alienvault.com/pulse/65eedf74b7bdda41057bef3e",
            "\u2192https://otx.alienvault.com/pulse/65ef3723d27863fc33a6b671",
            "\u2192https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
            "\u2192https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win32:CrypterX-gen\\ [Trj]",
              "display_name": "Win32:CrypterX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            },
            {
              "id": "Win32.Renos/Artro",
              "display_name": "Win32.Renos/Artro",
              "target": null
            },
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "I-Worm/Bagle.QE",
              "display_name": "I-Worm/Bagle.QE",
              "target": null
            },
            {
              "id": "Worm.Bagle-44",
              "display_name": "Worm.Bagle-44",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.DE",
              "display_name": "TrojanSpy:Win32/Nivdort.DE",
              "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
            },
            {
              "id": "Win.Trojan.Generic-9897526-0",
              "display_name": "Win.Trojan.Generic-9897526-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Knigsfot-125",
              "display_name": "Win.Trojan.Knigsfot-125",
              "target": null
            },
            {
              "id": "ALF:TrojanDownloader:Win32/Vadokrist.A",
              "display_name": "ALF:TrojanDownloader:Win32/Vadokrist.A",
              "target": null
            },
            {
              "id": "Win.Trojan.Generic-9957168-0",
              "display_name": "Win.Trojan.Generic-9957168-0",
              "target": null
            },
            {
              "id": "Win.Adware.RelevantKnowledge-9821121-0",
              "display_name": "Win.Adware.RelevantKnowledge-9821121-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1622,
            "FileHash-SHA1": 934,
            "FileHash-SHA256": 3289,
            "URL": 9605,
            "domain": 2321,
            "hostname": 2411,
            "CVE": 1,
            "email": 3
          },
          "indicator_count": 20186,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "738 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e863bebbf95e0dc5a4169a",
          "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack expected",
          "description": "Network compromised updated Apple device was directed (303) to a server. This is one of several botnets found. onthewifi \u2206 {Win32:BotX-gen\\ [Trj]} \u2022 Injection process | Password bypass. Studies targets behavior | Checks for other devices | Glupteba: \n Glupteba is a trojan-type program, malicious software that installs other programs of this type. Cyber criminals can perform a number of actions of a malicious hacker's choice on your device.",
          "modified": "2024-04-05T12:00:46.637000",
          "created": "2024-03-06T12:38:22.052000",
          "tags": [
            "referrer",
            "tsara brashears",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "pe resource",
            "execution",
            "sneaky server",
            "emotet",
            "android",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "formbook",
            "urls",
            "contacted",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "pe32 executable",
            "ms windows",
            "intel",
            "generic cil",
            "executable",
            "mono",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "samplename",
            "samplepath",
            "jays youtube",
            "rticon neutral",
            "details",
            "header intel",
            "name md5",
            "type",
            "language",
            "contained",
            "ico rtgroupicon",
            "neutral",
            "net technology",
            "corporation",
            "domains",
            "markmonitor inc",
            "malicious",
            "cnc",
            "network",
            "bypass password",
            "network probe",
            "dns query",
            "as20940",
            "united",
            "aaaa",
            "search",
            "showing",
            "date",
            "passive dns",
            "registrar",
            "unknown",
            "encrypt",
            "next",
            "domain",
            "emails",
            "name servers",
            "as199524",
            "record value",
            "rst seen",
            "last seen",
            "asn country",
            "cname",
            "as15169 google",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files ip",
            "as4788",
            "address",
            "pulses",
            "win32",
            "entries",
            "dadjoke",
            "ms defender",
            "united kingdom",
            "germany unknown",
            "as46606",
            "as14061",
            "servers",
            "as12576 ee",
            "russia unknown",
            "as3320 deutsche",
            "gamaredon",
            "armageddon",
            "as8068",
            "script urls",
            "for privacy",
            "script domains",
            "certificate",
            "meta",
            "creation date",
            "as14627",
            "ipv4",
            "onthewifi",
            "as54113",
            "trojan",
            "flywheel",
            "sea x",
            "accept",
            "ransom",
            "post http",
            "langserbian",
            "sublangdefault",
            "rticon",
            "process32nextw",
            "medium",
            "t1055",
            "high",
            "ip address",
            "generic",
            "body",
            "markus",
            "june",
            "copy",
            "bitcoin"
          ],
          "references": [
            "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
            "FormBook: 45.159.189.105",
            "FormBook: http://45.159.189.105/bot/regex",
            "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
            "Relic: bam.nr-data.net [Apple Private Data Collection]",
            "capitana.onthewifi.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "SLF:Trojan:Win32/Grandoreiro.A",
              "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.KM!MTB",
              "display_name": "Trojan:Win32/Glupteba.KM!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1188",
              "name": "Multi-hop Proxy",
              "display_name": "T1188 - Multi-hop Proxy"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 309,
            "FileHash-SHA1": 307,
            "FileHash-SHA256": 3084,
            "URL": 3066,
            "domain": 1085,
            "hostname": 1709,
            "CVE": 1,
            "email": 7
          },
          "indicator_count": 9568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea6410c1e1b1185951ef98",
          "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack executed (Copy)",
          "description": "",
          "modified": "2024-04-05T12:00:46.637000",
          "created": "2024-03-08T01:04:16.906000",
          "tags": [
            "referrer",
            "tsara brashears",
            "password bypass",
            "apple phone",
            "unlocker",
            "shell code",
            "script",
            "pe resource",
            "execution",
            "sneaky server",
            "emotet",
            "android",
            "download",
            "malware",
            "relic",
            "monitoring",
            "installer",
            "formbook",
            "urls",
            "contacted",
            "win32 exe",
            "parents",
            "type name",
            "msrsaapp",
            "files",
            "file type",
            "kb file",
            "b file",
            "graph",
            "pe32 executable",
            "ms windows",
            "intel",
            "generic cil",
            "executable",
            "mono",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "samplename",
            "samplepath",
            "jays youtube",
            "rticon neutral",
            "details",
            "header intel",
            "name md5",
            "type",
            "language",
            "contained",
            "ico rtgroupicon",
            "neutral",
            "net technology",
            "corporation",
            "domains",
            "markmonitor inc",
            "malicious",
            "cnc",
            "network",
            "bypass password",
            "network probe",
            "dns query",
            "as20940",
            "united",
            "aaaa",
            "search",
            "showing",
            "date",
            "passive dns",
            "registrar",
            "unknown",
            "encrypt",
            "next",
            "domain",
            "emails",
            "name servers",
            "as199524",
            "record value",
            "rst seen",
            "last seen",
            "asn country",
            "cname",
            "as15169 google",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files ip",
            "as4788",
            "address",
            "pulses",
            "win32",
            "entries",
            "dadjoke",
            "ms defender",
            "united kingdom",
            "germany unknown",
            "as46606",
            "as14061",
            "servers",
            "as12576 ee",
            "russia unknown",
            "as3320 deutsche",
            "gamaredon",
            "armageddon",
            "as8068",
            "script urls",
            "for privacy",
            "script domains",
            "certificate",
            "meta",
            "creation date",
            "as14627",
            "ipv4",
            "onthewifi",
            "as54113",
            "trojan",
            "flywheel",
            "sea x",
            "accept",
            "ransom",
            "post http",
            "langserbian",
            "sublangdefault",
            "rticon",
            "process32nextw",
            "medium",
            "t1055",
            "high",
            "ip address",
            "generic",
            "body",
            "markus",
            "june",
            "copy",
            "bitcoin"
          ],
          "references": [
            "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
            "FormBook: 45.159.189.105",
            "FormBook: http://45.159.189.105/bot/regex",
            "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
            "Relic: bam.nr-data.net [Apple Private Data Collection]",
            "capitana.onthewifi.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "SLF:Trojan:Win32/Grandoreiro.A",
              "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
              "target": null
            },
            {
              "id": "Win32:BotX-gen\\ [Trj]",
              "display_name": "Win32:BotX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Trojan:Win32/Glupteba.KM!MTB",
              "display_name": "Trojan:Win32/Glupteba.KM!MTB",
              "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1188",
              "name": "Multi-hop Proxy",
              "display_name": "T1188 - Multi-hop Proxy"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65e863bebbf95e0dc5a4169a",
          "export_count": 47,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 309,
            "FileHash-SHA1": 307,
            "FileHash-SHA256": 3084,
            "URL": 3066,
            "domain": 1085,
            "hostname": 1709,
            "CVE": 1,
            "email": 7
          },
          "indicator_count": 9568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e843669f4ba77affa4b297",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
          "description": "303 Error redirect target to desired service. | Likely using infected, updated apple Product. | Jays Youtube Bot.exe found. | Target saw episode subject, was suspicious due to 'diabolical women' connection promoted by Rexxfield[.] com (Tracey Richters ex-husband). I believe she was framed as is target I have come across. YouTube accounts are only told from the perspective of 2 ex-husbands, 1 doctor, 1 hacker and dentist[assaulter] who abused power. This trap makes targets look crazy, non credible leaving them traumatized. Attorneys or law enforcement likely  overwhelmed, wild stories. I often consider truth is can be much stranger than fiction. Fiction often loosely based on truth.",
          "modified": "2024-04-05T09:00:01.502000",
          "created": "2024-03-06T10:20:22.440000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 52,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 114,
            "FileHash-SHA256": 952,
            "URL": 285,
            "domain": 257,
            "hostname": 285,
            "email": 1
          },
          "indicator_count": 2009,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65ea64dbc3938c6472fd5e7b",
          "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"  Crimes of Tracey Richter",
          "description": "",
          "modified": "2024-04-05T09:00:01.502000",
          "created": "2024-03-08T01:07:39.514000",
          "tags": [
            "communicating",
            "replacement",
            "unauthorized",
            "cyber attack",
            "emotet",
            "suspicious",
            "ransom",
            "Jays Youtube Bot.exe",
            "united",
            "unknown",
            "passive dns",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "accept",
            "pragma",
            "injection",
            "downloader",
            "as44273 host",
            "search",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "next",
            "body",
            "entries",
            "object",
            "com cnt",
            "dem fin",
            "gov int",
            "nav onl",
            "phy pre",
            "pur sta",
            "win32",
            "as15169 google",
            "aaaa",
            "domain",
            "pulse pulses",
            "urls",
            "contacted",
            "contacted urls",
            "whois whois",
            "pcname",
            "machinename",
            "execution",
            "bundled",
            "whois sneaky",
            "smokeloader",
            "amadey",
            "android",
            "youtube",
            "darklivity podcast",
            "tracey richter",
            "michael roberts",
            "server redirect",
            "hacking",
            "botnet",
            "application/binary",
            "jomax",
            "early, iowa",
            "hacker",
            "ruthless",
            "colorado",
            "pitman and or dentist  hired roberts obvi",
            "song culture",
            "tsara brashears"
          ],
          "references": [
            "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
            "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
            "message.htm.com [Ransom | Malware Spreader]",
            "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
            "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
            "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
            "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
            "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
            "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
            "godaddy.com \u2022 prod.phx3.secureserver.net",
            "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
            "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
            "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
            "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
            "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
            "Amadey: IP 104.26.5.15",
            "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
            "Attempted to send viewer to own server.",
            "How about stop harming people"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan.Win32.Snovir.kfmibf",
              "display_name": "Trojan.Win32.Snovir.kfmibf",
              "target": null
            },
            {
              "id": "AMADEY",
              "display_name": "AMADEY",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e843669f4ba77affa4b297",
          "export_count": 48,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 115,
            "FileHash-SHA1": 114,
            "FileHash-SHA256": 952,
            "URL": 285,
            "domain": 257,
            "hostname": 285,
            "email": 1
          },
          "indicator_count": 2009,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "744 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c7b86fa120d19bbc88f367",
          "name": "Hijacker",
          "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
          "modified": "2024-03-11T17:01:59.026000",
          "created": "2024-02-10T17:54:55.243000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "tsara brashears",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "high level",
            "hackers",
            "hacktool",
            "download",
            "malware",
            "crypto",
            "hijacker",
            "monitoring",
            "installer",
            "tofsee",
            "domains domains",
            "domains files",
            "files files",
            "script",
            "kgs0",
            "kls0",
            "relic",
            "iframe",
            "pe32 executable",
            "ms windows",
            "intel",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "rticon neutral",
            "info compiler",
            "products id",
            "header intel",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "neutral",
            "first",
            "utc submissions",
            "submitters",
            "company limited",
            "computer",
            "amazonaes",
            "china telecom",
            "group",
            "csc corporate",
            "domains",
            "malware spreading evader",
            "cnc",
            "malvertizing",
            "milehighmedia",
            "trojandropper",
            "moved",
            "passive dns",
            "urls",
            "as14576",
            "backdoor",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "trojan",
            "encrypt",
            "body",
            "date",
            "date hash",
            "avast avg",
            "mtb may",
            "kratona",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls https",
            "script urls",
            "united",
            "meta",
            "unknown",
            "emails",
            "name servers",
            "search",
            "as62597 nsone",
            "a domains",
            "as397241",
            "media",
            "next",
            "december",
            "unlocker",
            "threat round",
            "apple ios",
            "apple phone",
            "project",
            "blister",
            "agent tesla",
            "open",
            "execution",
            "videos",
            "strong",
            "porn videos",
            "watch",
            "daddy",
            "free",
            "top rated",
            "most viewed",
            "cancel anytime",
            "views",
            "play",
            "black",
            "enjoy",
            "czech",
            "hunk",
            "virtool",
            "cryp",
            "creation date",
            "otx telemetry",
            "expiration date",
            "servers",
            "status",
            "win32",
            "showing",
            "domain",
            "nxdomain",
            "as8075",
            "shell code",
            "threat",
            "cyber espionage",
            "cyber stalking",
            "danger",
            "critical",
            "attack",
            "treats",
            "as15169 google",
            "aaaa",
            "record value",
            "error",
            "entries",
            "hostname",
            "url http",
            "http",
            "files domain",
            "files related",
            "shinjiru msc",
            "sdn bhd",
            "dnssec",
            "protect",
            "as54455 madeit",
            "phishing",
            "backdoor",
            "contextualizing",
            "elevated exposure",
            "malvertizing",
            "ransom",
            "msil",
            "hackers for hire",
            "hashes",
            "http method",
            "get http",
            "http requests",
            "get dns",
            "ip traffic",
            "memory pattern",
            "pattern ips",
            "@emreimer",
            "iextract2",
            "cp cyber",
            "denver",
            "security",
            "siem compliance",
            "skip",
            "cybersecurity",
            "larimer st",
            "suite",
            "resources cyber",
            "risk assessment",
            "bill",
            "mind",
            "delaware",
            "pa",
            "arizona",
            "colorado",
            "stalkers",
            "deuteronomy 28:7",
            "hitmen"
          ],
          "references": [
            "honey.exe",
            "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
            "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
            "CS Sigma Rules: Python Initiated Connection by frack113",
            "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
            "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
            "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "api.login.live.com",
            "http://appleid.icloud.com-website33.org/",
            "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
            "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
            "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
            "message.htm.com",
            "http://pornhub.com/gay/video/search",
            "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
            "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "W32.Sality.PE",
              "display_name": "W32.Sality.PE",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Virus.Win32.Virut.q",
              "display_name": "Virus.Win32.Virut.q",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32",
              "display_name": "TrojanDropper:Win32",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 54,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6303,
            "FileHash-MD5": 215,
            "FileHash-SHA1": 192,
            "FileHash-SHA256": 2663,
            "domain": 2673,
            "hostname": 2686,
            "CVE": 2,
            "email": 16
          },
          "indicator_count": 14750,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab5eb4d0a233bf6f32edb",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:20:59.154000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab601f0d674294b603758",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:21.869000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab60667f8205c19d6b67b",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:26.244000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab616bb5869335d184ae7",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:42.183000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "769 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://pornhub.com/gay/video/search",
        "http://videolal.com/jeffrey-reimer-dpt-physical-therapy-assaulted-patient.html \u2022 http://videolal.com/jeff-reimer-",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Other:Malware-gen\\ [Trj] | FileHash-SHA1 68868b3d0115e3d06f5fddb9d2ea6ad54270166c",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "FormBook: 104.247.81.53 \u2022 http://www.nimtax.com/k9/,Formbook,Medium,9/9/2019,1/7/2020",
        "message.htm.com [Ransom | Malware Spreader]",
        "www.videolal.com \u2022 httpvideolal.com \u2022 https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Win32/Renos: https://otx.alienvault.com/malware/ALF:JASYP:TrojanDownloader:Win32%2FRenos/",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
        "allocates_execute_remote_process \u2022 injection_write_memory \u2022 injection_resumethread \u2022 packer_entropy \u2022 network _icmp \u2022 injection_runpe",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "FormBook: http://45.159.189.105/bot/regex",
        "https://videolal.com/videos/tsara-brashears-assaulted-by-jeffrey-reimer-metlife-login-retirement.html \u2022 https://videolal.com/css/js/jquery-ui.min.js",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/4998a7eac2a056833d01ee1e60c68c1f83f9ad6cd790ced9511e73cc12780f3c",
        "\u2192https://otx.alienvault.com/pulse/65ef3723d27863fc33a6b671",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: IP 104.26.5.15",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
        "Relic: bam.nr-data.net [Apple Private Data Collection]",
        "http://systemforex.de/search/redirect.php?f= | http://it.marksypark.com | dont-delete.hugedomains.com | http://selfsparkcentral.com",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html \u2022 https://videolal.com/css/jquery-ui.css \u2022 http://videolal.com/tsara-brashears.html",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "\u2192https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
        "http://videolal.com/the-man-who-built-america-1.html \u2022 http://videolal.com/pinnacol-assurance-assaulted-by-jeffrey-",
        "http://appleid.icloud.com-website33.org/",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "william.ballenthin@fireeye.com contain a resource (.rsrc) section\tmoritz.raabe@fireeye.com | Pattern match: \"jloup@gzip.org\" & \"fancybox@3.5.7\"",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA256  00027d11309d55312ae77f32d4ae79671c91f541e577bace7a5a5abde05563ad",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "Attempted to send viewer to own server.",
        "CnC IP Addresses: 104.247.81.53 \u2022 185.64.219.6 \u2022 199.191.50.82 \u2022 203.107.45.167 \u2022 91.195.240.94 \u2022 167.235.143.33",
        "message.htm.com",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-MD5   6878e9896fdd84dcc11c997c9b7330ba",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA1   2e586f8db46953532b5e25e07add4dbaeea83a79",
        "http://videolal.com/jeff-reimer-dpt-buys-assault-victims-silence.html \u2022 http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html \u2022",
        "http://videolal.com/jeffrey-reimer-dpt-sexual-misconduct.html \u2022 http://videolal.com/tsara-brashears.html",
        "\u2192https://otx.alienvault.com/pulse/65eedf74b7bdda41057bef3e",
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "Videolal: 18.119.154.66:80 (endpoint request) \u2022 54.209.32.212 \u2022 http://videolal.com (phishing) \u2022 http://videolal.com/ \u2022 videolal.com \u2022 www.videolal.com \u2022",
        "Other:Malware-gen\\ [Trj] | FileHash-SHA256 0000ba467dd40046e240c11251d9db03636d0e7c6f9f96354a46a441c2003143",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html \u2022",
        "https://www.hugedomains.com/domain_profile.cfm?d=videolal.com \u2022 https://www.hugedomains.com/domain_profile.cfm?d=videolal.com\"",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "Other:Malware-gen\\ [Trj] | FileHash-MD5 b5168dab50187b33460201b35b96dea7",
        "api.login.live.com",
        "\u2192https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297",
        "FormBook: 45.159.189.105",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "capitana.onthewifi.com",
        "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/ \u2022",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "How about stop harming people",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "AA47 More AV Detection Ratio 984  / 1000 IDS Detections Win32.Renos/ArtroMALWARETrojan Checkin M1 Possible Fake AV Checkin Fakealert. AA47 More AV Detection Ratio 984  / 1000 IDS Detections /Trojan Checkin M1 Possible Fake AV Checkin Fakealert.",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "https://otx.alienvault.com/malware/Trojan:Win32%2FCrypterX/",
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/tsara-brashears.html \u2022 http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
        "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html \u2022 http://videolal.com/the-man-who-built-america-1.html",
        "injection_write_memory_exe \u2022 injection_ntsetcontextthread \u2022 dumped_buffer \u2022 checks_debugger \u2022 generates_crypto_key  \u2022 antivm_memory_available",
        "honey.exe",
        "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Virtool",
            "Emotet",
            "Win32:crypterx-gen\\ [trj]",
            "#lowfienabledtcontinueafterunpacking",
            "Tofsee",
            "Trojan:win32/cryptinject.sd!mtb",
            "Trojanspy",
            "Amadey",
            "Relic",
            "Win.trojan.knigsfot-125",
            "Artro",
            "Win.adware.relevantknowledge-9821121-0",
            "Trojan:win32/glupteba.km!mtb",
            "Alf:heraklezeval:trojan:win32/neurevt",
            "W32.sality.pe",
            "Win.virus.polyransom-5704625-0",
            "Win.trojan.generic-9897526-0",
            "Slf:trojan:win32/grandoreiro.a",
            "Win32.renos/artro",
            "Virus.win32.virut.q",
            "Win.malware.fileinfector-9834127-0",
            "Trojan.win32.snovir.kfmibf",
            "Generic",
            "Trojanspy:win32/nivdort.de",
            "Other:malware-gen\\ [trj]",
            "Worm.bagle-44",
            "Win32:cryptor",
            "Win32:botx-gen\\ [trj]",
            "Hacktool",
            "Trojandropper:win32",
            "Win.trojan.generic-9957168-0",
            "Alf:trojandownloader:win32/vadokrist.a",
            "Win32:trojan-gen",
            "Emotet b",
            "I-worm/bagle.qe",
            "Formbook"
          ],
          "industries": [],
          "unique_indicators": 53168
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/zzciai.com",
    "whois": "http://whois.domaintools.com/zzciai.com",
    "domain": "zzciai.com",
    "hostname": "pull.zzciai.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "65eb9b88c811f35e060a2aa5",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Crimes of Tracey Richter\"",
      "description": "",
      "modified": "2024-08-14T06:01:01.267000",
      "created": "2024-03-08T23:13:12.950000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65ea64dbc3938c6472fd5e7b",
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 121,
        "FileHash-SHA1": 120,
        "FileHash-SHA256": 1086,
        "URL": 391,
        "domain": 285,
        "hostname": 369,
        "email": 1
      },
      "indicator_count": 2373,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "613 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eff46bdd371899ca5be7d7",
      "name": "CrypterX-gen | Video-lal.com | M. Brian Sabey \u2022 Hall Render | Rexxfield",
      "description": "Videolal results. Parked. Owner of domain has subsidiaries including Huge Domains. It's possible for attacker to post a 404 error page,  park, post it for sale, malvertize. HoneyPotBot? \n\nFireeye. A bit much. william.ballenthin@fireeye.com\t\ncontain a resource (.rsrc) section moritz.raabe@fireeye.com. Overkill. What would Scooby Doo? Scooby!? \nTarget reports opening her MacBook Pro after it was replaced by Apple. It hadn't been in use. She opened it, surprised it was on, automatically connected to a store wifi (she was home) A worker was typing away in terminal. Fought hacker for recordings app containing Jeffrey Reimers aggressions. She lost. Terrified she murdered her MacBook by drowning  & dismemberment. Big mistake. Cloned MacBook.  Clicked on links trigger malicious downloads, network & DNS issues.",
      "modified": "2024-04-11T04:01:24.166000",
      "created": "2024-03-12T06:21:31.484000",
      "tags": [
        "upatre malware",
        "rwi dtools",
        "page dow",
        "security",
        "bitfender",
        "yandex",
        "malware",
        "all octoseek",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "file score",
        "fireeye",
        "injection",
        "worm",
        "trojan",
        "network",
        "poster",
        "honeybots",
        "united",
        "unknown",
        "win32upatre mar",
        "passive dns",
        "entries",
        "ipv4",
        "body",
        "artro",
        "generic malware",
        "formbook",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "generic",
        "hostnames",
        "pattern match",
        "ascii text",
        "png image",
        "root ca",
        "file",
        "authority",
        "indicator",
        "mitre att",
        "ck id",
        "class",
        "date",
        "enterprise",
        "hybrid",
        "accept",
        "general",
        "local",
        "click",
        "strings",
        "trident",
        "as47846",
        "germany unknown",
        "as2906 netflix",
        "scan endpoints",
        "domain",
        "urls",
        "files",
        "trojanspy",
        "mozilla",
        "dynamicloader",
        "medium",
        "title",
        "ms windows",
        "head",
        "intel",
        "inetsim http",
        "delete c",
        "show",
        "winnt",
        "copy",
        "powershell",
        "write",
        "next",
        "suspicious",
        "shop",
        "graph api",
        "status",
        "join",
        "vt community",
        "api key",
        "xcitium verdict",
        "cloud",
        "contacted",
        "contacted urls",
        "ssl certificate",
        "referrer",
        "historical ssl",
        "parent domain",
        "apple ios",
        "resolutions",
        "execution",
        "hacktool",
        "outbound connection",
        "detection list",
        "blacklist"
      ],
      "references": [
        "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/ \u2022",
        "http://systemforex.de/search/redirect.php?f= | http://it.marksypark.com | dont-delete.hugedomains.com | http://selfsparkcentral.com",
        "william.ballenthin@fireeye.com contain a resource (.rsrc) section\tmoritz.raabe@fireeye.com | Pattern match: \"jloup@gzip.org\" & \"fancybox@3.5.7\"",
        "FormBook: 104.247.81.53 \u2022 http://www.nimtax.com/k9/,Formbook,Medium,9/9/2019,1/7/2020",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-MD5   6878e9896fdd84dcc11c997c9b7330ba",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA1   2e586f8db46953532b5e25e07add4dbaeea83a79",
        "Win32:CrypterX-gen\\ [Trj] | FileHash-SHA256  00027d11309d55312ae77f32d4ae79671c91f541e577bace7a5a5abde05563ad",
        "Win32/Renos: https://otx.alienvault.com/malware/ALF:JASYP:TrojanDownloader:Win32%2FRenos/",
        "Other:Malware-gen\\ [Trj] | FileHash-MD5 b5168dab50187b33460201b35b96dea7",
        "Other:Malware-gen\\ [Trj] | FileHash-SHA1 68868b3d0115e3d06f5fddb9d2ea6ad54270166c",
        "Other:Malware-gen\\ [Trj] | FileHash-SHA256 0000ba467dd40046e240c11251d9db03636d0e7c6f9f96354a46a441c2003143",
        "allocates_execute_remote_process \u2022 injection_write_memory \u2022 injection_resumethread \u2022 packer_entropy \u2022 network _icmp \u2022 injection_runpe",
        "injection_write_memory_exe \u2022 injection_ntsetcontextthread \u2022 dumped_buffer \u2022 checks_debugger \u2022 generates_crypto_key  \u2022 antivm_memory_available",
        "CnC IP Addresses: 104.247.81.53 \u2022 185.64.219.6 \u2022 199.191.50.82 \u2022 203.107.45.167 \u2022 91.195.240.94 \u2022 167.235.143.33",
        "AA47 More AV Detection Ratio 984  / 1000 IDS Detections Win32.Renos/ArtroMALWARETrojan Checkin M1 Possible Fake AV Checkin Fakealert. AA47 More AV Detection Ratio 984  / 1000 IDS Detections /Trojan Checkin M1 Possible Fake AV Checkin Fakealert.",
        "Videolal: 18.119.154.66:80 (endpoint request) \u2022 54.209.32.212 \u2022 http://videolal.com (phishing) \u2022 http://videolal.com/ \u2022 videolal.com \u2022 www.videolal.com \u2022",
        "www.videolal.com \u2022 httpvideolal.com \u2022 https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct.html",
        "https://www.hugedomains.com/domain_profile.cfm?d=videolal.com \u2022 https://www.hugedomains.com/domain_profile.cfm?d=videolal.com\"",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html \u2022",
        "https://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
        "https://videolal.com/videos/tsara-brashears-assaulted-by-jeffrey-reimer-metlife-login-retirement.html \u2022 https://videolal.com/css/js/jquery-ui.min.js",
        "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html \u2022 https://videolal.com/css/jquery-ui.css \u2022 http://videolal.com/tsara-brashears.html",
        "http://videolal.com/tsara-brashears-dead.html \u2022 http://videolal.com/tsara-brashears.html \u2022 http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "http://videolal.com/jeffrey-reimer-dpt-sexual-misconduct.html \u2022 http://videolal.com/tsara-brashears.html",
        "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html \u2022 http://videolal.com/the-man-who-built-america-1.html",
        "http://videolal.com/the-man-who-built-america-1.html \u2022 http://videolal.com/pinnacol-assurance-assaulted-by-jeffrey-",
        "http://videolal.com/jeffrey-reimer-dpt-physical-therapy-assaulted-patient.html \u2022 http://videolal.com/jeff-reimer-",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html \u2022",
        "http://videolal.com/jeff-reimer-dpt-buys-assault-victims-silence.html \u2022 http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/4998a7eac2a056833d01ee1e60c68c1f83f9ad6cd790ced9511e73cc12780f3c",
        "https://otx.alienvault.com/malware/Trojan:Win32%2FCrypterX/",
        "\u2192https://otx.alienvault.com/pulse/65eedf74b7bdda41057bef3e",
        "\u2192https://otx.alienvault.com/pulse/65ef3723d27863fc33a6b671",
        "\u2192https://otx.alienvault.com/pulse/65e85fd4842119fff4e327cf",
        "\u2192https://otx.alienvault.com/pulse/65e843669f4ba77affa4b297"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win32:CrypterX-gen\\ [Trj]",
          "display_name": "Win32:CrypterX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Other:Malware-gen\\ [Trj]",
          "display_name": "Other:Malware-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Artro",
          "display_name": "Artro",
          "target": null
        },
        {
          "id": "Win32.Renos/Artro",
          "display_name": "Win32.Renos/Artro",
          "target": null
        },
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "I-Worm/Bagle.QE",
          "display_name": "I-Worm/Bagle.QE",
          "target": null
        },
        {
          "id": "Worm.Bagle-44",
          "display_name": "Worm.Bagle-44",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.DE",
          "display_name": "TrojanSpy:Win32/Nivdort.DE",
          "target": "/malware/TrojanSpy:Win32/Nivdort.DE"
        },
        {
          "id": "Win.Trojan.Generic-9897526-0",
          "display_name": "Win.Trojan.Generic-9897526-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Knigsfot-125",
          "display_name": "Win.Trojan.Knigsfot-125",
          "target": null
        },
        {
          "id": "ALF:TrojanDownloader:Win32/Vadokrist.A",
          "display_name": "ALF:TrojanDownloader:Win32/Vadokrist.A",
          "target": null
        },
        {
          "id": "Win.Trojan.Generic-9957168-0",
          "display_name": "Win.Trojan.Generic-9957168-0",
          "target": null
        },
        {
          "id": "Win.Adware.RelevantKnowledge-9821121-0",
          "display_name": "Win.Adware.RelevantKnowledge-9821121-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Neurevt",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 42,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1622,
        "FileHash-SHA1": 934,
        "FileHash-SHA256": 3289,
        "URL": 9605,
        "domain": 2321,
        "hostname": 2411,
        "CVE": 1,
        "email": 3
      },
      "indicator_count": 20186,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "738 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e863bebbf95e0dc5a4169a",
      "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack expected",
      "description": "Network compromised updated Apple device was directed (303) to a server. This is one of several botnets found. onthewifi \u2206 {Win32:BotX-gen\\ [Trj]} \u2022 Injection process | Password bypass. Studies targets behavior | Checks for other devices | Glupteba: \n Glupteba is a trojan-type program, malicious software that installs other programs of this type. Cyber criminals can perform a number of actions of a malicious hacker's choice on your device.",
      "modified": "2024-04-05T12:00:46.637000",
      "created": "2024-03-06T12:38:22.052000",
      "tags": [
        "referrer",
        "tsara brashears",
        "password bypass",
        "apple phone",
        "unlocker",
        "shell code",
        "script",
        "pe resource",
        "execution",
        "sneaky server",
        "emotet",
        "android",
        "download",
        "malware",
        "relic",
        "monitoring",
        "installer",
        "formbook",
        "urls",
        "contacted",
        "win32 exe",
        "parents",
        "type name",
        "msrsaapp",
        "files",
        "file type",
        "kb file",
        "b file",
        "graph",
        "pe32 executable",
        "ms windows",
        "intel",
        "generic cil",
        "executable",
        "mono",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "samplename",
        "samplepath",
        "jays youtube",
        "rticon neutral",
        "details",
        "header intel",
        "name md5",
        "type",
        "language",
        "contained",
        "ico rtgroupicon",
        "neutral",
        "net technology",
        "corporation",
        "domains",
        "markmonitor inc",
        "malicious",
        "cnc",
        "network",
        "bypass password",
        "network probe",
        "dns query",
        "as20940",
        "united",
        "aaaa",
        "search",
        "showing",
        "date",
        "passive dns",
        "registrar",
        "unknown",
        "encrypt",
        "next",
        "domain",
        "emails",
        "name servers",
        "as199524",
        "record value",
        "rst seen",
        "last seen",
        "asn country",
        "cname",
        "as15169 google",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files ip",
        "as4788",
        "address",
        "pulses",
        "win32",
        "entries",
        "dadjoke",
        "ms defender",
        "united kingdom",
        "germany unknown",
        "as46606",
        "as14061",
        "servers",
        "as12576 ee",
        "russia unknown",
        "as3320 deutsche",
        "gamaredon",
        "armageddon",
        "as8068",
        "script urls",
        "for privacy",
        "script domains",
        "certificate",
        "meta",
        "creation date",
        "as14627",
        "ipv4",
        "onthewifi",
        "as54113",
        "trojan",
        "flywheel",
        "sea x",
        "accept",
        "ransom",
        "post http",
        "langserbian",
        "sublangdefault",
        "rticon",
        "process32nextw",
        "medium",
        "t1055",
        "high",
        "ip address",
        "generic",
        "body",
        "markus",
        "june",
        "copy",
        "bitcoin"
      ],
      "references": [
        "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
        "FormBook: 45.159.189.105",
        "FormBook: http://45.159.189.105/bot/regex",
        "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
        "Relic: bam.nr-data.net [Apple Private Data Collection]",
        "capitana.onthewifi.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32:Cryptor",
          "display_name": "Win32:Cryptor",
          "target": null
        },
        {
          "id": "Win.Virus.PolyRansom-5704625-0",
          "display_name": "Win.Virus.PolyRansom-5704625-0",
          "target": null
        },
        {
          "id": "SLF:Trojan:Win32/Grandoreiro.A",
          "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.KM!MTB",
          "display_name": "Trojan:Win32/Glupteba.KM!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1188",
          "name": "Multi-hop Proxy",
          "display_name": "T1188 - Multi-hop Proxy"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 309,
        "FileHash-SHA1": 307,
        "FileHash-SHA256": 3084,
        "URL": 3066,
        "domain": 1085,
        "hostname": 1709,
        "CVE": 1,
        "email": 7
      },
      "indicator_count": 9568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "744 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea6410c1e1b1185951ef98",
      "name": "Win32:BotX-gen\\ [Trj] \u2022Jays Youtube Bot.exe attack executed (Copy)",
      "description": "",
      "modified": "2024-04-05T12:00:46.637000",
      "created": "2024-03-08T01:04:16.906000",
      "tags": [
        "referrer",
        "tsara brashears",
        "password bypass",
        "apple phone",
        "unlocker",
        "shell code",
        "script",
        "pe resource",
        "execution",
        "sneaky server",
        "emotet",
        "android",
        "download",
        "malware",
        "relic",
        "monitoring",
        "installer",
        "formbook",
        "urls",
        "contacted",
        "win32 exe",
        "parents",
        "type name",
        "msrsaapp",
        "files",
        "file type",
        "kb file",
        "b file",
        "graph",
        "pe32 executable",
        "ms windows",
        "intel",
        "generic cil",
        "executable",
        "mono",
        "win32 dynamic",
        "link library",
        "win16 ne",
        "samplename",
        "samplepath",
        "jays youtube",
        "rticon neutral",
        "details",
        "header intel",
        "name md5",
        "type",
        "language",
        "contained",
        "ico rtgroupicon",
        "neutral",
        "net technology",
        "corporation",
        "domains",
        "markmonitor inc",
        "malicious",
        "cnc",
        "network",
        "bypass password",
        "network probe",
        "dns query",
        "as20940",
        "united",
        "aaaa",
        "search",
        "showing",
        "date",
        "passive dns",
        "registrar",
        "unknown",
        "encrypt",
        "next",
        "domain",
        "emails",
        "name servers",
        "as199524",
        "record value",
        "rst seen",
        "last seen",
        "asn country",
        "cname",
        "as15169 google",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files ip",
        "as4788",
        "address",
        "pulses",
        "win32",
        "entries",
        "dadjoke",
        "ms defender",
        "united kingdom",
        "germany unknown",
        "as46606",
        "as14061",
        "servers",
        "as12576 ee",
        "russia unknown",
        "as3320 deutsche",
        "gamaredon",
        "armageddon",
        "as8068",
        "script urls",
        "for privacy",
        "script domains",
        "certificate",
        "meta",
        "creation date",
        "as14627",
        "ipv4",
        "onthewifi",
        "as54113",
        "trojan",
        "flywheel",
        "sea x",
        "accept",
        "ransom",
        "post http",
        "langserbian",
        "sublangdefault",
        "rticon",
        "process32nextw",
        "medium",
        "t1055",
        "high",
        "ip address",
        "generic",
        "body",
        "markus",
        "june",
        "copy",
        "bitcoin"
      ],
      "references": [
        "FormBook: FileHash-SHA256 5b9fa34fac18f4084221969800faddfe1cf0afc22d601d211ee695934e7d62cb",
        "FormBook: 45.159.189.105",
        "FormBook: http://45.159.189.105/bot/regex",
        "Emotet: www.youtube.com/watch?v=GyuMozsVyYs",
        "Relic: bam.nr-data.net [Apple Private Data Collection]",
        "capitana.onthewifi.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32:Cryptor",
          "display_name": "Win32:Cryptor",
          "target": null
        },
        {
          "id": "Win.Virus.PolyRansom-5704625-0",
          "display_name": "Win.Virus.PolyRansom-5704625-0",
          "target": null
        },
        {
          "id": "SLF:Trojan:Win32/Grandoreiro.A",
          "display_name": "SLF:Trojan:Win32/Grandoreiro.A",
          "target": null
        },
        {
          "id": "Win32:BotX-gen\\ [Trj]",
          "display_name": "Win32:BotX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Trojan:Win32/Glupteba.KM!MTB",
          "display_name": "Trojan:Win32/Glupteba.KM!MTB",
          "target": "/malware/Trojan:Win32/Glupteba.KM!MTB"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1188",
          "name": "Multi-hop Proxy",
          "display_name": "T1188 - Multi-hop Proxy"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65e863bebbf95e0dc5a4169a",
      "export_count": 47,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 309,
        "FileHash-SHA1": 307,
        "FileHash-SHA256": 3084,
        "URL": 3066,
        "domain": 1085,
        "hostname": 1709,
        "CVE": 1,
        "email": 7
      },
      "indicator_count": 9568,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "744 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e843669f4ba77affa4b297",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"",
      "description": "303 Error redirect target to desired service. | Likely using infected, updated apple Product. | Jays Youtube Bot.exe found. | Target saw episode subject, was suspicious due to 'diabolical women' connection promoted by Rexxfield[.] com (Tracey Richters ex-husband). I believe she was framed as is target I have come across. YouTube accounts are only told from the perspective of 2 ex-husbands, 1 doctor, 1 hacker and dentist[assaulter] who abused power. This trap makes targets look crazy, non credible leaving them traumatized. Attorneys or law enforcement likely  overwhelmed, wild stories. I often consider truth is can be much stranger than fiction. Fiction often loosely based on truth.",
      "modified": "2024-04-05T09:00:01.502000",
      "created": "2024-03-06T10:20:22.440000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 52,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 115,
        "FileHash-SHA1": 114,
        "FileHash-SHA256": 952,
        "URL": 285,
        "domain": 257,
        "hostname": 285,
        "email": 1
      },
      "indicator_count": 2009,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "744 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65ea64dbc3938c6472fd5e7b",
      "name": "Emotet | YouTube \u2022 Darklivity Podcast \"Unhinged Horror\"  Crimes of Tracey Richter",
      "description": "",
      "modified": "2024-04-05T09:00:01.502000",
      "created": "2024-03-08T01:07:39.514000",
      "tags": [
        "communicating",
        "replacement",
        "unauthorized",
        "cyber attack",
        "emotet",
        "suspicious",
        "ransom",
        "Jays Youtube Bot.exe",
        "united",
        "unknown",
        "passive dns",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "accept",
        "pragma",
        "injection",
        "downloader",
        "as44273 host",
        "search",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "next",
        "body",
        "entries",
        "object",
        "com cnt",
        "dem fin",
        "gov int",
        "nav onl",
        "phy pre",
        "pur sta",
        "win32",
        "as15169 google",
        "aaaa",
        "domain",
        "pulse pulses",
        "urls",
        "contacted",
        "contacted urls",
        "whois whois",
        "pcname",
        "machinename",
        "execution",
        "bundled",
        "whois sneaky",
        "smokeloader",
        "amadey",
        "android",
        "youtube",
        "darklivity podcast",
        "tracey richter",
        "michael roberts",
        "server redirect",
        "hacking",
        "botnet",
        "application/binary",
        "jomax",
        "early, iowa",
        "hacker",
        "ruthless",
        "colorado",
        "pitman and or dentist  hired roberts obvi",
        "song culture",
        "tsara brashears"
      ],
      "references": [
        "www.youtube.com/watch?v=GyuMozsVyYs [Emotet] Songculture linked to Darklivity Podcast",
        "https://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2 [https://b.link/infringementhttps://www.youtube.com/watch?v=ucEkWcFuH0Y&list=TLPQMDgwNjIwMjKO_xApd0GzPQ&index=2]",
        "message.htm.com [Ransom | Malware Spreader]",
        "Ransom: FileHash-MD5 cece27e27fcad115504a2dc155358dae",
        "Ransom: FileHash-SHA1 90f739d446a6cab0a73086e56b1473e3c05ab752",
        "Ransom: FileHash-SHA256 c2f7df5c2fd585ba533fca2c2f1933bec36c4713ed5351a3656ddefee71c4cea",
        "Tracey Richter Roberts convicted murderer  framed IMO]  Michael Roberts suspect [self promoting hacker/PI]",
        "Jays Youtube Bot.exe: FileHash-SHA256 00514527e00ee001d042e5963b7c69f01060c4b4bc5064319c4af853a3d162c5 \u2022 303 status redirect to Bot server.",
        "host.secureserver.net \u2022 htm.com \u2022 rue.services \u2022 199.22.109.208.host.secureserver.net \u2022 n1s.18b.mywebsitetransfer.com \u2022 mywebsitetransfer.com",
        "godaddy.com \u2022 prod.phx3.secureserver.net",
        "Trojan.Win32.Snovir.kfmibf | FreeYTVDownloader.exe: FileHash-SHA256 3f5576bcd7bab6cf302bfaaa151f5807aac0b80ad01879662c01ca83ebf457ab",
        "Tea Conquer Bot.exe | FileHash-SHA256 00fc3c28ee517b91128d25c65eeddcd8dac2328447566e94732a3c92b71bfee5",
        "Amadey: FileHash-MD5 9a0b7ee713610b8395c8f0580a3b1e3d",
        "Amadey: FileHash-SHA1\te44a9e7ec6fe06ae6ba1b9518db78e95ad451942",
        "Amadey: FileHash-SHA256 6b8e428cff996c49aa52e017213c7016880a2bc1583d051240c74992bf83c357",
        "Amadey: IP 104.26.5.15",
        "CS IDS: ET INFO Android Device Connectivity Check [Low Risk] was executed.",
        "Attempted to send viewer to own server.",
        "How about stop harming people"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "#LowFiEnableDTContinueAfterUnpacking",
          "display_name": "#LowFiEnableDTContinueAfterUnpacking",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Trojan.Win32.Snovir.kfmibf",
          "display_name": "Trojan.Win32.Snovir.kfmibf",
          "target": null
        },
        {
          "id": "AMADEY",
          "display_name": "AMADEY",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e843669f4ba77affa4b297",
      "export_count": 48,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 115,
        "FileHash-SHA1": 114,
        "FileHash-SHA256": 952,
        "URL": 285,
        "domain": 257,
        "hostname": 285,
        "email": 1
      },
      "indicator_count": 2009,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "744 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c7b86fa120d19bbc88f367",
      "name": "Hijacker",
      "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
      "modified": "2024-03-11T17:01:59.026000",
      "created": "2024-02-10T17:54:55.243000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "tsara brashears",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "high level",
        "hackers",
        "hacktool",
        "download",
        "malware",
        "crypto",
        "hijacker",
        "monitoring",
        "installer",
        "tofsee",
        "domains domains",
        "domains files",
        "files files",
        "script",
        "kgs0",
        "kls0",
        "relic",
        "iframe",
        "pe32 executable",
        "ms windows",
        "intel",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "rticon neutral",
        "info compiler",
        "products id",
        "header intel",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "neutral",
        "first",
        "utc submissions",
        "submitters",
        "company limited",
        "computer",
        "amazonaes",
        "china telecom",
        "group",
        "csc corporate",
        "domains",
        "malware spreading evader",
        "cnc",
        "malvertizing",
        "milehighmedia",
        "trojandropper",
        "moved",
        "passive dns",
        "urls",
        "as14576",
        "backdoor",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "trojan",
        "encrypt",
        "body",
        "date",
        "date hash",
        "avast avg",
        "mtb may",
        "kratona",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls https",
        "script urls",
        "united",
        "meta",
        "unknown",
        "emails",
        "name servers",
        "search",
        "as62597 nsone",
        "a domains",
        "as397241",
        "media",
        "next",
        "december",
        "unlocker",
        "threat round",
        "apple ios",
        "apple phone",
        "project",
        "blister",
        "agent tesla",
        "open",
        "execution",
        "videos",
        "strong",
        "porn videos",
        "watch",
        "daddy",
        "free",
        "top rated",
        "most viewed",
        "cancel anytime",
        "views",
        "play",
        "black",
        "enjoy",
        "czech",
        "hunk",
        "virtool",
        "cryp",
        "creation date",
        "otx telemetry",
        "expiration date",
        "servers",
        "status",
        "win32",
        "showing",
        "domain",
        "nxdomain",
        "as8075",
        "shell code",
        "threat",
        "cyber espionage",
        "cyber stalking",
        "danger",
        "critical",
        "attack",
        "treats",
        "as15169 google",
        "aaaa",
        "record value",
        "error",
        "entries",
        "hostname",
        "url http",
        "http",
        "files domain",
        "files related",
        "shinjiru msc",
        "sdn bhd",
        "dnssec",
        "protect",
        "as54455 madeit",
        "phishing",
        "backdoor",
        "contextualizing",
        "elevated exposure",
        "malvertizing",
        "ransom",
        "msil",
        "hackers for hire",
        "hashes",
        "http method",
        "get http",
        "http requests",
        "get dns",
        "ip traffic",
        "memory pattern",
        "pattern ips",
        "@emreimer",
        "iextract2",
        "cp cyber",
        "denver",
        "security",
        "siem compliance",
        "skip",
        "cybersecurity",
        "larimer st",
        "suite",
        "resources cyber",
        "risk assessment",
        "bill",
        "mind",
        "delaware",
        "pa",
        "arizona",
        "colorado",
        "stalkers",
        "deuteronomy 28:7",
        "hitmen"
      ],
      "references": [
        "honey.exe",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "api.login.live.com",
        "http://appleid.icloud.com-website33.org/",
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
        "message.htm.com",
        "http://pornhub.com/gay/video/search",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "W32.Sality.PE",
          "display_name": "W32.Sality.PE",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Virus.Win32.Virut.q",
          "display_name": "Virus.Win32.Virut.q",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32",
          "display_name": "TrojanDropper:Win32",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 54,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6303,
        "FileHash-MD5": 215,
        "FileHash-SHA1": 192,
        "FileHash-SHA256": 2663,
        "domain": 2673,
        "hostname": 2686,
        "CVE": 2,
        "email": 16
      },
      "indicator_count": 14750,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "769 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab5eb4d0a233bf6f32edb",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:20:59.154000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "769 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab601f0d674294b603758",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:21:21.869000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "769 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab60667f8205c19d6b67b",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:21:26.244000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "769 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://pull.zzciai.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://pull.zzciai.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631709.5623724
}