{
  "type": "URL",
  "indicator": "https://qa.amway.co.th",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://qa.amway.co.th",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4098027153,
      "indicator": "https://qa.amway.co.th",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 3,
      "pulses": [
        {
          "id": "6910cafb096eae0dcb39a800",
          "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
          "description": "Chronicles of how  quasi government , a State owned criminal defense attorney , protects sexual assaulter Jeffrey Reimer DPT.   victim Palantir harassed, withheld healthcare , diagnoses, justice, monetary award for injured, stole insurance policies, hacked Denver artists, sold music her to artists whom profited, hacked  Denver music studios, hired stalkers, human, controlled phone , car and everything in targets life including , doctors, attorneys, hospitals. It\u2019s always been clear to coming us that Anonymous and Lazarus are the police, judge , lawyer, ransom racist.\nThis group alone has cost the US billions! Responsible for 2014 Sony hack , FMOE.\nDirect Link. by phone , email in person contact , forced settlement hearing,. Adversarial Christopher P. Ahmann , relationship w / Lazarus group, hitmen , cyber crime and other crimes against persons.\n #rip #christopher_ahmann #palantir #lazarus #target_tsara_brashears",
          "modified": "2025-12-09T17:03:48.645000",
          "created": "2025-11-09T17:10:19.498000",
          "tags": [
            "url http",
            "apple",
            "california",
            "apple public",
            "server rsa",
            "organization",
            "stateprovince",
            "ocsp",
            "nids united",
            "files",
            "united",
            "unknown ns",
            "ip address",
            "domain",
            "urls files",
            "passive dns",
            "found title",
            "sf hello",
            "myriad set",
            "pro myriad",
            "set lucida",
            "grande arial",
            "sf mono",
            "ipv4",
            "location united",
            "america flag",
            "america asn",
            "verdict",
            "files ip",
            "address",
            "as42 woodynet",
            "domain add",
            "ipv4 add",
            "reverse dns",
            "trojan",
            "name servers",
            "emails",
            "for privacy",
            "ltd dba",
            "com laude",
            "servers",
            "expiration date",
            "urls",
            "meta",
            "a domains",
            "country code",
            "store home",
            "title",
            "accept",
            "espaol",
            "english",
            "evil corp",
            "see all",
            "cyber hack",
            "republic",
            "canada",
            "season",
            "joe tidy",
            "sarah rainsford",
            "podcast",
            "bank",
            "ukraine",
            "dead",
            "indonesia",
            "police",
            "premium",
            "napoleon",
            "revolution",
            "michelangelo",
            "mozart",
            "global",
            "solid",
            "lazarus",
            "jabber zeus",
            "harrods",
            "ta markmonitor",
            "markmonitor",
            "search",
            "present aug",
            "unknown aaaa",
            "unknown soa",
            "win32",
            "invalid url",
            "trojanspy",
            "mtb apr",
            "backdoor",
            "next associated",
            "win64",
            "trojandropper",
            "twitter",
            "virtool",
            "ransom",
            "worm",
            "dynamicloader",
            "tlsv1",
            "high",
            "globalc",
            "medium",
            "windows",
            "cmd c",
            "delete c",
            "stream",
            "write",
            "next",
            "process32nextw",
            "http host",
            "dns query",
            "likely gandcrab",
            "et trojan",
            "windows nt",
            "wow64",
            "malware",
            "ms windows",
            "as16509",
            "as54113",
            "yara rule",
            "pe32 executable",
            "as15169",
            "powershell",
            "unknown",
            "response ip",
            "address google",
            "safe browsing",
            "hostname add",
            "port",
            "destination",
            "pe32",
            "intel",
            "error",
            "show",
            "delphi",
            "dcom",
            "form",
            "canvas",
            "united kingdom",
            "content type",
            "security",
            "moved",
            "great britain",
            "unknown a",
            "body doctype",
            "html public",
            "ietfdtd html",
            "showing",
            "packing t1045",
            "bytes",
            "read",
            "default",
            "christoper p ahmann",
            "target",
            "victims",
            "tsara brashears",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "present nov",
            "present oct",
            "date",
            "tcpmemhit",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "palantir",
            "foundry",
            "hitmen",
            "quasi",
            "government contracts",
            "jeffrey reimer",
            "hallrender",
            "workers compensation",
            "record value",
            "certificate"
          ],
          "references": [
            "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
            "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "bpc-old.palantirfoundry.com",
            "OTX auto populated  targeted groups.",
            "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
            "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
            "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
            "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
            "They blatantly steal from citizens , blame foreign entities.",
            "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
          ],
          "public": 1,
          "adversary": "Lazarus",
          "targeted_countries": [
            "Bangladesh",
            "Japan",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:SpikeAexR.PEVPSZL",
              "display_name": "ALF:SpikeAexR.PEVPSZL",
              "target": null
            },
            {
              "id": "Ransom:MSIL/GandCrab",
              "display_name": "Ransom:MSIL/GandCrab",
              "target": "/malware/Ransom:MSIL/GandCrab"
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "Ransom:Win32/Gandcrab.H!MTB",
              "display_name": "Ransom:Win32/Gandcrab.H!MTB",
              "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [
            "Banks",
            "Crypto",
            "Entertainment",
            "Bank"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4572,
            "FileHash-MD5": 196,
            "domain": 1523,
            "hostname": 1393,
            "FileHash-SHA256": 2400,
            "FileHash-SHA1": 175,
            "email": 18,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 10285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "131 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69138a8144a8bf8040a92711",
          "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Counsel for egregious criminal acts \u2022 Christopher P. Ahmann attorney at Large",
          "description": "",
          "modified": "2025-12-09T17:03:48.645000",
          "created": "2025-11-11T19:12:01.843000",
          "tags": [
            "url http",
            "apple",
            "california",
            "apple public",
            "server rsa",
            "organization",
            "stateprovince",
            "ocsp",
            "nids united",
            "files",
            "united",
            "unknown ns",
            "ip address",
            "domain",
            "urls files",
            "passive dns",
            "found title",
            "sf hello",
            "myriad set",
            "pro myriad",
            "set lucida",
            "grande arial",
            "sf mono",
            "ipv4",
            "location united",
            "america flag",
            "america asn",
            "verdict",
            "files ip",
            "address",
            "as42 woodynet",
            "domain add",
            "ipv4 add",
            "reverse dns",
            "trojan",
            "name servers",
            "emails",
            "for privacy",
            "ltd dba",
            "com laude",
            "servers",
            "expiration date",
            "urls",
            "meta",
            "a domains",
            "country code",
            "store home",
            "title",
            "accept",
            "espaol",
            "english",
            "evil corp",
            "see all",
            "cyber hack",
            "republic",
            "canada",
            "season",
            "joe tidy",
            "sarah rainsford",
            "podcast",
            "bank",
            "ukraine",
            "dead",
            "indonesia",
            "police",
            "premium",
            "napoleon",
            "revolution",
            "michelangelo",
            "mozart",
            "global",
            "solid",
            "lazarus",
            "jabber zeus",
            "harrods",
            "ta markmonitor",
            "markmonitor",
            "search",
            "present aug",
            "unknown aaaa",
            "unknown soa",
            "win32",
            "invalid url",
            "trojanspy",
            "mtb apr",
            "backdoor",
            "next associated",
            "win64",
            "trojandropper",
            "twitter",
            "virtool",
            "ransom",
            "worm",
            "dynamicloader",
            "tlsv1",
            "high",
            "globalc",
            "medium",
            "windows",
            "cmd c",
            "delete c",
            "stream",
            "write",
            "next",
            "process32nextw",
            "http host",
            "dns query",
            "likely gandcrab",
            "et trojan",
            "windows nt",
            "wow64",
            "malware",
            "ms windows",
            "as16509",
            "as54113",
            "yara rule",
            "pe32 executable",
            "as15169",
            "powershell",
            "unknown",
            "response ip",
            "address google",
            "safe browsing",
            "hostname add",
            "port",
            "destination",
            "pe32",
            "intel",
            "error",
            "show",
            "delphi",
            "dcom",
            "form",
            "canvas",
            "united kingdom",
            "content type",
            "security",
            "moved",
            "great britain",
            "unknown a",
            "body doctype",
            "html public",
            "ietfdtd html",
            "showing",
            "packing t1045",
            "bytes",
            "read",
            "default",
            "christoper p ahmann",
            "target",
            "victims",
            "tsara brashears",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "p1377925676",
            "gaz1",
            "sid1696503456",
            "present nov",
            "present oct",
            "date",
            "tcpmemhit",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "sha256",
            "sha1",
            "mitre att",
            "pattern match",
            "show technique",
            "ck matrix",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "palantir",
            "foundry",
            "hitmen",
            "quasi",
            "government contracts",
            "jeffrey reimer",
            "hallrender",
            "workers compensation",
            "record value",
            "certificate"
          ],
          "references": [
            "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
            "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
            "https://tamlegal.com/attorneys/christopher-p-ahmann/",
            "bpc-old.palantirfoundry.com",
            "OTX auto populated  targeted groups.",
            "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
            "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
            "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
            "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
            "They blatantly steal from citizens , blame foreign entities.",
            "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
          ],
          "public": 1,
          "adversary": "Lazarus",
          "targeted_countries": [
            "Bangladesh",
            "Japan",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:SpikeAexR.PEVPSZL",
              "display_name": "ALF:SpikeAexR.PEVPSZL",
              "target": null
            },
            {
              "id": "Ransom:MSIL/GandCrab",
              "display_name": "Ransom:MSIL/GandCrab",
              "target": "/malware/Ransom:MSIL/GandCrab"
            },
            {
              "id": "Zeus",
              "display_name": "Zeus",
              "target": null
            },
            {
              "id": "Ransom:Win32/Gandcrab.H!MTB",
              "display_name": "Ransom:Win32/Gandcrab.H!MTB",
              "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [
            "Banks",
            "Crypto",
            "Entertainment",
            "Bank"
          ],
          "TLP": "white",
          "cloned_from": "6910cafb096eae0dcb39a800",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4572,
            "FileHash-MD5": 196,
            "domain": 1523,
            "hostname": 1393,
            "FileHash-SHA256": 2400,
            "FileHash-SHA1": 175,
            "email": 18,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 10285,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "131 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d30048b95aaba628a5ee7",
          "name": "Working on it\u2026\u2026",
          "description": "\u2022 Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\n(onyx-ware.com)\nNS1.ENDGAME.COM\n(endgames.us)\nNS1.ENDGAME.COM\n#deadmau5 #janskyofficial #idk #soundcloud",
          "modified": "2025-08-19T17:00:59.379000",
          "created": "2025-07-20T18:05:56.587000",
          "tags": [
            "dynamicloader",
            "united",
            "as15169",
            "medium",
            "search",
            "show",
            "write c",
            "whitelisted",
            "brazil as396982",
            "high",
            "themida",
            "write",
            "delphi",
            "copy",
            "upatre",
            "encrypt",
            "june",
            "win32",
            "malware",
            "win64",
            "windows nt",
            "directui",
            "element",
            "classinfobase",
            "value",
            "hwndhost",
            "sapeav12",
            "delete c",
            "worm",
            "explorer",
            "insert",
            "movie",
            "alerts",
            "windows",
            "installs",
            "filehash",
            "sha256 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "passive dns",
            "urls",
            "http",
            "ip address",
            "related nids",
            "files location",
            "spain flag",
            "spain domain",
            "files related",
            "spain",
            "entries",
            "next associated",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "filehashsha256",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "url http",
            "filehashmd5",
            "showing",
            "url https",
            "indicator role",
            "title added",
            "active related",
            "iocs",
            "learn more",
            "filehashsha1",
            "types of",
            "united kingdom",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "t1082",
            "t1119",
            "t1129",
            "modules",
            "t1143",
            "soundcloud",
            "created",
            "hour ago",
            "facebook",
            "twitter",
            "victims website",
            "youtube",
            "jansky",
            "trojandropper",
            "pulses url"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2012,
            "FileHash-MD5": 140,
            "FileHash-SHA1": 129,
            "FileHash-SHA256": 1348,
            "SSLCertFingerprint": 3,
            "domain": 288,
            "hostname": 812
          },
          "indicator_count": 4732,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "243 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "They blatantly steal from citizens , blame foreign entities.",
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "bpc-old.palantirfoundry.com",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents.",
        "OTX auto populated  targeted groups.",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Lazarus"
          ],
          "malware_families": [
            "Ransom:win32/gandcrab.h!mtb",
            "Alf:spikeaexr.pevpszl",
            "Zeus",
            "Other malware",
            "Ransom:msil/gandcrab"
          ],
          "industries": [
            "Entertainment",
            "Banks",
            "Crypto",
            "Bank"
          ],
          "unique_indicators": 15112
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/amway.co.th",
    "whois": "http://whois.domaintools.com/amway.co.th",
    "domain": "amway.co.th",
    "hostname": "qa.amway.co.th"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 3,
  "pulses": [
    {
      "id": "6910cafb096eae0dcb39a800",
      "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Cousel for egregious",
      "description": "Chronicles of how  quasi government , a State owned criminal defense attorney , protects sexual assaulter Jeffrey Reimer DPT.   victim Palantir harassed, withheld healthcare , diagnoses, justice, monetary award for injured, stole insurance policies, hacked Denver artists, sold music her to artists whom profited, hacked  Denver music studios, hired stalkers, human, controlled phone , car and everything in targets life including , doctors, attorneys, hospitals. It\u2019s always been clear to coming us that Anonymous and Lazarus are the police, judge , lawyer, ransom racist.\nThis group alone has cost the US billions! Responsible for 2014 Sony hack , FMOE.\nDirect Link. by phone , email in person contact , forced settlement hearing,. Adversarial Christopher P. Ahmann , relationship w / Lazarus group, hitmen , cyber crime and other crimes against persons.\n #rip #christopher_ahmann #palantir #lazarus #target_tsara_brashears",
      "modified": "2025-12-09T17:03:48.645000",
      "created": "2025-11-09T17:10:19.498000",
      "tags": [
        "url http",
        "apple",
        "california",
        "apple public",
        "server rsa",
        "organization",
        "stateprovince",
        "ocsp",
        "nids united",
        "files",
        "united",
        "unknown ns",
        "ip address",
        "domain",
        "urls files",
        "passive dns",
        "found title",
        "sf hello",
        "myriad set",
        "pro myriad",
        "set lucida",
        "grande arial",
        "sf mono",
        "ipv4",
        "location united",
        "america flag",
        "america asn",
        "verdict",
        "files ip",
        "address",
        "as42 woodynet",
        "domain add",
        "ipv4 add",
        "reverse dns",
        "trojan",
        "name servers",
        "emails",
        "for privacy",
        "ltd dba",
        "com laude",
        "servers",
        "expiration date",
        "urls",
        "meta",
        "a domains",
        "country code",
        "store home",
        "title",
        "accept",
        "espaol",
        "english",
        "evil corp",
        "see all",
        "cyber hack",
        "republic",
        "canada",
        "season",
        "joe tidy",
        "sarah rainsford",
        "podcast",
        "bank",
        "ukraine",
        "dead",
        "indonesia",
        "police",
        "premium",
        "napoleon",
        "revolution",
        "michelangelo",
        "mozart",
        "global",
        "solid",
        "lazarus",
        "jabber zeus",
        "harrods",
        "ta markmonitor",
        "markmonitor",
        "search",
        "present aug",
        "unknown aaaa",
        "unknown soa",
        "win32",
        "invalid url",
        "trojanspy",
        "mtb apr",
        "backdoor",
        "next associated",
        "win64",
        "trojandropper",
        "twitter",
        "virtool",
        "ransom",
        "worm",
        "dynamicloader",
        "tlsv1",
        "high",
        "globalc",
        "medium",
        "windows",
        "cmd c",
        "delete c",
        "stream",
        "write",
        "next",
        "process32nextw",
        "http host",
        "dns query",
        "likely gandcrab",
        "et trojan",
        "windows nt",
        "wow64",
        "malware",
        "ms windows",
        "as16509",
        "as54113",
        "yara rule",
        "pe32 executable",
        "as15169",
        "powershell",
        "unknown",
        "response ip",
        "address google",
        "safe browsing",
        "hostname add",
        "port",
        "destination",
        "pe32",
        "intel",
        "error",
        "show",
        "delphi",
        "dcom",
        "form",
        "canvas",
        "united kingdom",
        "content type",
        "security",
        "moved",
        "great britain",
        "unknown a",
        "body doctype",
        "html public",
        "ietfdtd html",
        "showing",
        "packing t1045",
        "bytes",
        "read",
        "default",
        "christoper p ahmann",
        "target",
        "victims",
        "tsara brashears",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "p1377925676",
        "gaz1",
        "sid1696503456",
        "present nov",
        "present oct",
        "date",
        "tcpmemhit",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "palantir",
        "foundry",
        "hitmen",
        "quasi",
        "government contracts",
        "jeffrey reimer",
        "hallrender",
        "workers compensation",
        "record value",
        "certificate"
      ],
      "references": [
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "bpc-old.palantirfoundry.com",
        "OTX auto populated  targeted groups.",
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "They blatantly steal from citizens , blame foreign entities.",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
      ],
      "public": 1,
      "adversary": "Lazarus",
      "targeted_countries": [
        "Bangladesh",
        "Japan",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:SpikeAexR.PEVPSZL",
          "display_name": "ALF:SpikeAexR.PEVPSZL",
          "target": null
        },
        {
          "id": "Ransom:MSIL/GandCrab",
          "display_name": "Ransom:MSIL/GandCrab",
          "target": "/malware/Ransom:MSIL/GandCrab"
        },
        {
          "id": "Zeus",
          "display_name": "Zeus",
          "target": null
        },
        {
          "id": "Ransom:Win32/Gandcrab.H!MTB",
          "display_name": "Ransom:Win32/Gandcrab.H!MTB",
          "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [
        "Banks",
        "Crypto",
        "Entertainment",
        "Bank"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4572,
        "FileHash-MD5": 196,
        "domain": 1523,
        "hostname": 1393,
        "FileHash-SHA256": 2400,
        "FileHash-SHA1": 175,
        "email": 18,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 10285,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "131 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69138a8144a8bf8040a92711",
      "name": "Lawyers & Lazarus | Apple Spy : Treece Alfrey Musat P.C., Chris P. Ahmann Colorado State \u2022 Tam Legal Special Counsel for egregious criminal acts \u2022 Christopher P. Ahmann attorney at Large",
      "description": "",
      "modified": "2025-12-09T17:03:48.645000",
      "created": "2025-11-11T19:12:01.843000",
      "tags": [
        "url http",
        "apple",
        "california",
        "apple public",
        "server rsa",
        "organization",
        "stateprovince",
        "ocsp",
        "nids united",
        "files",
        "united",
        "unknown ns",
        "ip address",
        "domain",
        "urls files",
        "passive dns",
        "found title",
        "sf hello",
        "myriad set",
        "pro myriad",
        "set lucida",
        "grande arial",
        "sf mono",
        "ipv4",
        "location united",
        "america flag",
        "america asn",
        "verdict",
        "files ip",
        "address",
        "as42 woodynet",
        "domain add",
        "ipv4 add",
        "reverse dns",
        "trojan",
        "name servers",
        "emails",
        "for privacy",
        "ltd dba",
        "com laude",
        "servers",
        "expiration date",
        "urls",
        "meta",
        "a domains",
        "country code",
        "store home",
        "title",
        "accept",
        "espaol",
        "english",
        "evil corp",
        "see all",
        "cyber hack",
        "republic",
        "canada",
        "season",
        "joe tidy",
        "sarah rainsford",
        "podcast",
        "bank",
        "ukraine",
        "dead",
        "indonesia",
        "police",
        "premium",
        "napoleon",
        "revolution",
        "michelangelo",
        "mozart",
        "global",
        "solid",
        "lazarus",
        "jabber zeus",
        "harrods",
        "ta markmonitor",
        "markmonitor",
        "search",
        "present aug",
        "unknown aaaa",
        "unknown soa",
        "win32",
        "invalid url",
        "trojanspy",
        "mtb apr",
        "backdoor",
        "next associated",
        "win64",
        "trojandropper",
        "twitter",
        "virtool",
        "ransom",
        "worm",
        "dynamicloader",
        "tlsv1",
        "high",
        "globalc",
        "medium",
        "windows",
        "cmd c",
        "delete c",
        "stream",
        "write",
        "next",
        "process32nextw",
        "http host",
        "dns query",
        "likely gandcrab",
        "et trojan",
        "windows nt",
        "wow64",
        "malware",
        "ms windows",
        "as16509",
        "as54113",
        "yara rule",
        "pe32 executable",
        "as15169",
        "powershell",
        "unknown",
        "response ip",
        "address google",
        "safe browsing",
        "hostname add",
        "port",
        "destination",
        "pe32",
        "intel",
        "error",
        "show",
        "delphi",
        "dcom",
        "form",
        "canvas",
        "united kingdom",
        "content type",
        "security",
        "moved",
        "great britain",
        "unknown a",
        "body doctype",
        "html public",
        "ietfdtd html",
        "showing",
        "packing t1045",
        "bytes",
        "read",
        "default",
        "christoper p ahmann",
        "target",
        "victims",
        "tsara brashears",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "p1377925676",
        "gaz1",
        "sid1696503456",
        "present nov",
        "present oct",
        "date",
        "tcpmemhit",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "sha256",
        "sha1",
        "mitre att",
        "pattern match",
        "show technique",
        "ck matrix",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "palantir",
        "foundry",
        "hitmen",
        "quasi",
        "government contracts",
        "jeffrey reimer",
        "hallrender",
        "workers compensation",
        "record value",
        "certificate"
      ],
      "references": [
        "apple-dns.net , http://www.pestcontrol-appleton.com/ multiple Apple IoC",
        "https://podcasts.apple.com/us/podcast/the-lazarus-heist/id1561990291",
        "https://tamlegal.com/attorneys/christopher-p-ahmann/",
        "bpc-old.palantirfoundry.com",
        "OTX auto populated  targeted groups.",
        "You have no idea where artists get their music or how the 5 main songwriters harvest songs from independent artists",
        "Target had endured hired hitman , physical attacks, vehicle attacks, gunpoint",
        "Assaulter Jeffrey Scott Reimer DPT isn\u2019t worth his monthly salary let alone all of this support",
        "Using Palantir Foundry tools have created a new false background for Brashears. Should be illegal.",
        "They blatantly steal from citizens , blame foreign entities.",
        "This is truly \u2019waste, fraud and abuse\u2019 usually a phrase used by insurance agents."
      ],
      "public": 1,
      "adversary": "Lazarus",
      "targeted_countries": [
        "Bangladesh",
        "Japan",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:SpikeAexR.PEVPSZL",
          "display_name": "ALF:SpikeAexR.PEVPSZL",
          "target": null
        },
        {
          "id": "Ransom:MSIL/GandCrab",
          "display_name": "Ransom:MSIL/GandCrab",
          "target": "/malware/Ransom:MSIL/GandCrab"
        },
        {
          "id": "Zeus",
          "display_name": "Zeus",
          "target": null
        },
        {
          "id": "Ransom:Win32/Gandcrab.H!MTB",
          "display_name": "Ransom:Win32/Gandcrab.H!MTB",
          "target": "/malware/Ransom:Win32/Gandcrab.H!MTB"
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [
        "Banks",
        "Crypto",
        "Entertainment",
        "Bank"
      ],
      "TLP": "white",
      "cloned_from": "6910cafb096eae0dcb39a800",
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 4572,
        "FileHash-MD5": 196,
        "domain": 1523,
        "hostname": 1393,
        "FileHash-SHA256": 2400,
        "FileHash-SHA1": 175,
        "email": 18,
        "SSLCertFingerprint": 8
      },
      "indicator_count": 10285,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "131 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "687d30048b95aaba628a5ee7",
      "name": "Working on it\u2026\u2026",
      "description": "\u2022 Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)\n(onyx-ware.com)\nNS1.ENDGAME.COM\n(endgames.us)\nNS1.ENDGAME.COM\n#deadmau5 #janskyofficial #idk #soundcloud",
      "modified": "2025-08-19T17:00:59.379000",
      "created": "2025-07-20T18:05:56.587000",
      "tags": [
        "dynamicloader",
        "united",
        "as15169",
        "medium",
        "search",
        "show",
        "write c",
        "whitelisted",
        "brazil as396982",
        "high",
        "themida",
        "write",
        "delphi",
        "copy",
        "upatre",
        "encrypt",
        "june",
        "win32",
        "malware",
        "win64",
        "windows nt",
        "directui",
        "element",
        "classinfobase",
        "value",
        "hwndhost",
        "sapeav12",
        "delete c",
        "worm",
        "explorer",
        "insert",
        "movie",
        "alerts",
        "windows",
        "installs",
        "filehash",
        "sha256 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "passive dns",
        "urls",
        "http",
        "ip address",
        "related nids",
        "files location",
        "spain flag",
        "spain domain",
        "files related",
        "spain",
        "entries",
        "next associated",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "filehashsha256",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "url http",
        "filehashmd5",
        "showing",
        "url https",
        "indicator role",
        "title added",
        "active related",
        "iocs",
        "learn more",
        "filehashsha1",
        "types of",
        "united kingdom",
        "t1053",
        "taskjob",
        "t1055",
        "injection",
        "t1082",
        "t1119",
        "t1129",
        "modules",
        "t1143",
        "soundcloud",
        "created",
        "hour ago",
        "facebook",
        "twitter",
        "victims website",
        "youtube",
        "jansky",
        "trojandropper",
        "pulses url"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2012,
        "FileHash-MD5": 140,
        "FileHash-SHA1": 129,
        "FileHash-SHA256": 1348,
        "SSLCertFingerprint": 3,
        "domain": 288,
        "hostname": 812
      },
      "indicator_count": 4732,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "243 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://qa.amway.co.th",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://qa.amway.co.th",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631196.8730094
}