{
  "type": "URL",
  "indicator": "https://realketodaily.org",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://realketodaily.org",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2856289612,
      "indicator": "https://realketodaily.org",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 14,
      "pulses": [
        {
          "id": "69bf261cc4e399447d78776c",
          "name": "Cyber Bully Attackers | Revenge Attacks | Remote attackers | Malware Packed |",
          "description": "Several government entities, attorneys have sought porn revenge including physical violence, attempted crimes, malicious prosecution case , harassment when a female patient of man formerly known as Jeffrey Scott Reimer of Chester Springs, PA, violently, critically injured patient in a sexually charged assault [URL\thttp://foundry2-lbl.dvr.dn2.n-helix.com\t\t\t\nhttps://foundry2-lbl.dvr.dn2.n-helix.com\t\tfoundry2-lbl.dvr.dn2.n-helix.com\t\t\t\t\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\nhttp://datafoundry.com\t\t\t\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\thttps://209-99-40-223.fwd.datafoundry.com\t\t\t\ndatafoundry.com",
          "modified": "2026-04-20T00:26:28.752000",
          "created": "2026-03-21T23:13:32.760000",
          "tags": [
            "sc data",
            "data upload",
            "please sub",
            "include data",
            "extraction",
            "failed",
            "sc pulse",
            "idron anv",
            "extr please",
            "include review",
            "exclude sugges",
            "stop show",
            "typ domain",
            "united",
            "virtool",
            "name servers",
            "cryp",
            "emails",
            "win32",
            "ip address",
            "worm",
            "trojan",
            "learn",
            "suspicious",
            "informative",
            "ck id",
            "name tactics",
            "command",
            "adversaries",
            "spawns",
            "ssl certificate",
            "initial access",
            "link initial",
            "prefetch8",
            "mitre att",
            "ck matrix",
            "flag",
            "windows nt",
            "win64",
            "accept",
            "encrypt",
            "form",
            "hybrid",
            "bypass",
            "general",
            "path",
            "iframe",
            "click",
            "strings",
            "anchor https",
            "anchor",
            "liberal",
            "sabey",
            "liberal friends",
            "meta",
            "html internet",
            "html document",
            "unicode text",
            "utf8 text",
            "info initial",
            "access ta0001",
            "compromise",
            "t1189 network",
            "communication",
            "get http",
            "artifacts v",
            "full reports",
            "v get",
            "help dns",
            "resolutions",
            "ip traffic",
            "extr data",
            "enter sc",
            "extra data",
            "referen",
            "broth",
            "passive dns",
            "urls",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "none google",
            "safe browsing",
            "inquest labs",
            "lucas acha",
            "code integrity",
            "checks creation",
            "otx logo",
            "all hostname",
            "files",
            "domain",
            "protect",
            "date",
            "title",
            "exchange",
            "se http",
            "present jan",
            "present feb",
            "present dec",
            "backdoor",
            "certificate",
            "all domain",
            "alibaba cloud",
            "hichina",
            "porkbun llc",
            "cloudflare",
            "namecheap inc",
            "namecheap",
            "domains",
            "dynadot llc",
            "ascio",
            "denmark",
            "url https",
            "filehashsha256",
            "url http",
            "dopple ai",
            "snit",
            "iocs",
            "otx description",
            "information",
            "report spam",
            "delete service",
            "poem",
            "hunter",
            "malicious",
            "porn revenge",
            "brian sabeys",
            "all report",
            "spam delete",
            "rl http",
            "https",
            "expiration http",
            "spam brian",
            "swipper",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "filehashmd5",
            "filehashsha1",
            "sha256",
            "scan",
            "learn more",
            "indicators show",
            "tbmvid",
            "sourcelnms",
            "zx1724209326040",
            "xxx videos",
            "xxxvideohd",
            "adversary",
            "packing",
            "palantir.com",
            "discovery",
            "victim won case",
            "doin it",
            "palantirian abuse",
            "apple",
            "sabey data centers",
            "insurance",
            "quasi government",
            "the brother sabey",
            "reimer",
            "law enforcement",
            "vessel state",
            "sabey porn",
            "hall evans",
            "christopher ahmann",
            "defamation",
            "google"
          ],
          "references": [
            "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
            "http://watchhers.net/index.php",
            "http://212.33.237.86/images/1/report.php",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "https://webmail.police.govmm.org/owa/",
            "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
            "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
            "Mark Brian Sabey",
            "Melvin Sabey",
            "Christopher P \u2018Buzz\u2019 Ahmann",
            "Ronda Cordova",
            "Unknown Persons impersonating Private Investigators (plural)",
            "Quasi Government Case",
            "Victim silenced. Struck by Car Driven by male police let walk",
            "Denver Police let this attempted murder walk. Cited him as a ghost driver",
            "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
            "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
            "Reimer was a PT. Unknown whereabouts , name or job description",
            "Denver Police Department Major Crimes closed investigation",
            "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
            "I bring up the personal nature of the crime because a delete service has been used",
            "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
            "All IoC\u2019s originate from sources named. There are some unknown attackers",
            "This is a serious crime. I\u2019m certain God WILL pay them.",
            "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
            "http://palantirwww.sweetheartvideo.com/ (weirdness)",
            "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
            "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
            "https://www.datafoundry.com/data-center-contamination-control/",
            "https://www.datafoundry.com/data-center-contamination-control/",
            "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
            "http://foundry2-lbl.dvr.dn2.n-helix.com/",
            "https://207-207-25-201.fwd.datafoundry.com/",
            "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
            "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
            "https://rdweb.datafoundry.com/",
            "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
            "http://foundry2sdbl.dvr.dn2.n-helix.com/",
            "Updated | What\u2019s left after theft",
            "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
            "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
            "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
            "https://www.datafoundry.com/category/news/press-releases/",
            "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
            "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
            "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
            "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
            "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
            "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
            "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
            "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
            "Some may may find this content is very disturbing and offensive"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Porn Revenge",
              "display_name": "Porn Revenge",
              "target": null
            },
            {
              "id": "Tons of Malware",
              "display_name": "Tons of Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1495",
              "name": "Firmware Corruption",
              "display_name": "T1495 - Firmware Corruption"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1586.001",
              "name": "Social Media Accounts",
              "display_name": "T1586.001 - Social Media Accounts"
            },
            {
              "id": "T1593.001",
              "name": "Social Media",
              "display_name": "T1593.001 - Social Media"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1586",
              "name": "Compromise Accounts",
              "display_name": "T1586 - Compromise Accounts"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6034,
            "domain": 1422,
            "IPv4": 397,
            "FileHash-MD5": 274,
            "FileHash-SHA1": 252,
            "FileHash-SHA256": 3378,
            "email": 11,
            "hostname": 2753,
            "CVE": 1,
            "SSLCertFingerprint": 9,
            "IPv6": 32
          },
          "indicator_count": 14563,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "15 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d37e35f99d852d38beb769",
          "name": "Cryptex Port Key  \u2022 RedLine Stealer affects Threat Research Platform/s",
          "description": "#attack?  #honeypot?",
          "modified": "2025-10-24T04:02:54.218000",
          "created": "2025-09-24T05:14:28.101000",
          "tags": [
            "x00x00n",
            "memcommit",
            "regopenkeyexw",
            "regsz",
            "else",
            "ipnnoysrdi tr",
            "writeconsolew",
            "cryptexportkey",
            "invalid pointer",
            "x1ex00x00n",
            "redline stealer",
            "service",
            "powershell",
            "tools",
            "persistence",
            "execution",
            "dock",
            "write",
            "updater",
            "malware",
            "passive dns",
            "urls",
            "url add",
            "ip address",
            "related nids",
            "files location",
            "hong kong",
            "united",
            "present jul",
            "present dec",
            "search",
            "present may",
            "a domains",
            "name servers",
            "unknown aaaa",
            "trojan",
            "present jan",
            "present sep",
            "moved",
            "title",
            "span td",
            "td td",
            "tr tr",
            "a li",
            "ipv4 internet",
            "span",
            "meta",
            "gmt content",
            "ipv4 add",
            "reverse dns",
            "trojanx",
            "location hong kong",
            "software",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "ssl certificate",
            "spawns",
            "development att",
            "ascii text",
            "pattern match",
            "mitre att",
            "ck matrix",
            "sha1",
            "odigicert inc",
            "network traffic",
            "general",
            "local",
            "path",
            "encrypt",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "size",
            "crlf line",
            "urlhttps",
            "extracted files",
            "acquires",
            "networking",
            "readiness"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1086",
              "name": "PowerShell",
              "display_name": "T1086 - PowerShell"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 150,
            "FileHash-SHA1": 148,
            "FileHash-SHA256": 3059,
            "domain": 1277,
            "URL": 4166,
            "hostname": 1251,
            "SSLCertFingerprint": 10,
            "email": 1
          },
          "indicator_count": 10062,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "178 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6647908c09468f42bc1249f1",
          "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
          "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
          "modified": "2025-03-01T04:59:57.222000",
          "created": "2024-05-17T17:14:52.317000",
          "tags": [
            "false",
            "true",
            "visible",
            "application",
            "microsoft teams",
            "microsoft azure",
            "office",
            "service",
            "dynamics",
            "hidden",
            "android",
            "explorer",
            "write",
            "connector",
            "test",
            "sharepoint",
            "live",
            "meister",
            "tools",
            "desktop",
            "spark",
            "front",
            "enterprise",
            "designer",
            "atlas",
            "premium",
            "assistant",
            "allow",
            "azureadmyorg",
            "game",
            "verify",
            "microsoft power",
            "channelsurfcli",
            "mtd1",
            "file transfer",
            "magnus",
            "microsoft crm",
            "youth"
          ],
          "references": [
            "All - EnterpriseAppsList.csv",
            "AppRegistrationList.csv",
            "https://tria.ge/240517-vc7c1shc62/behavioral1",
            "https://tria.ge/240517-vdwb5shc71/behavioral1",
            "https://tria.ge/240517-vqxezaaa33/behavioral1",
            "https://tria.ge/240517-t9pc2ahb2t",
            "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
            "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
            "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
            "Thor Scan: S-I9VvMTB6cZU",
            "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
            "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
            "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
            "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
            "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
            "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
            "https://tria.ge/240521-q4s79agb25/static1",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
            "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
            "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
            "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
            "https://www.hudsonrock.com/search?domain=ualberta.ca",
            "https://www.criminalip.io/domain/report?scan_id=13798622",
            "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
            "https://urlscan.io/search/#ualberta.ca",
            "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
            "https://sitereport.netcraft.com/?url=http://ualberta.ca",
            "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
            "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
            "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
            "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 7,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1703,
            "FileHash-SHA256": 90472,
            "URL": 99185,
            "domain": 82954,
            "hostname": 39041,
            "FileHash-SHA1": 1624,
            "email": 4658,
            "CVE": 12
          },
          "indicator_count": 319649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d257bb241c4fa3f68d",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:02.291000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65be56d6df9d36bac14ccd87",
          "name": "AZORult CnC",
          "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
          "modified": "2024-03-04T14:03:17.574000",
          "created": "2024-02-03T15:08:06.808000",
          "tags": [
            "ssl certificate",
            "whois record",
            "threat roundup",
            "whois whois",
            "january",
            "historical ssl",
            "referrer",
            "april",
            "resolutions",
            "siblings domain",
            "march",
            "february",
            "obz4usfn0 http",
            "problems",
            "threat network",
            "infrastructure",
            "st201601152",
            "startpage",
            "iframe",
            "united",
            "unknown",
            "search",
            "showing",
            "united kingdom",
            "creation date",
            "aaaa",
            "cname",
            "scan endpoints",
            "all octoseek",
            "date",
            "next",
            "script urls",
            "soa nxdomain",
            "link",
            "xml title",
            "portugal",
            "domain",
            "status",
            "expiration date",
            "pulse pulses",
            "as44273 host",
            "domain robot",
            "as61969 team",
            "body",
            "as8075",
            "netherlands",
            "servers",
            "emails",
            "duo insight",
            "type",
            "asnone united",
            "name servers",
            "germany unknown",
            "passive dns",
            "as14061",
            "as49453",
            "lowfi",
            "a domains",
            "urls",
            "privacy inc",
            "customer",
            "trojandropper",
            "dynamicloader",
            "default",
            "medium",
            "entries",
            "khtml",
            "download",
            "show",
            "activity",
            "http",
            "copy",
            "write",
            "malware",
            "adware affiliate",
            "hostname",
            "trojan",
            "pulse submit",
            "url analysis",
            "files",
            "as212913 fop",
            "russia unknown",
            "as397240",
            "as15169 google",
            "as19237 omnis",
            "as22169 omnis",
            "as20068 hawk",
            "as133618",
            "as47846",
            "as22489",
            "encrypt",
            "record value",
            "pragma",
            "accept ch",
            "ireland unknown",
            "msie",
            "chrome",
            "style",
            "gmt setcookie",
            "as6724 strato",
            "core",
            "win32",
            "backdoor",
            "expl",
            "exploit",
            "ipv4",
            "virtool",
            "azorult cnc",
            "possible",
            "as7018 att",
            "regsetvalueexa",
            "china as4134",
            "service",
            "asnone",
            "dns lookup",
            "ransom",
            "push",
            "eternalblue",
            "recon",
            "playgame",
            "domain name",
            "as13768 aptum",
            "meta",
            "error",
            "as43350 nforce",
            "as55286",
            "as60558 phoenix",
            "ip address",
            "registrar",
            "1996",
            "contacted",
            "unlocker",
            "red team",
            "af81 http",
            "execution",
            "open",
            "whois sslcert",
            "suspicious c2",
            "cve202322518",
            "collection",
            "vt graph",
            "excel",
            "emotet",
            "metro",
            "jeffrey reimer pt",
            "sharecare",
            "tsara brashears",
            "apple",
            "icloud"
          ],
          "references": [
            "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
            "qbot.zip",
            "imp.fusioninstall.com",
            "https://mylegalbid.com/malwarebytes",
            "192.185.223.216 | 192.168.56.1 [malware]",
            "http://45.159.189.105/bot/regex",
            "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
            "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
            "xhamster.comyouporn.com",
            "cams4all.com",
            "watchhers.net",
            "weconnect.com",
            "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
            "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
            "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
            "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
            "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
            "https://www.songculture.com/tsara-lynn-brashears-music",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "youramateuporn.com",
            "ns2.abovedomains.com",
            "ww16.porn-community.porn25.com",
            "https://totallyspies.1000hentai.com/tag/clover-porn/",
            "pirateproxy.cc",
            "mwilliams.dev@gmail.com | piratepages.com",
            "838114.parkingcrew.net",
            "static-push-preprod.porndig.com",
            "www.redtube.comyouporn.com",
            "https://severeporn-com.pornproxy.page/",
            "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
            "yoursexy.porn | indianyouporn.com",
            "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
            "cdn.pornsocket.com",
            "http://secure.indianpornpass.com/track/hotpornstuff",
            "www.anyxxxtube.net",
            "https://twitter.com/PORNO_SEXYBABES",
            "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
            "campaign-manager.sharecare.com",
            "qa.companycam.com",
            "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
            "24-70mm.camera",
            "dropboxpayments.com",
            "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
            "http://xred.mooo.com",
            "https://sexgalaxy.net/tag/rodneymoore/",
            "http://alive.overit.com/~schoolbu/badmood3.exe",
            "jimgaffigan.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United Kingdom of Great Britain and Northern Ireland",
            "United States of America",
            "Netherlands",
            "Germany",
            "France"
          ],
          "malware_families": [
            {
              "id": "Adware Affiliate",
              "display_name": "Adware Affiliate",
              "target": null
            },
            {
              "id": "AZORult CnC",
              "display_name": "AZORult CnC",
              "target": null
            },
            {
              "id": "Possible",
              "display_name": "Possible",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8134,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 737,
            "FileHash-SHA1": 692,
            "FileHash-SHA256": 7488,
            "URL": 6694,
            "domain": 5247,
            "hostname": 2932,
            "email": 49,
            "CVE": 2,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 23842,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "777 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a958f96f9b29641ea020",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:03:20.219000",
          "created": "2023-12-06T17:03:20.219000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a927b24b94cdd5d344d1",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:02:31.854000",
          "created": "2023-12-06T17:02:31.854000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6546cf78627adef6562a97aa",
          "name": "Browser Malware Attack",
          "description": "Attacking my browser to identify.\nCommand for critical failure/destruction:    https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
          "modified": "2023-12-04T22:00:43.514000",
          "created": "2023-11-04T23:10:48.676000",
          "tags": [
            "united",
            "facebook",
            "phishtank",
            "detection list",
            "ip address",
            "blacklist",
            "paypal",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "malware",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "speci",
            "efr1",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "et tor",
            "known tor",
            "relayrouter",
            "date",
            "unknown",
            "general",
            "hybrid",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "phishing site",
            "heur",
            "cyber threat",
            "unsafe",
            "riskware",
            "phishing",
            "bank",
            "service",
            "artemis",
            "team",
            "xtrat",
            "agent",
            "xrat",
            "filetour",
            "exploit",
            "conduit",
            "opencandy",
            "fusioncore",
            "orkut",
            "steam",
            "genkryptik",
            "runescape",
            "presenoker",
            "ramnit",
            "msil",
            "crack",
            "tofsee",
            "suppobox",
            "malicious",
            "simda",
            "vawtrak",
            "hotmail",
            "generic",
            "webtoolbar",
            "hsbc",
            "maltiverse",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "count blacklist",
            "tag count",
            "downldr",
            "cleaner",
            "iframe",
            "wacatac",
            "alexa",
            "win64",
            "swrort",
            "installcore",
            "azorult",
            "download",
            "blacknet rat",
            "stealer",
            "softcnapp",
            "nircmd",
            "unruy",
            "patcher",
            "adload",
            "dropper",
            "installpack",
            "tiggre",
            "gamehack",
            "trojanspy",
            "germany http",
            "attacker",
            "static engine",
            "internet storm",
            "center",
            "passive dns",
            "urls",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "related nids"
          ],
          "references": [
            "https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
            "object.prototype.hasownproperty.call",
            "hasownproperty.call",
            "a.default.meta.applestore.id",
            "applestore.id",
            "http://decafsmob.this.id",
            "id.google.com",
            "http://critical-system-failure7250.21ny35098453.com-bm3y-v806d9gk.cricket/",
            "http://git.io/yBU2rg",
            "critical-failure-alert2286.40ek97931491.com-4nj1ze3ivfwy.website",
            "https://fairspin.io/?track_id=44698569&pid=1&geo=6252001&utm_source=bonafides&utm_medium=&utm_campaign=smarttds&utm_term=incorrect_param",
            "http://tracking.3061331.corn10wuk.club",
            "http://information.7174932.cakcuk.az/tracking/tracking.php?id=8459701&page=904",
            "apps.apple.com/us/app/id$",
            "t.name",
            "http://e.id?e.id:e.id.getAttribute",
            "location.search",
            "https://dnsorangetel.dn2.n-helix.com",
            "1080p-torrent.ml",
            "states.app",
            "dev-2.ernestatech.com",
            "https://hybrid-analysis.com/sample/d26000dfe1137f05f9187996dc752a703000402fe9e35a8ea216e9215a34560d",
            "209.85.145.113 [malware]",
            "cdn.fuckporntube.com",
            "www.search.app.goo.gl",
            "apps.apple.com",
            "http://www.youtube.com/gen_204?cplatform=tablet&c=android&cver=5.6.36&cos=Android&cosver=4.4.2&cbr=com.google.android.youtube&cbrv",
            "https://coloradosprings.americanlisted.com/pets-animals/beautiful-ragdoll-kittens_31591993.html",
            "globalworker1.sol.us",
            "worker-m-tlcus1.sol.us"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Ireland",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1015,
            "hostname": 1309,
            "FileHash-MD5": 466,
            "FileHash-SHA1": 255,
            "FileHash-SHA256": 3783,
            "URL": 4001,
            "CVE": 9,
            "email": 3
          },
          "indicator_count": 10841,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "867 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6546d0120a7e479fecffe2b1",
          "name": "Browser Malware Attack",
          "description": "Attacking  browser to identify researcher.\nCommand for critical failure/destruction:    https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
          "modified": "2023-12-04T22:00:43.514000",
          "created": "2023-11-04T23:13:21.883000",
          "tags": [
            "united",
            "facebook",
            "phishtank",
            "detection list",
            "ip address",
            "blacklist",
            "paypal",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "malware",
            "name verdict",
            "falcon sandbox",
            "reports no",
            "speci",
            "efr1",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "et tor",
            "known tor",
            "relayrouter",
            "date",
            "unknown",
            "general",
            "hybrid",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "phishing site",
            "heur",
            "cyber threat",
            "unsafe",
            "riskware",
            "phishing",
            "bank",
            "service",
            "artemis",
            "team",
            "xtrat",
            "agent",
            "xrat",
            "filetour",
            "exploit",
            "conduit",
            "opencandy",
            "fusioncore",
            "orkut",
            "steam",
            "genkryptik",
            "runescape",
            "presenoker",
            "ramnit",
            "msil",
            "crack",
            "tofsee",
            "suppobox",
            "malicious",
            "simda",
            "vawtrak",
            "hotmail",
            "generic",
            "webtoolbar",
            "hsbc",
            "maltiverse",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "count blacklist",
            "tag count",
            "downldr",
            "cleaner",
            "iframe",
            "wacatac",
            "alexa",
            "win64",
            "swrort",
            "installcore",
            "azorult",
            "download",
            "blacknet rat",
            "stealer",
            "softcnapp",
            "nircmd",
            "unruy",
            "patcher",
            "adload",
            "dropper",
            "installpack",
            "tiggre",
            "gamehack",
            "trojanspy",
            "germany http",
            "attacker",
            "static engine",
            "internet storm",
            "center",
            "passive dns",
            "urls",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "related nids"
          ],
          "references": [
            "https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
            "object.prototype.hasownproperty.call",
            "hasownproperty.call",
            "a.default.meta.applestore.id",
            "applestore.id",
            "http://decafsmob.this.id",
            "id.google.com",
            "http://critical-system-failure7250.21ny35098453.com-bm3y-v806d9gk.cricket/",
            "http://git.io/yBU2rg",
            "critical-failure-alert2286.40ek97931491.com-4nj1ze3ivfwy.website",
            "https://fairspin.io/?track_id=44698569&pid=1&geo=6252001&utm_source=bonafides&utm_medium=&utm_campaign=smarttds&utm_term=incorrect_param",
            "http://tracking.3061331.corn10wuk.club",
            "http://information.7174932.cakcuk.az/tracking/tracking.php?id=8459701&page=904",
            "apps.apple.com/us/app/id$",
            "t.name",
            "http://e.id?e.id:e.id.getAttribute",
            "location.search",
            "https://dnsorangetel.dn2.n-helix.com",
            "1080p-torrent.ml",
            "states.app",
            "dev-2.ernestatech.com",
            "https://hybrid-analysis.com/sample/d26000dfe1137f05f9187996dc752a703000402fe9e35a8ea216e9215a34560d",
            "209.85.145.113 [malware]",
            "cdn.fuckporntube.com",
            "www.search.app.goo.gl",
            "apps.apple.com",
            "http://www.youtube.com/gen_204?cplatform=tablet&c=android&cver=5.6.36&cos=Android&cosver=4.4.2&cbr=com.google.android.youtube&cbrv",
            "https://coloradosprings.americanlisted.com/pets-animals/beautiful-ragdoll-kittens_31591993.html",
            "globalworker1.sol.us",
            "worker-m-tlcus1.sol.us"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany",
            "Ireland",
            "Singapore"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1015,
            "hostname": 1309,
            "FileHash-MD5": 466,
            "FileHash-SHA1": 255,
            "FileHash-SHA256": 3783,
            "URL": 4001,
            "CVE": 9,
            "email": 3
          },
          "indicator_count": 10841,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "867 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653bf3b076e4dbcd0c099992",
          "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
          "description": "DeepScan run (absolute overkill). I witnessed excessive data use, device is completely practically unusable, many black pages, denial of most services. CNC. Browser bar became a malicious app that returns 0 searches. Attack directed towards my devices.\nNo stone left unturned. Passwords taken. Apps installed to device Covered can on device takes pictures/flash at will. Evasive. Very talented hackers.  \nBravo! Very intrusive. Constantly attacking.\nTarget: Tsara Brashears and researcher",
          "modified": "2023-11-26T14:04:04.692000",
          "created": "2023-10-27T17:30:24.926000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "collections",
            "contacted",
            "efr1",
            "parent domain",
            "amazon 02",
            "metro",
            "crypto",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malware",
            "alexa top",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "opencandy",
            "riskware",
            "unsafe",
            "phishing",
            "zbot",
            "team",
            "exploit",
            "agent",
            "mimikatz",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "downldr",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "artemis",
            "blacknet rat",
            "stealer",
            "trojanspy",
            "blacklist https",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag count",
            "tsara brashears",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "whois record",
            "contacted urls",
            "siblings domain",
            "execution",
            "goldmax",
            "goldfinder",
            "sibot",
            "emotet",
            "united",
            "phishing site",
            "maltiverse",
            "adware",
            "phishtank",
            "xtrat",
            "xrat",
            "redline stealer",
            "xtreme",
            "crack",
            "genkryptik",
            "deepscan",
            "win64",
            "quasar rat",
            "fareit",
            "downloader",
            "trojan",
            "alexa",
            "iframe",
            "cve201711882",
            "phish",
            "genpack",
            "suspicious",
            "magazine",
            "applicunwnt",
            "cobalt strike",
            "malicious",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "ascii text",
            "mitre att",
            "ck id",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "pmejdjsu12",
            "Royal Bank of Scotland",
            "Phishing Bank of America Corporation",
            "Phishing Netflix",
            "Phishing Wells Fargo",
            "Phishing RuneScape",
            "Phishing Internal Revenue Service",
            "Phtarget unspecified phishing",
            "PAYPAL phishing",
            "Phishing Indeed",
            "Phishing eBay, Inc",
            "PhisSafe",
            "mobigame",
            "Phishing Facebook",
            "remote",
            "mitm",
            "tower",
            "worm",
            "firm",
            "privilege",
            "attacker",
            "monitoring",
            "cyber threat",
            "apple",
            "illegal",
            "DNS_PROBE_STARTED",
            "insurance",
            "revenge",
            "legal entities",
            "https://boxofporn.com"
          ],
          "references": [],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan.Hotkeychick",
              "display_name": "Trojan.Hotkeychick",
              "target": null
            },
            {
              "id": "CVE Exploits",
              "display_name": "CVE Exploits",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Virus.Sality",
              "display_name": "Virus.Sality",
              "target": null
            },
            {
              "id": "W32.Malware",
              "display_name": "W32.Malware",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "Trojan.OTNR",
              "display_name": "Trojan.OTNR",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Mimikatz - S0002",
              "display_name": "Mimikatz - S0002",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "Downloader.OpenCandy",
              "display_name": "Downloader.OpenCandy",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "GoogleToolbar",
              "display_name": "GoogleToolbar",
              "target": null
            },
            {
              "id": "BScope.Adware.MSIL",
              "display_name": "BScope.Adware.MSIL",
              "target": null
            },
            {
              "id": "Application.Auslogics",
              "display_name": "Application.Auslogics",
              "target": null
            },
            {
              "id": "PE.Heur",
              "display_name": "PE.Heur",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler.DownloadGuide",
              "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
              "target": null
            },
            {
              "id": "Trojan:Win32/Xtrat",
              "display_name": "Trojan:Win32/Xtrat",
              "target": "/malware/Trojan:Win32/Xtrat"
            },
            {
              "id": "Xtreme RAT",
              "display_name": "Xtreme RAT",
              "target": null
            },
            {
              "id": "ML.Attribute",
              "display_name": "ML.Attribute",
              "target": null
            },
            {
              "id": "AGEN.1045143",
              "display_name": "AGEN.1045143",
              "target": null
            },
            {
              "id": "Hoax.DeceptPCClean",
              "display_name": "Hoax.DeceptPCClean",
              "target": null
            },
            {
              "id": "Packed.Themida",
              "display_name": "Packed.Themida",
              "target": null
            },
            {
              "id": "MSIL_Bladabindi.G.gen",
              "display_name": "MSIL_Bladabindi.G.gen",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.34090",
              "display_name": "Gen:NN.ZexaF.34090",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_95% 2",
              "display_name": "Unsafe.AI_Score_95% 2",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink 2",
              "display_name": "JS:Trojan.HideLink 2",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Application.BitCoinMiner",
              "display_name": "Application.BitCoinMiner",
              "target": null
            },
            {
              "id": "WebToolbar.Asparnet",
              "display_name": "WebToolbar.Asparnet",
              "target": null
            },
            {
              "id": "W32.HfsAutoB",
              "display_name": "W32.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Application.Deceptor",
              "display_name": "Application.Deceptor",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "HEUR:Hoax.PCFixer",
              "display_name": "HEUR:Hoax.PCFixer",
              "target": null
            },
            {
              "id": "Gen:Variant.Jacard",
              "display_name": "Gen:Variant.Jacard",
              "target": null
            },
            {
              "id": "Tool.Patcher",
              "display_name": "Tool.Patcher",
              "target": null
            },
            {
              "id": "Trojan.Khalesi 2\tAdware 2",
              "display_name": "Trojan.Khalesi 2\tAdware 2",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_94%",
              "display_name": "Unsafe.AI_Score_94%",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Warezov.gen3",
              "display_name": "Warezov.gen3",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Nemucod.21C8",
              "display_name": "Nemucod.21C8",
              "target": null
            },
            {
              "id": "Asparnet.P",
              "display_name": "Asparnet.P",
              "target": null
            },
            {
              "id": "InstallCore.Gen7",
              "display_name": "InstallCore.Gen7",
              "target": null
            },
            {
              "id": "CsQKHtaAI",
              "display_name": "CsQKHtaAI",
              "target": null
            },
            {
              "id": "Clicker.VB",
              "display_name": "Clicker.VB",
              "target": null
            },
            {
              "id": "Exploit.Zip.Heuristic",
              "display_name": "Exploit.Zip.Heuristic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GandCrab",
              "display_name": "Trojan.Ransom.GandCrab",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "ScrInject.eric",
              "display_name": "ScrInject.eric",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Diztakun",
              "display_name": "HEUR:Trojan.Diztakun",
              "target": null
            },
            {
              "id": "Agent.OCJ",
              "display_name": "Agent.OCJ",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Hacktool.Crack",
              "display_name": "Hacktool.Crack",
              "target": null
            },
            {
              "id": "Backdoor.DTR.15",
              "display_name": "Backdoor.DTR.15",
              "target": null
            },
            {
              "id": "Freemake.A potentially unwanted",
              "display_name": "Freemake.A potentially unwanted",
              "target": null
            },
            {
              "id": "Absolute Uninstaller",
              "display_name": "Absolute Uninstaller",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "Trojan.Small",
              "display_name": "Trojan.Small",
              "target": null
            },
            {
              "id": "HackTool.Crack",
              "display_name": "HackTool.Crack",
              "target": null
            },
            {
              "id": "Generic.Application.JS.Sobrab.1",
              "display_name": "Generic.Application.JS.Sobrab.1",
              "target": null
            },
            {
              "id": "Trojan.Rozena",
              "display_name": "Trojan.Rozena",
              "target": null
            },
            {
              "id": "Trojan.Downloader",
              "display_name": "Trojan.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Bayrob",
              "display_name": "Trojan.Bayrob",
              "target": null
            },
            {
              "id": "Adware.OxyPumper",
              "display_name": "Adware.OxyPumper",
              "target": null
            },
            {
              "id": "Worm.Chir",
              "display_name": "Worm.Chir",
              "target": null
            },
            {
              "id": "Trojan.Linux.Generic",
              "display_name": "Trojan.Linux.Generic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Boxter.819",
              "display_name": "Heur.BZC.YAX.Boxter.819",
              "target": null
            },
            {
              "id": "Faceliker.D",
              "display_name": "Faceliker.D",
              "target": null
            },
            {
              "id": "Adware",
              "display_name": "Adware",
              "target": null
            },
            {
              "id": "DeepScan:Generic.BrResMon.1",
              "display_name": "DeepScan:Generic.BrResMon.1",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "Trojan.Brsecmon",
              "display_name": "Trojan.Brsecmon",
              "target": null
            },
            {
              "id": "SigRiskware.LespeedTechnologyLtd",
              "display_name": "SigRiskware.LespeedTechnologyLtd",
              "target": null
            },
            {
              "id": "Doplik.J",
              "display_name": "Doplik.J",
              "target": null
            },
            {
              "id": "Backdoor.Nhopro",
              "display_name": "Backdoor.Nhopro",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.32515",
              "display_name": "Gen:NN.ZemsilF.32515",
              "target": null
            },
            {
              "id": "Downware",
              "display_name": "Downware",
              "target": null
            },
            {
              "id": "MxResIcn.Heur",
              "display_name": "MxResIcn.Heur",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "Magazine phishing",
              "display_name": "Magazine phishing",
              "target": null
            },
            {
              "id": "ApplicUnwnt@#2n6\tIRS",
              "display_name": "ApplicUnwnt@#2n6\tIRS",
              "target": null
            },
            {
              "id": "TEL:Trojan:HTML/Phishing",
              "display_name": "TEL:Trojan:HTML/Phishing",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Trojan.GandCrypt",
              "display_name": "Trojan.GandCrypt",
              "target": null
            },
            {
              "id": "Redirector.AN",
              "display_name": "Redirector.AN",
              "target": null
            },
            {
              "id": "Agent.CUX.gen",
              "display_name": "Agent.CUX.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler",
              "display_name": "Gen:Variant.Application.Bundler",
              "target": null
            },
            {
              "id": "Downloader.Generic",
              "display_name": "Downloader.Generic",
              "target": null
            },
            {
              "id": "Trojan.ClipBanker",
              "display_name": "Trojan.ClipBanker",
              "target": null
            },
            {
              "id": "TrojanDropper.Autit",
              "display_name": "TrojanDropper.Autit",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "QVM05.1.08E5.Malware",
              "display_name": "QVM05.1.08E5.Malware",
              "target": null
            },
            {
              "id": "Trojan.CookiesStealer",
              "display_name": "Trojan.CookiesStealer",
              "target": null
            },
            {
              "id": "Agent.MU",
              "display_name": "Agent.MU",
              "target": null
            },
            {
              "id": "Wacatac.B",
              "display_name": "Wacatac.B",
              "target": null
            },
            {
              "id": "Dropper.Gen",
              "display_name": "Dropper.Gen",
              "target": null
            },
            {
              "id": "WiseCleaner.A potentially unwanted",
              "display_name": "WiseCleaner.A potentially unwanted",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34170",
              "display_name": "Gen:NN.ZemsilF.34170",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILHeracles",
              "display_name": "Gen:Variant.MSILHeracles",
              "target": null
            },
            {
              "id": "Trojan.DownLoader33",
              "display_name": "Trojan.DownLoader33",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Program.Freemake",
              "display_name": "Program.Freemake",
              "target": null
            },
            {
              "id": "Kryptik.dawvk",
              "display_name": "Kryptik.dawvk",
              "target": null
            },
            {
              "id": "AdwareSig [Adw]",
              "display_name": "AdwareSig [Adw]",
              "target": null
            },
            {
              "id": "Phishing JPMorgan Chase and Co.",
              "display_name": "Phishing JPMorgan Chase and Co.",
              "target": null
            },
            {
              "id": "Adware.BrowseFoxCRTD",
              "display_name": "Adware.BrowseFoxCRTD",
              "target": null
            },
            {
              "id": "Suspici.1F4405D1",
              "display_name": "Suspici.1F4405D1",
              "target": null
            },
            {
              "id": "PUA.Wombat",
              "display_name": "PUA.Wombat",
              "target": null
            },
            {
              "id": "AdWare.DealPly",
              "display_name": "AdWare.DealPly",
              "target": null
            },
            {
              "id": "Injector.CUAM",
              "display_name": "Injector.CUAM",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "Troj_Gen.F04IE00CI19",
              "display_name": "Troj_Gen.F04IE00CI19",
              "target": null
            },
            {
              "id": "Worm.Autorun",
              "display_name": "Worm.Autorun",
              "target": null
            },
            {
              "id": "Worm.Boychi",
              "display_name": "Worm.Boychi",
              "target": null
            },
            {
              "id": "Worm.Allaple",
              "display_name": "Worm.Allaple",
              "target": null
            },
            {
              "id": "CVE-2014-3153",
              "display_name": "CVE-2014-3153",
              "target": null
            },
            {
              "id": "BehavesLike.ICLoader",
              "display_name": "BehavesLike.ICLoader",
              "target": null
            },
            {
              "id": "BScope.Backdoor",
              "display_name": "BScope.Backdoor",
              "target": null
            },
            {
              "id": "Trojan.WIN32.PDF.Alien",
              "display_name": "Trojan.WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "PUP.Systweak",
              "display_name": "PUP.Systweak",
              "target": null
            },
            {
              "id": "Sabsik.FL.B",
              "display_name": "Sabsik.FL.B",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Gen:Variant.Tedy HackTool.VulnDriver",
              "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
              "target": null
            },
            {
              "id": "Backdoor.Predator",
              "display_name": "Backdoor.Predator",
              "target": null
            },
            {
              "id": "Kryptik.GKQR",
              "display_name": "Kryptik.GKQR",
              "target": null
            },
            {
              "id": "DarkKomet.ife",
              "display_name": "DarkKomet.ife",
              "target": null
            },
            {
              "id": "BehavesLike.Downloader",
              "display_name": "BehavesLike.Downloader",
              "target": null
            },
            {
              "id": "Trojan.JS.Iframe",
              "display_name": "Trojan.JS.Iframe",
              "target": null
            },
            {
              "id": "InstallCore.NP",
              "display_name": "InstallCore.NP",
              "target": null
            },
            {
              "id": "Generic.JS.BlackHole",
              "display_name": "Generic.JS.BlackHole",
              "target": null
            },
            {
              "id": "Dropper.Wanna",
              "display_name": "Dropper.Wanna",
              "target": null
            },
            {
              "id": "Remote Utilities",
              "display_name": "Remote Utilities",
              "target": null
            },
            {
              "id": "W32.InstallCore.AGX",
              "display_name": "W32.InstallCore.AGX",
              "target": null
            },
            {
              "id": "NetTool.RemoteExec",
              "display_name": "NetTool.RemoteExec",
              "target": null
            },
            {
              "id": "Bondat.A",
              "display_name": "Bondat.A",
              "target": null
            },
            {
              "id": "VM201.0.B70B.Malware",
              "display_name": "VM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "Infected.WebPage",
              "display_name": "Infected.WebPage",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Script",
              "display_name": "HEUR:Exploit.Script",
              "target": null
            },
            {
              "id": "BScope.TrojanDownloader",
              "display_name": "BScope.TrojanDownloader",
              "target": null
            },
            {
              "id": "HTML:RedirBA",
              "display_name": "HTML:RedirBA",
              "target": null
            },
            {
              "id": "Trojan.BAT.Qhost",
              "display_name": "Trojan.BAT.Qhost",
              "target": null
            },
            {
              "id": "HTML:RedirME",
              "display_name": "HTML:RedirME",
              "target": null
            },
            {
              "id": "TrojWare.JS.AdWare.Agent",
              "display_name": "TrojWare.JS.AdWare.Agent",
              "target": null
            },
            {
              "id": "Packed.Dico",
              "display_name": "Packed.Dico",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1602.001",
              "name": "SNMP (MIB Dump)",
              "display_name": "T1602.001 - SNMP (MIB Dump)"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1695,
            "FileHash-SHA1": 756,
            "FileHash-SHA256": 2029,
            "domain": 290,
            "URL": 1854,
            "hostname": 568,
            "CVE": 5
          },
          "indicator_count": 7197,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "876 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f09785f9ee8aebca2a667",
          "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
          "description": "",
          "modified": "2023-11-26T14:04:04.692000",
          "created": "2023-10-30T01:40:08.022000",
          "tags": [
            "ssl certificate",
            "historical ssl",
            "resolutions",
            "referrer",
            "collections",
            "contacted",
            "efr1",
            "parent domain",
            "amazon 02",
            "metro",
            "crypto",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malware",
            "alexa top",
            "million",
            "malicious url",
            "malware site",
            "malicious site",
            "opencandy",
            "riskware",
            "unsafe",
            "phishing",
            "zbot",
            "team",
            "exploit",
            "agent",
            "mimikatz",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "downldr",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "artemis",
            "blacknet rat",
            "stealer",
            "trojanspy",
            "blacklist https",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "count blacklist",
            "tag count",
            "tsara brashears",
            "self",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "whois record",
            "contacted urls",
            "siblings domain",
            "execution",
            "goldmax",
            "goldfinder",
            "sibot",
            "emotet",
            "united",
            "phishing site",
            "maltiverse",
            "adware",
            "phishtank",
            "xtrat",
            "xrat",
            "redline stealer",
            "xtreme",
            "crack",
            "genkryptik",
            "deepscan",
            "win64",
            "quasar rat",
            "fareit",
            "downloader",
            "trojan",
            "alexa",
            "iframe",
            "cve201711882",
            "phish",
            "genpack",
            "suspicious",
            "magazine",
            "applicunwnt",
            "cobalt strike",
            "malicious",
            "pattern match",
            "file",
            "web open",
            "font format",
            "truetype",
            "indicator",
            "windows nt",
            "ascii text",
            "mitre att",
            "ck id",
            "date",
            "unknown",
            "hybrid",
            "accept",
            "local",
            "stream",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "pmejdjsu12",
            "Royal Bank of Scotland",
            "Phishing Bank of America Corporation",
            "Phishing Netflix",
            "Phishing Wells Fargo",
            "Phishing RuneScape",
            "Phishing Internal Revenue Service",
            "Phtarget unspecified phishing",
            "PAYPAL phishing",
            "Phishing Indeed",
            "Phishing eBay, Inc",
            "PhisSafe",
            "mobigame",
            "Phishing Facebook",
            "remote",
            "mitm",
            "tower",
            "worm",
            "firm",
            "privilege",
            "attacker",
            "monitoring",
            "cyber threat",
            "apple",
            "illegal",
            "DNS_PROBE_STARTED",
            "insurance",
            "revenge",
            "legal entities",
            "https://boxofporn.com"
          ],
          "references": [],
          "public": 1,
          "adversary": "[Unnamed group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan.Hotkeychick",
              "display_name": "Trojan.Hotkeychick",
              "target": null
            },
            {
              "id": "CVE Exploits",
              "display_name": "CVE Exploits",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Generic.ASMalwS",
              "display_name": "Generic.ASMalwS",
              "target": null
            },
            {
              "id": "HackTool.CheatEngine",
              "display_name": "HackTool.CheatEngine",
              "target": null
            },
            {
              "id": "HackTool.BruteForce",
              "display_name": "HackTool.BruteForce",
              "target": null
            },
            {
              "id": "Virus.Sality",
              "display_name": "Virus.Sality",
              "target": null
            },
            {
              "id": "W32.Malware",
              "display_name": "W32.Malware",
              "target": null
            },
            {
              "id": "TSGeneric",
              "display_name": "TSGeneric",
              "target": null
            },
            {
              "id": "Trojan.OTNR",
              "display_name": "Trojan.OTNR",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Mimikatz - S0002",
              "display_name": "Mimikatz - S0002",
              "target": null
            },
            {
              "id": "GoldFinder",
              "display_name": "GoldFinder",
              "target": null
            },
            {
              "id": "GoldMax - S0588",
              "display_name": "GoldMax - S0588",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Sibot",
              "display_name": "Sibot",
              "target": null
            },
            {
              "id": "Downloader.OpenCandy",
              "display_name": "Downloader.OpenCandy",
              "target": null
            },
            {
              "id": "Azorult",
              "display_name": "Azorult",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "GoogleToolbar",
              "display_name": "GoogleToolbar",
              "target": null
            },
            {
              "id": "BScope.Adware.MSIL",
              "display_name": "BScope.Adware.MSIL",
              "target": null
            },
            {
              "id": "Application.Auslogics",
              "display_name": "Application.Auslogics",
              "target": null
            },
            {
              "id": "PE.Heur",
              "display_name": "PE.Heur",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler.DownloadGuide",
              "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
              "target": null
            },
            {
              "id": "Trojan:Win32/Xtrat",
              "display_name": "Trojan:Win32/Xtrat",
              "target": "/malware/Trojan:Win32/Xtrat"
            },
            {
              "id": "Xtreme RAT",
              "display_name": "Xtreme RAT",
              "target": null
            },
            {
              "id": "ML.Attribute",
              "display_name": "ML.Attribute",
              "target": null
            },
            {
              "id": "AGEN.1045143",
              "display_name": "AGEN.1045143",
              "target": null
            },
            {
              "id": "Hoax.DeceptPCClean",
              "display_name": "Hoax.DeceptPCClean",
              "target": null
            },
            {
              "id": "Packed.Themida",
              "display_name": "Packed.Themida",
              "target": null
            },
            {
              "id": "MSIL_Bladabindi.G.gen",
              "display_name": "MSIL_Bladabindi.G.gen",
              "target": null
            },
            {
              "id": "Gen:NN.ZexaF.34090",
              "display_name": "Gen:NN.ZexaF.34090",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_95% 2",
              "display_name": "Unsafe.AI_Score_95% 2",
              "target": null
            },
            {
              "id": "BScope.Trojan",
              "display_name": "BScope.Trojan",
              "target": null
            },
            {
              "id": "JS:Trojan.HideLink 2",
              "display_name": "JS:Trojan.HideLink 2",
              "target": null
            },
            {
              "id": "Gen:Variant.Symmi",
              "display_name": "Gen:Variant.Symmi",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Inject",
              "display_name": "Gen:Heur.MSIL.Inject",
              "target": null
            },
            {
              "id": "Application.BitCoinMiner",
              "display_name": "Application.BitCoinMiner",
              "target": null
            },
            {
              "id": "WebToolbar.Asparnet",
              "display_name": "WebToolbar.Asparnet",
              "target": null
            },
            {
              "id": "W32.HfsAutoB",
              "display_name": "W32.HfsAutoB",
              "target": null
            },
            {
              "id": "Gen:Variant.Ursu",
              "display_name": "Gen:Variant.Ursu",
              "target": null
            },
            {
              "id": "HW32.Packed",
              "display_name": "HW32.Packed",
              "target": null
            },
            {
              "id": "Application.Deceptor",
              "display_name": "Application.Deceptor",
              "target": null
            },
            {
              "id": "Backdoor.Androm",
              "display_name": "Backdoor.Androm",
              "target": null
            },
            {
              "id": "HEUR:Hoax.PCFixer",
              "display_name": "HEUR:Hoax.PCFixer",
              "target": null
            },
            {
              "id": "Gen:Variant.Jacard",
              "display_name": "Gen:Variant.Jacard",
              "target": null
            },
            {
              "id": "Tool.Patcher",
              "display_name": "Tool.Patcher",
              "target": null
            },
            {
              "id": "Trojan.Khalesi 2\tAdware 2",
              "display_name": "Trojan.Khalesi 2\tAdware 2",
              "target": null
            },
            {
              "id": "RiskWare.HackTool.Agent",
              "display_name": "RiskWare.HackTool.Agent",
              "target": null
            },
            {
              "id": "Unsafe.AI_Score_94%",
              "display_name": "Unsafe.AI_Score_94%",
              "target": null
            },
            {
              "id": "Trojan.WisdomEyes.16070401.9500",
              "display_name": "Trojan.WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "RiskWare.Crack",
              "display_name": "RiskWare.Crack",
              "target": null
            },
            {
              "id": "Gen:Variant.Bulz",
              "display_name": "Gen:Variant.Bulz",
              "target": null
            },
            {
              "id": "VB:Trojan.Valyria",
              "display_name": "VB:Trojan.Valyria",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Warezov.gen3",
              "display_name": "Warezov.gen3",
              "target": null
            },
            {
              "id": "JS:Trojan.Clicker",
              "display_name": "JS:Trojan.Clicker",
              "target": null
            },
            {
              "id": "Nemucod.21C8",
              "display_name": "Nemucod.21C8",
              "target": null
            },
            {
              "id": "Asparnet.P",
              "display_name": "Asparnet.P",
              "target": null
            },
            {
              "id": "InstallCore.Gen7",
              "display_name": "InstallCore.Gen7",
              "target": null
            },
            {
              "id": "CsQKHtaAI",
              "display_name": "CsQKHtaAI",
              "target": null
            },
            {
              "id": "Clicker.VB",
              "display_name": "Clicker.VB",
              "target": null
            },
            {
              "id": "Exploit.Zip.Heuristic",
              "display_name": "Exploit.Zip.Heuristic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GandCrab",
              "display_name": "Trojan.Ransom.GandCrab",
              "target": null
            },
            {
              "id": "ScrInject.B",
              "display_name": "ScrInject.B",
              "target": null
            },
            {
              "id": "ScrInject.eric",
              "display_name": "ScrInject.eric",
              "target": null
            },
            {
              "id": "HEUR:Trojan.Diztakun",
              "display_name": "HEUR:Trojan.Diztakun",
              "target": null
            },
            {
              "id": "Agent.OCJ",
              "display_name": "Agent.OCJ",
              "target": null
            },
            {
              "id": "Vdehu.A",
              "display_name": "Vdehu.A",
              "target": null
            },
            {
              "id": "Hacktool.Crack",
              "display_name": "Hacktool.Crack",
              "target": null
            },
            {
              "id": "Backdoor.DTR.15",
              "display_name": "Backdoor.DTR.15",
              "target": null
            },
            {
              "id": "Freemake.A potentially unwanted",
              "display_name": "Freemake.A potentially unwanted",
              "target": null
            },
            {
              "id": "Absolute Uninstaller",
              "display_name": "Absolute Uninstaller",
              "target": null
            },
            {
              "id": "HTML:Script",
              "display_name": "HTML:Script",
              "target": null
            },
            {
              "id": "Trojan.Small",
              "display_name": "Trojan.Small",
              "target": null
            },
            {
              "id": "HackTool.Crack",
              "display_name": "HackTool.Crack",
              "target": null
            },
            {
              "id": "Generic.Application.JS.Sobrab.1",
              "display_name": "Generic.Application.JS.Sobrab.1",
              "target": null
            },
            {
              "id": "Trojan.Rozena",
              "display_name": "Trojan.Rozena",
              "target": null
            },
            {
              "id": "Trojan.Downloader",
              "display_name": "Trojan.Downloader",
              "target": null
            },
            {
              "id": "Trojan.Bayrob",
              "display_name": "Trojan.Bayrob",
              "target": null
            },
            {
              "id": "Adware.OxyPumper",
              "display_name": "Adware.OxyPumper",
              "target": null
            },
            {
              "id": "Worm.Chir",
              "display_name": "Worm.Chir",
              "target": null
            },
            {
              "id": "Trojan.Linux.Generic",
              "display_name": "Trojan.Linux.Generic",
              "target": null
            },
            {
              "id": "Trojan.Ransom.GenericKD",
              "display_name": "Trojan.Ransom.GenericKD",
              "target": null
            },
            {
              "id": "Heur.BZC.YAX.Boxter.819",
              "display_name": "Heur.BZC.YAX.Boxter.819",
              "target": null
            },
            {
              "id": "Faceliker.D",
              "display_name": "Faceliker.D",
              "target": null
            },
            {
              "id": "Adware",
              "display_name": "Adware",
              "target": null
            },
            {
              "id": "DeepScan:Generic.BrResMon.1",
              "display_name": "DeepScan:Generic.BrResMon.1",
              "target": null
            },
            {
              "id": "Adware.KuziTui",
              "display_name": "Adware.KuziTui",
              "target": null
            },
            {
              "id": "Trojan.Brsecmon",
              "display_name": "Trojan.Brsecmon",
              "target": null
            },
            {
              "id": "SigRiskware.LespeedTechnologyLtd",
              "display_name": "SigRiskware.LespeedTechnologyLtd",
              "target": null
            },
            {
              "id": "Doplik.J",
              "display_name": "Doplik.J",
              "target": null
            },
            {
              "id": "Backdoor.Nhopro",
              "display_name": "Backdoor.Nhopro",
              "target": null
            },
            {
              "id": "TrojanBanker.Banbra",
              "display_name": "TrojanBanker.Banbra",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.32515",
              "display_name": "Gen:NN.ZemsilF.32515",
              "target": null
            },
            {
              "id": "Downware",
              "display_name": "Downware",
              "target": null
            },
            {
              "id": "MxResIcn.Heur",
              "display_name": "MxResIcn.Heur",
              "target": null
            },
            {
              "id": "Mimikatz",
              "display_name": "Mimikatz",
              "target": null
            },
            {
              "id": "Magazine phishing",
              "display_name": "Magazine phishing",
              "target": null
            },
            {
              "id": "ApplicUnwnt@#2n6\tIRS",
              "display_name": "ApplicUnwnt@#2n6\tIRS",
              "target": null
            },
            {
              "id": "TEL:Trojan:HTML/Phishing",
              "display_name": "TEL:Trojan:HTML/Phishing",
              "target": null
            },
            {
              "id": "DriverReviver.A potentially unwanted",
              "display_name": "DriverReviver.A potentially unwanted",
              "target": null
            },
            {
              "id": "Trojan.GandCrypt",
              "display_name": "Trojan.GandCrypt",
              "target": null
            },
            {
              "id": "Redirector.AN",
              "display_name": "Redirector.AN",
              "target": null
            },
            {
              "id": "Agent.CUX.gen",
              "display_name": "Agent.CUX.gen",
              "target": null
            },
            {
              "id": "Gen:Variant.Application.Bundler",
              "display_name": "Gen:Variant.Application.Bundler",
              "target": null
            },
            {
              "id": "Downloader.Generic",
              "display_name": "Downloader.Generic",
              "target": null
            },
            {
              "id": "Trojan.ClipBanker",
              "display_name": "Trojan.ClipBanker",
              "target": null
            },
            {
              "id": "TrojanDropper.Autit",
              "display_name": "TrojanDropper.Autit",
              "target": null
            },
            {
              "id": "Dropper.Trojan.Agent",
              "display_name": "Dropper.Trojan.Agent",
              "target": null
            },
            {
              "id": "QVM05.1.08E5.Malware",
              "display_name": "QVM05.1.08E5.Malware",
              "target": null
            },
            {
              "id": "Trojan.CookiesStealer",
              "display_name": "Trojan.CookiesStealer",
              "target": null
            },
            {
              "id": "Agent.MU",
              "display_name": "Agent.MU",
              "target": null
            },
            {
              "id": "Wacatac.B",
              "display_name": "Wacatac.B",
              "target": null
            },
            {
              "id": "Dropper.Gen",
              "display_name": "Dropper.Gen",
              "target": null
            },
            {
              "id": "WiseCleaner.A potentially unwanted",
              "display_name": "WiseCleaner.A potentially unwanted",
              "target": null
            },
            {
              "id": "Gen:Heur.MSIL.Androm",
              "display_name": "Gen:Heur.MSIL.Androm",
              "target": null
            },
            {
              "id": "Gen:NN.ZemsilF.34170",
              "display_name": "Gen:NN.ZemsilF.34170",
              "target": null
            },
            {
              "id": "Gen:Variant.MSILHeracles",
              "display_name": "Gen:Variant.MSILHeracles",
              "target": null
            },
            {
              "id": "Trojan.DownLoader33",
              "display_name": "Trojan.DownLoader33",
              "target": null
            },
            {
              "id": "Trojan.MSIL",
              "display_name": "Trojan.MSIL",
              "target": null
            },
            {
              "id": "Program.Freemake",
              "display_name": "Program.Freemake",
              "target": null
            },
            {
              "id": "Kryptik.dawvk",
              "display_name": "Kryptik.dawvk",
              "target": null
            },
            {
              "id": "AdwareSig [Adw]",
              "display_name": "AdwareSig [Adw]",
              "target": null
            },
            {
              "id": "Phishing JPMorgan Chase and Co.",
              "display_name": "Phishing JPMorgan Chase and Co.",
              "target": null
            },
            {
              "id": "Adware.BrowseFoxCRTD",
              "display_name": "Adware.BrowseFoxCRTD",
              "target": null
            },
            {
              "id": "Suspici.1F4405D1",
              "display_name": "Suspici.1F4405D1",
              "target": null
            },
            {
              "id": "PUA.Wombat",
              "display_name": "PUA.Wombat",
              "target": null
            },
            {
              "id": "AdWare.DealPly",
              "display_name": "AdWare.DealPly",
              "target": null
            },
            {
              "id": "Injector.CUAM",
              "display_name": "Injector.CUAM",
              "target": null
            },
            {
              "id": "Downldr.gen",
              "display_name": "Downldr.gen",
              "target": null
            },
            {
              "id": "Troj_Gen.F04IE00CI19",
              "display_name": "Troj_Gen.F04IE00CI19",
              "target": null
            },
            {
              "id": "Worm.Autorun",
              "display_name": "Worm.Autorun",
              "target": null
            },
            {
              "id": "Worm.Boychi",
              "display_name": "Worm.Boychi",
              "target": null
            },
            {
              "id": "Worm.Allaple",
              "display_name": "Worm.Allaple",
              "target": null
            },
            {
              "id": "CVE-2014-3153",
              "display_name": "CVE-2014-3153",
              "target": null
            },
            {
              "id": "BehavesLike.ICLoader",
              "display_name": "BehavesLike.ICLoader",
              "target": null
            },
            {
              "id": "BScope.Backdoor",
              "display_name": "BScope.Backdoor",
              "target": null
            },
            {
              "id": "Trojan.WIN32.PDF.Alien",
              "display_name": "Trojan.WIN32.PDF.Alien",
              "target": null
            },
            {
              "id": "PUP.Systweak",
              "display_name": "PUP.Systweak",
              "target": null
            },
            {
              "id": "Sabsik.FL.B",
              "display_name": "Sabsik.FL.B",
              "target": null
            },
            {
              "id": "malicious.f01f67",
              "display_name": "malicious.f01f67",
              "target": null
            },
            {
              "id": "AGEN.1144657",
              "display_name": "AGEN.1144657",
              "target": null
            },
            {
              "id": "Gen:Variant.Tedy HackTool.VulnDriver",
              "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
              "target": null
            },
            {
              "id": "Backdoor.Predator",
              "display_name": "Backdoor.Predator",
              "target": null
            },
            {
              "id": "Kryptik.GKQR",
              "display_name": "Kryptik.GKQR",
              "target": null
            },
            {
              "id": "DarkKomet.ife",
              "display_name": "DarkKomet.ife",
              "target": null
            },
            {
              "id": "BehavesLike.Downloader",
              "display_name": "BehavesLike.Downloader",
              "target": null
            },
            {
              "id": "Trojan.JS.Iframe",
              "display_name": "Trojan.JS.Iframe",
              "target": null
            },
            {
              "id": "InstallCore.NP",
              "display_name": "InstallCore.NP",
              "target": null
            },
            {
              "id": "Generic.JS.BlackHole",
              "display_name": "Generic.JS.BlackHole",
              "target": null
            },
            {
              "id": "Dropper.Wanna",
              "display_name": "Dropper.Wanna",
              "target": null
            },
            {
              "id": "Remote Utilities",
              "display_name": "Remote Utilities",
              "target": null
            },
            {
              "id": "W32.InstallCore.AGX",
              "display_name": "W32.InstallCore.AGX",
              "target": null
            },
            {
              "id": "NetTool.RemoteExec",
              "display_name": "NetTool.RemoteExec",
              "target": null
            },
            {
              "id": "Bondat.A",
              "display_name": "Bondat.A",
              "target": null
            },
            {
              "id": "VM201.0.B70B.Malware",
              "display_name": "VM201.0.B70B.Malware",
              "target": null
            },
            {
              "id": "Riskware.NetFilter",
              "display_name": "Riskware.NetFilter",
              "target": null
            },
            {
              "id": "Infected.WebPage",
              "display_name": "Infected.WebPage",
              "target": null
            },
            {
              "id": "HEUR:Exploit.Script",
              "display_name": "HEUR:Exploit.Script",
              "target": null
            },
            {
              "id": "BScope.TrojanDownloader",
              "display_name": "BScope.TrojanDownloader",
              "target": null
            },
            {
              "id": "HTML:RedirBA",
              "display_name": "HTML:RedirBA",
              "target": null
            },
            {
              "id": "Trojan.BAT.Qhost",
              "display_name": "Trojan.BAT.Qhost",
              "target": null
            },
            {
              "id": "HTML:RedirME",
              "display_name": "HTML:RedirME",
              "target": null
            },
            {
              "id": "TrojWare.JS.AdWare.Agent",
              "display_name": "TrojWare.JS.AdWare.Agent",
              "target": null
            },
            {
              "id": "Packed.Dico",
              "display_name": "Packed.Dico",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1602.001",
              "name": "SNMP (MIB Dump)",
              "display_name": "T1602.001 - SNMP (MIB Dump)"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "653bf3b076e4dbcd0c099992",
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1695,
            "FileHash-SHA1": 756,
            "FileHash-SHA256": 2029,
            "domain": 290,
            "URL": 1854,
            "hostname": 568,
            "CVE": 5
          },
          "indicator_count": 7197,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "876 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a50c4487060d52346fd",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:54:55.973000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652b2a8048e6a285461c4a5d",
          "name": "Fitbit app link IoC's",
          "description": "Critical. Fitbit download link found in Google search results.\n[https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile]\n\nBlackNET is a Remote Access Trojan (RAT) - Advanced Windows Botnet.\nCapabilities: stealing/grabbing files and passwords, keylogging, cryptojacking, loading files, executing commands, etc. \n\nOpenCandy , PUP\nCapabilities: Browser home page hijacker, installs unwanted toolbars, plug-ins, and extensions to web browsers, collects information, user\u2019s surfing habits, distribution to third parties without user consent.\n\nProcess Injection: Privilege escalation adversaries  use to inject arbitrary code.",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-14T23:55:42.972000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f147a7e55dd916fe9e3e2",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-11-13T22:04:06.580000",
          "created": "2023-10-30T02:27:06.140000",
          "tags": [
            "ssl certificate",
            "contacted",
            "contacted urls",
            "referrer",
            "march",
            "historical ssl",
            "whois sslcert",
            "suspicious",
            "execution",
            "malware",
            "core",
            "name verdict",
            "falco",
            "pattern match",
            "ascii text",
            "file",
            "png image",
            "sdcwhb",
            "windows nt",
            "jpeg image",
            "jfif",
            "appdata",
            "kg2exe",
            "date",
            "unknown",
            "general",
            "hybrid",
            "this",
            "click",
            "strings",
            "class",
            "critical",
            "error",
            "zfaoz",
            "falcon sandbox",
            "exit",
            "node tcp",
            "traffic",
            "et tor",
            "known tor",
            "relayrouter",
            "tor known",
            "tor relayrouter",
            "detection list",
            "ip address",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "alexa top",
            "million",
            "maltiverse",
            "malicious url",
            "malicious site",
            "unsafe",
            "riskware",
            "swrort",
            "downldr",
            "artemis",
            "team",
            "phishing",
            "iframe",
            "crack",
            "xrat",
            "installcore",
            "facebook",
            "bank",
            "opencandy",
            "nircmd",
            "exploit",
            "filetour",
            "cleaner",
            "wacatac",
            "win64",
            "unruy",
            "blacknet rat",
            "stealer",
            "azorult",
            "service",
            "runescape",
            "download",
            "tiggre",
            "presenoker",
            "conduit",
            "xtrat",
            "agent",
            "patcher",
            "adload",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "dropper",
            "trojanx",
            "webshell",
            "adposhel",
            "union",
            "trojanspy",
            "webtoolbar",
            "blacklist https",
            "blacklist",
            "command_and_control",
            "Fitbit",
            "hidden tear",
            "google",
            "spyware",
            "potentially unwanted progams",
            "network",
            "bundlers",
            "aware"
          ],
          "references": [
            "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
            "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ZfAoz",
              "display_name": "ZfAoz",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "MediaMagnet",
              "display_name": "MediaMagnet",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WisdomEyes.16070401.9500",
              "display_name": "WisdomEyes.16070401.9500",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre",
              "display_name": "Trojan:Win32/Tiggre",
              "target": "/malware/Trojan:Win32/Tiggre"
            },
            {
              "id": "Unruy",
              "display_name": "Unruy",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652b2a8048e6a285461c4a5d",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1052,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "FileHash-SHA256": 3730,
            "URL": 2806,
            "domain": 446,
            "CVE": 17,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "static-push-preprod.porndig.com",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "weconnect.com",
        "Unknown Persons impersonating Private Investigators (plural)",
        "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "Victim silenced. Struck by Car Driven by male police let walk",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "https://fairspin.io/?track_id=44698569&pid=1&geo=6252001&utm_source=bonafides&utm_medium=&utm_campaign=smarttds&utm_term=incorrect_param",
        "cdn.fuckporntube.com",
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "Mark Brian Sabey",
        "http://foundry2-lbl.dvr.dn2.n-helix.com/",
        "Ronda Cordova",
        "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
        "http://information.7174932.cakcuk.az/tracking/tracking.php?id=8459701&page=904",
        "watchhers.net",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
        "mwilliams.dev@gmail.com | piratepages.com",
        "dropboxpayments.com",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "https://urlscan.io/search/#ualberta.ca",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "globalworker1.sol.us",
        "states.app",
        "Reimer was a PT. Unknown whereabouts , name or job description",
        "https://mylegalbid.com/malwarebytes",
        "Denver Police Department Major Crimes closed investigation",
        "Quasi Government Case",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "AppRegistrationList.csv",
        "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
        "imp.fusioninstall.com",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "apps.apple.com/us/app/id$",
        "https://www.datafoundry.com/category/news/press-releases/",
        "https://play.google.com/store/apps/details?id=com.fitbit.FitbitMobile",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "location.search",
        "http://foundry2sdbl.dvr.dn2.n-helix.com/",
        "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "http://45.159.189.105/bot/regex",
        "All IoC\u2019s originate from sources named. There are some unknown attackers",
        "Christopher P \u2018Buzz\u2019 Ahmann",
        "critical-failure-alert2286.40ek97931491.com-4nj1ze3ivfwy.website",
        "http://xred.mooo.com",
        "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
        "xhamster.comyouporn.com",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "https://207-207-25-201.fwd.datafoundry.com/",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "209.85.145.113 [malware]",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "cams4all.com",
        "http://tracking.3061331.corn10wuk.club",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List",
        "ww16.porn-community.porn25.com",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
        "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "Melvin Sabey",
        "http://watchhers.net/index.php",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "id.google.com",
        "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "838114.parkingcrew.net",
        "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
        "qa.companycam.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "This is a serious crime. I\u2019m certain God WILL pay them.",
        "Denver Police let this attempted murder walk. Cited him as a ghost driver",
        "https://dnsorangetel.dn2.n-helix.com",
        "I bring up the personal nature of the crime because a delete service has been used",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "pirateproxy.cc",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "applestore.id",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "ns2.abovedomains.com",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
        "object.prototype.hasownproperty.call",
        "24-70mm.camera",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "cdn.pornsocket.com",
        "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
        "campaign-manager.sharecare.com",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "http://palantirwww.sweetheartvideo.com/ (weirdness)",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "http://www.youtube.com/gen_204?cplatform=tablet&c=android&cver=5.6.36&cos=Android&cosver=4.4.2&cbr=com.google.android.youtube&cbrv",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://rdweb.datafoundry.com/",
        "qbot.zip",
        "youramateuporn.com",
        "t.name",
        "http://git.io/yBU2rg",
        "a.default.meta.applestore.id",
        "https://coloradosprings.americanlisted.com/pets-animals/beautiful-ragdoll-kittens_31591993.html",
        "worker-m-tlcus1.sol.us",
        "http://e.id?e.id:e.id.getAttribute",
        "https://www.hybrid-analysis.com/sample/1e5fe7747a445f340ed8db6bd946b6fb2cf2db123b08c3ac818cb8a1c2ae28d0",
        "dev-2.ernestatech.com",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
        "Thor Scan: S-I9VvMTB6cZU",
        "www.redtube.comyouporn.com",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "Some may may find this content is very disturbing and offensive",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
        "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
        "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
        "https://hybrid-analysis.com/sample/d26000dfe1137f05f9187996dc752a703000402fe9e35a8ea216e9215a34560d",
        "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
        "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
        "Updated | What\u2019s left after theft",
        "http://212.33.237.86/images/1/report.php",
        "www.anyxxxtube.net",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://webmail.police.govmm.org/owa/",
        "https://severeporn-com.pornproxy.page/",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "jimgaffigan.com",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "yoursexy.porn | indianyouporn.com",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "http://decafsmob.this.id",
        "http://critical-system-failure7250.21ny35098453.com-bm3y-v806d9gk.cricket/",
        "www.search.app.goo.gl",
        "hasownproperty.call",
        "apps.apple.com",
        "1080p-torrent.ml",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "All - EnterpriseAppsList.csv",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "[Unnamed group]"
          ],
          "malware_families": [
            "Gen:nn.zexaf.34090",
            "Infected.webpage",
            "Trojan.gandcrypt",
            "Worm.chir",
            "Webtoolbar",
            "Wacatac",
            "Installcore.gen7",
            "Vb:trojan.valyria",
            "Zbot",
            "Webtoolbar.asparnet",
            "Cve exploits",
            "Trojan.clipbanker",
            "Vdehu.a",
            "Gen:variant.msilheracles",
            "Downware",
            "Scrinject.b",
            "Qvm05.1.08e5.malware",
            "Mediamagnet",
            "Js:trojan.clicker",
            "Gen:nn.zemsilf.32515",
            "Behaveslike.icloader",
            "Vm201.0.b70b.malware",
            "Application.deceptor",
            "Asparnet.p",
            "Html:redirba",
            "Js:trojan.hidelink 2",
            "Csqkhtaai",
            "Remote utilities",
            "Agen.1045143",
            "Sigriskware.lespeedtechnologyltd",
            "Trojan.khalesi 2\tadware 2",
            "Downldr.gen",
            "Unruy",
            "Absolute uninstaller",
            "Msil_bladabindi.g.gen",
            "Bscope.trojan",
            "Agen.1144657",
            "Trojan.cookiesstealer",
            "Tsgeneric",
            "Trojandropper.autit",
            "Bscope.backdoor",
            "Gen:heur.msil.androm",
            "Driverreviver.a potentially unwanted",
            "Trojan.linux.generic",
            "Agent.ocj",
            "Blacknet rat",
            "Pup.systweak",
            "Adware.kuzitui",
            "Trojanspy",
            "Gen:variant.tedy hacktool.vulndriver",
            "Malicious.f01f67",
            "Trojan.win32.pdf.alien",
            "Installcore.np",
            "Heur:trojan.diztakun",
            "Deepscan:generic.brresmon.1",
            "Tel:trojan:html/phishing",
            "Clicker.vb",
            "Packed.themida",
            "Gen:variant.application.bundler.downloadguide",
            "Freemake.a potentially unwanted",
            "Trojan.bayrob",
            "Phishing jpmorgan chase and co.",
            "Virtool",
            "Dropper.wanna",
            "Gen:nn.zemsilf.34170",
            "Hacktool.cheatengine",
            "Gen:heur.msil.inject",
            "Trojan:win32/tiggre",
            "Hw32.packed",
            "Worm.boychi",
            "Dropper.trojan.agent",
            "Unsafe.ai_score_94%",
            "Program.freemake",
            "Maltiverse",
            "Goldfinder",
            "Tons of malware",
            "Redline stealer",
            "Mxresicn.heur",
            "Zfaoz",
            "Backdoor.nhopro",
            "Trojan:win32/xtrat",
            "Kryptik.gkqr",
            "Sibot",
            "Emotet",
            "Backdoor.androm",
            "Gen:variant.jacard",
            "Cobalt strike",
            "Pe.heur",
            "Trojan.otnr",
            "Packed.dico",
            "Adware",
            "Trojan.hotkeychick",
            "Heur.bzc.yax.boxter.819",
            "Gamehack",
            "Goldmax - s0588",
            "Gen:variant.symmi",
            "Riskware.crack",
            "Downloader.generic",
            "Trojan.brsecmon",
            "Trojan.bat.qhost",
            "W32.installcore.agx",
            "Adware.dealply",
            "W32.hfsautob",
            "Adwaresig [adw]",
            "Azorult cnc",
            "Wacatac.b",
            "Adware.browsefoxcrtd",
            "Gen:variant.ursu",
            "Hoax.deceptpcclean",
            "Application.auslogics",
            "Adware.oxypumper",
            "Redirector.an",
            "Injector.cuam",
            "Azorult",
            "Nettool.remoteexec",
            "Cve-2014-3153",
            "Backdoor.dtr.15",
            "Virus.sality",
            "Mimikatz",
            "Wisdomeyes.16070401.9500",
            "Worm.autorun",
            "Application.bitcoinminer",
            "Heur:exploit.script",
            "Trojan.js.iframe",
            "Agent.cux.gen",
            "Bondat.a",
            "Generic.asmalws",
            "Faceliker.d",
            "Trojan.small",
            "Heur:hoax.pcfixer",
            "Sabsik.fl.b",
            "Suspici.1f4405d1",
            "Scrinject.eric",
            "Darkkomet.ife",
            "Unsafe.ai_score_95% 2",
            "Riskware.hacktool.agent",
            "Troj_gen.f04ie00ci19",
            "Hsbc",
            "Backdoor.predator",
            "Behaveslike.downloader",
            "Trojan.ransom.generickd",
            "Exploit.zip.heuristic",
            "Generic.application.js.sobrab.1",
            "Generic.js.blackhole",
            "Kryptik.dawvk",
            "Riskware.netfilter",
            "Gen:variant.application.bundler",
            "Adware affiliate",
            "Dropper.gen",
            "Possible",
            "Hacktool.bruteforce",
            "Downloader.opencandy",
            "Pua.wombat",
            "Html:script",
            "Tool.patcher",
            "Trojan.rozena",
            "Gen:variant.bulz",
            "Warezov.gen3",
            "Trojan.ransom.gandcrab",
            "Ml.attribute",
            "Trojware.js.adware.agent",
            "Trojanbanker.banbra",
            "Trojan.msil",
            "Bscope.adware.msil",
            "Applicunwnt@#2n6\tirs",
            "W32.malware",
            "Porn revenge",
            "Nemucod.21c8",
            "Bscope.trojandownloader",
            "Googletoolbar",
            "Trojan.wisdomeyes.16070401.9500",
            "Agent.mu",
            "Quasar rat",
            "Worm.allaple",
            "Html:redirme",
            "Xtreme rat",
            "Doplik.j",
            "Trojan.downloader",
            "Magazine phishing",
            "Mimikatz - s0002",
            "Wisecleaner.a potentially unwanted",
            "Trojan.downloader33",
            "Hacktool.crack"
          ],
          "industries": [
            "Government",
            "Education",
            "Telecommunications",
            "Healthcare",
            "Technology"
          ],
          "unique_indicators": 112467
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/realketodaily.org",
    "whois": "http://whois.domaintools.com/realketodaily.org",
    "domain": "realketodaily.org",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 14,
  "pulses": [
    {
      "id": "69bf261cc4e399447d78776c",
      "name": "Cyber Bully Attackers | Revenge Attacks | Remote attackers | Malware Packed |",
      "description": "Several government entities, attorneys have sought porn revenge including physical violence, attempted crimes, malicious prosecution case , harassment when a female patient of man formerly known as Jeffrey Scott Reimer of Chester Springs, PA, violently, critically injured patient in a sexually charged assault [URL\thttp://foundry2-lbl.dvr.dn2.n-helix.com\t\t\t\nhttps://foundry2-lbl.dvr.dn2.n-helix.com\t\tfoundry2-lbl.dvr.dn2.n-helix.com\t\t\t\t\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\nhttp://datafoundry.com\t\t\t\nhttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\thttps://209-99-40-223.fwd.datafoundry.com\t\t\t\ndatafoundry.com",
      "modified": "2026-04-20T00:26:28.752000",
      "created": "2026-03-21T23:13:32.760000",
      "tags": [
        "sc data",
        "data upload",
        "please sub",
        "include data",
        "extraction",
        "failed",
        "sc pulse",
        "idron anv",
        "extr please",
        "include review",
        "exclude sugges",
        "stop show",
        "typ domain",
        "united",
        "virtool",
        "name servers",
        "cryp",
        "emails",
        "win32",
        "ip address",
        "worm",
        "trojan",
        "learn",
        "suspicious",
        "informative",
        "ck id",
        "name tactics",
        "command",
        "adversaries",
        "spawns",
        "ssl certificate",
        "initial access",
        "link initial",
        "prefetch8",
        "mitre att",
        "ck matrix",
        "flag",
        "windows nt",
        "win64",
        "accept",
        "encrypt",
        "form",
        "hybrid",
        "bypass",
        "general",
        "path",
        "iframe",
        "click",
        "strings",
        "anchor https",
        "anchor",
        "liberal",
        "sabey",
        "liberal friends",
        "meta",
        "html internet",
        "html document",
        "unicode text",
        "utf8 text",
        "info initial",
        "access ta0001",
        "compromise",
        "t1189 network",
        "communication",
        "get http",
        "artifacts v",
        "full reports",
        "v get",
        "help dns",
        "resolutions",
        "ip traffic",
        "extr data",
        "enter sc",
        "extra data",
        "referen",
        "broth",
        "passive dns",
        "urls",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "none google",
        "safe browsing",
        "inquest labs",
        "lucas acha",
        "code integrity",
        "checks creation",
        "otx logo",
        "all hostname",
        "files",
        "domain",
        "protect",
        "date",
        "title",
        "exchange",
        "se http",
        "present jan",
        "present feb",
        "present dec",
        "backdoor",
        "certificate",
        "all domain",
        "alibaba cloud",
        "hichina",
        "porkbun llc",
        "cloudflare",
        "namecheap inc",
        "namecheap",
        "domains",
        "dynadot llc",
        "ascio",
        "denmark",
        "url https",
        "filehashsha256",
        "url http",
        "dopple ai",
        "snit",
        "iocs",
        "otx description",
        "information",
        "report spam",
        "delete service",
        "poem",
        "hunter",
        "malicious",
        "porn revenge",
        "brian sabeys",
        "all report",
        "spam delete",
        "rl http",
        "https",
        "expiration http",
        "spam brian",
        "swipper",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "filehashmd5",
        "filehashsha1",
        "sha256",
        "scan",
        "learn more",
        "indicators show",
        "tbmvid",
        "sourcelnms",
        "zx1724209326040",
        "xxx videos",
        "xxxvideohd",
        "adversary",
        "packing",
        "palantir.com",
        "discovery",
        "victim won case",
        "doin it",
        "palantirian abuse",
        "apple",
        "sabey data centers",
        "insurance",
        "quasi government",
        "the brother sabey",
        "reimer",
        "law enforcement",
        "vessel state",
        "sabey porn",
        "hall evans",
        "christopher ahmann",
        "defamation",
        "google"
      ],
      "references": [
        "The Brothers Sabey \u2013 Conservatives with Liberal Friends \u2022 https://thebrotherssabey.com/",
        "http://watchhers.net/index.php",
        "http://212.33.237.86/images/1/report.php",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://webmail.police.govmm.org/owa/",
        "https://pks.wroclaw.sa.gov.pl:1443/ \u2022 portal.bialystok.sa.gov.pl",
        "https://tulach.cc/ phishing \u2022 45.32.112.220 scanning_host \u2022 45.76.79.215",
        "Mark Brian Sabey",
        "Melvin Sabey",
        "Christopher P \u2018Buzz\u2019 Ahmann",
        "Ronda Cordova",
        "Unknown Persons impersonating Private Investigators (plural)",
        "Quasi Government Case",
        "Victim silenced. Struck by Car Driven by male police let walk",
        "Denver Police let this attempted murder walk. Cited him as a ghost driver",
        "Make driver stuck victim with large vehicle after PT unknowingly reported original assault Jeffrey Reiner to Dora",
        "Sexual and Physical Assaulter - Jeffrey Scott Reimer",
        "Reimer was a PT. Unknown whereabouts , name or job description",
        "Denver Police Department Major Crimes closed investigation",
        "Investigation closed when Brian Sabey initiated a malicious prosecution case against Victim",
        "I bring up the personal nature of the crime because a delete service has been used",
        "More than 1000 IoC\u2019s including pulses have been ILLEGALLY removed",
        "All IoC\u2019s originate from sources named. There are some unknown attackers",
        "This is a serious crime. I\u2019m certain God WILL pay them.",
        "https://palantirwww.sweetheartvideo.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t3\t  domain\tpalantir.io\t\t\tMar 21, 2026, 2:06:10 PM\t\t34\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/ \u2022 www.palantir.com",
        "http://palantirwww.sweetheartvideo.com/ (weirdness)",
        "http://foundry2-lbl.dvr.dn2.n-helix.com \u2022 https://foundry2-lbl.dvr.dn2.n-helix.com",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "foundry2-lbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t29\t  URL\thttps://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  URL\thttp://datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t9\t  URL\thttp://foundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t17\t  URL\thttps://209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t27\t  domain\tdatafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t40\t  hostname\t209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "https://rdweb.datafoundry.com/RDWeb/Pages/en-US/login.aspx",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "https://www.datafoundry.com/data-center-contamination-control/",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "http://foundry2-lbl.dvr.dn2.n-helix.com/",
        "https://207-207-25-201.fwd.datafoundry.com/",
        "http://datafoundry.com \u2022 http://foundry2sdbl.dvr.dn2.n-helix.com \u2022 https://209-99-40-223.fwd.datafoundry.com \u2022 datafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com \u2022 beabetta.ifoundry.co.uk.s7b2.psmtp.com \u2022 foundry2sdbl.dvr.dn2.n-helix.com \u2022 fwd.datafoundry.com \u2022 207-207-25-154.fwd.datafoundry.com \u2022 207-207-25-156.fwd.datafoundry.com\t\t\t207-207-25-160.fwd.datafoundry.com \u2022 207-207-25-163.fwd.datafoundry.com  \u2022\t207-207-25-164.fwd.datafoundry.com \u2022 207-207-25-165.fwd.datafoundry.com\t\t\tMar 21, 207-207-25-166.fwd",
        "http://datafoundry.com \u2022 https://209-99-40-223.fwd.datafoundry.com\tdatafoundry.com \u2022 209-99-40-223.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t13\t  hostname\tbeabetta.ifoundry.co.uk.s7b2.psmtp.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t12\t  hostname\tfoundry2sdbl.dvr.dn2.n-helix.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t18\t  hostname\tfwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t8\t  hostname\t207-207-25-154.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:10 PM\t\t19\t  hostname\t207-207-25-156.fwd.datafoundry.com\t\t\tMar 21, 2026, 2:06:1",
        "https://rdweb.datafoundry.com/",
        "https://www.palantir.io/docs/foundry/ontologies/test-changes-in-ontology/",
        "http://foundry2sdbl.dvr.dn2.n-helix.com/",
        "Updated | What\u2019s left after theft",
        "207-207-25-167.fwd.datafoundry.com \u2022 207-207-25-168.fwd.datafoundry.com \u2022 207-207-25-169.fwd.datafoundry.com",
        "207-207-25-170.fwd.datafoundry.com \u2022 207-207-25-171.fwd.datafoundry.com \u2022 207-207-25-201.fwd.datafoundry.com",
        "https://www.datafoundry.com/category/news/press-releases/ (Fake Press) abuse",
        "https://www.datafoundry.com/category/news/press-releases/",
        "207-207-25-209.fwd.datafoundry.com \u2022\t207-207-25-212.fwd.datafoundry.com \u2022 207-207-25-213.fwd.datafoundry.com \u2022 209-99-64-53.fwd.datafoundry.com",
        "209-99-69-91.fwd.datafoundry.com \u2022 dns1.datafoundry.com \u2022 dns2.datafoundry.com \u2022 rdweb.datafoundry.com",
        "www.go.datafoundry.com \u2022 http://207-207-25-209.fwd.datafoundry.com",
        "http://209-99-64-53.fwd.datafoundry.com \u2022 http://dns2.datafoundry.com \u2022 http://fwd.datafoundry.com",
        "http://pdns1.datafoundry.com/ \u2022\thttp://rdweb.datafoundry.com \u2022 http://rdweb.datafoundry.com/",
        "https://rdweb.datafoundry.com/ \u2022 http://www.datafoundry.com \u2022 https://207-207-25-163.fwd.datafoundry.com \u2022",
        "https://207-207-25-209.fwd.datafoundry.com \u2022 https://209-99-40-224.fwd.datafoundry.com/",
        "https://209-99-64-53.fwd.datafoundry.com \u2022 https://dns1.datafoundry.com \u2022 https://dns2.datafoundry.com \u2022 https://fwd.datafoundry.com",
        "Some may may find this content is very disturbing and offensive"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Porn Revenge",
          "display_name": "Porn Revenge",
          "target": null
        },
        {
          "id": "Tons of Malware",
          "display_name": "Tons of Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1132.001",
          "name": "Standard Encoding",
          "display_name": "T1132.001 - Standard Encoding"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1495",
          "name": "Firmware Corruption",
          "display_name": "T1495 - Firmware Corruption"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1586.001",
          "name": "Social Media Accounts",
          "display_name": "T1586.001 - Social Media Accounts"
        },
        {
          "id": "T1593.001",
          "name": "Social Media",
          "display_name": "T1593.001 - Social Media"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1586",
          "name": "Compromise Accounts",
          "display_name": "T1586 - Compromise Accounts"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6034,
        "domain": 1422,
        "IPv4": 397,
        "FileHash-MD5": 274,
        "FileHash-SHA1": 252,
        "FileHash-SHA256": 3378,
        "email": 11,
        "hostname": 2753,
        "CVE": 1,
        "SSLCertFingerprint": 9,
        "IPv6": 32
      },
      "indicator_count": 14563,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "15 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d37e35f99d852d38beb769",
      "name": "Cryptex Port Key  \u2022 RedLine Stealer affects Threat Research Platform/s",
      "description": "#attack?  #honeypot?",
      "modified": "2025-10-24T04:02:54.218000",
      "created": "2025-09-24T05:14:28.101000",
      "tags": [
        "x00x00n",
        "memcommit",
        "regopenkeyexw",
        "regsz",
        "else",
        "ipnnoysrdi tr",
        "writeconsolew",
        "cryptexportkey",
        "invalid pointer",
        "x1ex00x00n",
        "redline stealer",
        "service",
        "powershell",
        "tools",
        "persistence",
        "execution",
        "dock",
        "write",
        "updater",
        "malware",
        "passive dns",
        "urls",
        "url add",
        "ip address",
        "related nids",
        "files location",
        "hong kong",
        "united",
        "present jul",
        "present dec",
        "search",
        "present may",
        "a domains",
        "name servers",
        "unknown aaaa",
        "trojan",
        "present jan",
        "present sep",
        "moved",
        "title",
        "span td",
        "td td",
        "tr tr",
        "a li",
        "ipv4 internet",
        "span",
        "meta",
        "gmt content",
        "ipv4 add",
        "reverse dns",
        "trojanx",
        "location hong kong",
        "software",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "ssl certificate",
        "spawns",
        "development att",
        "ascii text",
        "pattern match",
        "mitre att",
        "ck matrix",
        "sha1",
        "odigicert inc",
        "network traffic",
        "general",
        "local",
        "path",
        "encrypt",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "size",
        "crlf line",
        "urlhttps",
        "extracted files",
        "acquires",
        "networking",
        "readiness"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1086",
          "name": "PowerShell",
          "display_name": "T1086 - PowerShell"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 150,
        "FileHash-SHA1": 148,
        "FileHash-SHA256": 3059,
        "domain": 1277,
        "URL": 4166,
        "hostname": 1251,
        "SSLCertFingerprint": 10,
        "email": 1
      },
      "indicator_count": 10062,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "178 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6647908c09468f42bc1249f1",
      "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
      "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
      "modified": "2025-03-01T04:59:57.222000",
      "created": "2024-05-17T17:14:52.317000",
      "tags": [
        "false",
        "true",
        "visible",
        "application",
        "microsoft teams",
        "microsoft azure",
        "office",
        "service",
        "dynamics",
        "hidden",
        "android",
        "explorer",
        "write",
        "connector",
        "test",
        "sharepoint",
        "live",
        "meister",
        "tools",
        "desktop",
        "spark",
        "front",
        "enterprise",
        "designer",
        "atlas",
        "premium",
        "assistant",
        "allow",
        "azureadmyorg",
        "game",
        "verify",
        "microsoft power",
        "channelsurfcli",
        "mtd1",
        "file transfer",
        "magnus",
        "microsoft crm",
        "youth"
      ],
      "references": [
        "All - EnterpriseAppsList.csv",
        "AppRegistrationList.csv",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 7,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1703,
        "FileHash-SHA256": 90472,
        "URL": 99185,
        "domain": 82954,
        "hostname": 39041,
        "FileHash-SHA1": 1624,
        "email": 4658,
        "CVE": 12
      },
      "indicator_count": 319649,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "415 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be56d257bb241c4fa3f68d",
      "name": "AZORult CnC",
      "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
      "modified": "2024-03-04T14:03:17.574000",
      "created": "2024-02-03T15:08:02.291000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "whois whois",
        "january",
        "historical ssl",
        "referrer",
        "april",
        "resolutions",
        "siblings domain",
        "march",
        "february",
        "obz4usfn0 http",
        "problems",
        "threat network",
        "infrastructure",
        "st201601152",
        "startpage",
        "iframe",
        "united",
        "unknown",
        "search",
        "showing",
        "united kingdom",
        "creation date",
        "aaaa",
        "cname",
        "scan endpoints",
        "all octoseek",
        "date",
        "next",
        "script urls",
        "soa nxdomain",
        "link",
        "xml title",
        "portugal",
        "domain",
        "status",
        "expiration date",
        "pulse pulses",
        "as44273 host",
        "domain robot",
        "as61969 team",
        "body",
        "as8075",
        "netherlands",
        "servers",
        "emails",
        "duo insight",
        "type",
        "asnone united",
        "name servers",
        "germany unknown",
        "passive dns",
        "as14061",
        "as49453",
        "lowfi",
        "a domains",
        "urls",
        "privacy inc",
        "customer",
        "trojandropper",
        "dynamicloader",
        "default",
        "medium",
        "entries",
        "khtml",
        "download",
        "show",
        "activity",
        "http",
        "copy",
        "write",
        "malware",
        "adware affiliate",
        "hostname",
        "trojan",
        "pulse submit",
        "url analysis",
        "files",
        "as212913 fop",
        "russia unknown",
        "as397240",
        "as15169 google",
        "as19237 omnis",
        "as22169 omnis",
        "as20068 hawk",
        "as133618",
        "as47846",
        "as22489",
        "encrypt",
        "record value",
        "pragma",
        "accept ch",
        "ireland unknown",
        "msie",
        "chrome",
        "style",
        "gmt setcookie",
        "as6724 strato",
        "core",
        "win32",
        "backdoor",
        "expl",
        "exploit",
        "ipv4",
        "virtool",
        "azorult cnc",
        "possible",
        "as7018 att",
        "regsetvalueexa",
        "china as4134",
        "service",
        "asnone",
        "dns lookup",
        "ransom",
        "push",
        "eternalblue",
        "recon",
        "playgame",
        "domain name",
        "as13768 aptum",
        "meta",
        "error",
        "as43350 nforce",
        "as55286",
        "as60558 phoenix",
        "ip address",
        "registrar",
        "1996",
        "contacted",
        "unlocker",
        "red team",
        "af81 http",
        "execution",
        "open",
        "whois sslcert",
        "suspicious c2",
        "cve202322518",
        "collection",
        "vt graph",
        "excel",
        "emotet",
        "metro",
        "jeffrey reimer pt",
        "sharecare",
        "tsara brashears",
        "apple",
        "icloud"
      ],
      "references": [
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "qbot.zip",
        "imp.fusioninstall.com",
        "https://mylegalbid.com/malwarebytes",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "http://45.159.189.105/bot/regex",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "xhamster.comyouporn.com",
        "cams4all.com",
        "watchhers.net",
        "weconnect.com",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "youramateuporn.com",
        "ns2.abovedomains.com",
        "ww16.porn-community.porn25.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "pirateproxy.cc",
        "mwilliams.dev@gmail.com | piratepages.com",
        "838114.parkingcrew.net",
        "static-push-preprod.porndig.com",
        "www.redtube.comyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "yoursexy.porn | indianyouporn.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "cdn.pornsocket.com",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "www.anyxxxtube.net",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "campaign-manager.sharecare.com",
        "qa.companycam.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "24-70mm.camera",
        "dropboxpayments.com",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "http://xred.mooo.com",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "jimgaffigan.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United Kingdom of Great Britain and Northern Ireland",
        "United States of America",
        "Netherlands",
        "Germany",
        "France"
      ],
      "malware_families": [
        {
          "id": "Adware Affiliate",
          "display_name": "Adware Affiliate",
          "target": null
        },
        {
          "id": "AZORult CnC",
          "display_name": "AZORult CnC",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 737,
        "FileHash-SHA1": 692,
        "FileHash-SHA256": 7488,
        "URL": 6694,
        "domain": 5247,
        "hostname": 2932,
        "email": 49,
        "CVE": 2,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 23842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65be56d6df9d36bac14ccd87",
      "name": "AZORult CnC",
      "description": "Behaviors\n\nSteals computer data, such as installed programs, machine globally unique identifier (GUID), system architecture, system language, user name, computer name, and operating system (OS) version\nSteals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software\nSteals stored email credentials of different mail clients\nSteals user names, passwords, and hostnames from different browsers\nSteals bitcoin wallets - Monero and uCoin\nSteals Steam and telegram credentials\nSteals Skype chat history and messages\nExecutes backdoor commands from a remote malicious user to collect host Internet protocol (IP) information, download/execute/delete file\nCapabilities\n\nInformation Theft\nBackdoor commands\nExploits\nDownload Routine\nImpact\n\nCompromise system security - with backdoor capabilities that can execute malicious commands, downloads and installs additional malwares",
      "modified": "2024-03-04T14:03:17.574000",
      "created": "2024-02-03T15:08:06.808000",
      "tags": [
        "ssl certificate",
        "whois record",
        "threat roundup",
        "whois whois",
        "january",
        "historical ssl",
        "referrer",
        "april",
        "resolutions",
        "siblings domain",
        "march",
        "february",
        "obz4usfn0 http",
        "problems",
        "threat network",
        "infrastructure",
        "st201601152",
        "startpage",
        "iframe",
        "united",
        "unknown",
        "search",
        "showing",
        "united kingdom",
        "creation date",
        "aaaa",
        "cname",
        "scan endpoints",
        "all octoseek",
        "date",
        "next",
        "script urls",
        "soa nxdomain",
        "link",
        "xml title",
        "portugal",
        "domain",
        "status",
        "expiration date",
        "pulse pulses",
        "as44273 host",
        "domain robot",
        "as61969 team",
        "body",
        "as8075",
        "netherlands",
        "servers",
        "emails",
        "duo insight",
        "type",
        "asnone united",
        "name servers",
        "germany unknown",
        "passive dns",
        "as14061",
        "as49453",
        "lowfi",
        "a domains",
        "urls",
        "privacy inc",
        "customer",
        "trojandropper",
        "dynamicloader",
        "default",
        "medium",
        "entries",
        "khtml",
        "download",
        "show",
        "activity",
        "http",
        "copy",
        "write",
        "malware",
        "adware affiliate",
        "hostname",
        "trojan",
        "pulse submit",
        "url analysis",
        "files",
        "as212913 fop",
        "russia unknown",
        "as397240",
        "as15169 google",
        "as19237 omnis",
        "as22169 omnis",
        "as20068 hawk",
        "as133618",
        "as47846",
        "as22489",
        "encrypt",
        "record value",
        "pragma",
        "accept ch",
        "ireland unknown",
        "msie",
        "chrome",
        "style",
        "gmt setcookie",
        "as6724 strato",
        "core",
        "win32",
        "backdoor",
        "expl",
        "exploit",
        "ipv4",
        "virtool",
        "azorult cnc",
        "possible",
        "as7018 att",
        "regsetvalueexa",
        "china as4134",
        "service",
        "asnone",
        "dns lookup",
        "ransom",
        "push",
        "eternalblue",
        "recon",
        "playgame",
        "domain name",
        "as13768 aptum",
        "meta",
        "error",
        "as43350 nforce",
        "as55286",
        "as60558 phoenix",
        "ip address",
        "registrar",
        "1996",
        "contacted",
        "unlocker",
        "red team",
        "af81 http",
        "execution",
        "open",
        "whois sslcert",
        "suspicious c2",
        "cve202322518",
        "collection",
        "vt graph",
        "excel",
        "emotet",
        "metro",
        "jeffrey reimer pt",
        "sharecare",
        "tsara brashears",
        "apple",
        "icloud"
      ],
      "references": [
        "https://www.sharecare.com/doctor/jeffrey-reimer-6ie6z",
        "qbot.zip",
        "imp.fusioninstall.com",
        "https://mylegalbid.com/malwarebytes",
        "192.185.223.216 | 192.168.56.1 [malware]",
        "http://45.159.189.105/bot/regex",
        "https://success.trendmicro.com/dcx/s/solution/000146108-azorult-malware-information?language=en_US&sfdcIFrameOrigin=null",
        "http://config.premiuminstaller.com/config/ls/offers.json?pid=installer&ts=2014-10-14T18:54:45.9443368Z&br=CR&adprovider=marmarf",
        "xhamster.comyouporn.com",
        "cams4all.com",
        "watchhers.net",
        "weconnect.com",
        "icloud-appleidsuport.com | appleid.com | apple.com | apple-dns.net",
        "http://install.oinstaller5.com/o/jfaquew_jupdate/setup.exe?mode=dlshift&sf=0&subid=a208&filedescription=setup&adprovider=jfaquew&cpixe",
        "init.ess.apple.com | 0-courier.push.apple.com | dns1.registrar-servers.com",
        "Apple -dns1.registrar-servers.com | emails.redvue.com | icloud-appleidsuport.com",
        "https://songculture.com/tsara-brashears | https://www.songculture.com/tsara-brashears-music",
        "https://www.songculture.com/tsara-lynn-brashears-music",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "youramateuporn.com",
        "ns2.abovedomains.com",
        "ww16.porn-community.porn25.com",
        "https://totallyspies.1000hentai.com/tag/clover-porn/",
        "pirateproxy.cc",
        "mwilliams.dev@gmail.com | piratepages.com",
        "838114.parkingcrew.net",
        "static-push-preprod.porndig.com",
        "www.redtube.comyouporn.com",
        "https://severeporn-com.pornproxy.page/",
        "https://spankbang-com.pornproxy.page/593ao/video/sunshine%20mouth%20stuffed%20gagged%20and%20tied%20with%20her%20friend",
        "yoursexy.porn | indianyouporn.com",
        "source-6.youporn.express | source-6.sexpornsource.com\t hostname\tsource-3.xxxporn.club | source-2.pornhubs.best | source-2.freepornxo.com",
        "cdn.pornsocket.com",
        "http://secure.indianpornpass.com/track/hotpornstuff",
        "www.anyxxxtube.net",
        "https://twitter.com/PORNO_SEXYBABES",
        "http://www.my-sexcam.com/mf6w/?K48hY=mUHPm4taPKwCazx4uoqkcvO3m838TOpLC/XyTruUQEV1lwGjr5ldYJa4yIBvf0ifHE4=&sHB=DPfXxzFpo",
        "campaign-manager.sharecare.com",
        "qa.companycam.com",
        "https://app.join.engineeringim.com/e/er?utm_source=eloqua&utm_medium=email&utm_campaign=&sp_cid=&utm_content=PB_NAM23BSE_PB_06_BATT_PW_Shmuel&sp_aid=27591&sp_rid=31788066&sp_eh=577a94ae55b9b9c106e776e684a2413f8c4dac061fc5b814c054be9e822698d9&s=949606000&lid=79146&elqTrackId=2AD273F3E5AB3555FA7D5FA11122C7C2&elq=a46790e54bbc42d2b0adbc4e6533814e&elqaid=27591&elqat=1",
        "24-70mm.camera",
        "dropboxpayments.com",
        "http://r3.i.lencr.org/ | r3.i.lencr.org | c.lencr.org | x1.c.lencr.org",
        "http://xred.mooo.com",
        "https://sexgalaxy.net/tag/rodneymoore/",
        "http://alive.overit.com/~schoolbu/badmood3.exe",
        "jimgaffigan.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United Kingdom of Great Britain and Northern Ireland",
        "United States of America",
        "Netherlands",
        "Germany",
        "France"
      ],
      "malware_families": [
        {
          "id": "Adware Affiliate",
          "display_name": "Adware Affiliate",
          "target": null
        },
        {
          "id": "AZORult CnC",
          "display_name": "AZORult CnC",
          "target": null
        },
        {
          "id": "Possible",
          "display_name": "Possible",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8134,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 737,
        "FileHash-SHA1": 692,
        "FileHash-SHA256": 7488,
        "URL": 6694,
        "domain": 5247,
        "hostname": 2932,
        "email": 49,
        "CVE": 2,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 23842,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "777 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a958f96f9b29641ea020",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:03:20.219000",
      "created": "2023-12-06T17:03:20.219000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a927b24b94cdd5d344d1",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:02:31.854000",
      "created": "2023-12-06T17:02:31.854000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6546cf78627adef6562a97aa",
      "name": "Browser Malware Attack",
      "description": "Attacking my browser to identify.\nCommand for critical failure/destruction:    https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
      "modified": "2023-12-04T22:00:43.514000",
      "created": "2023-11-04T23:10:48.676000",
      "tags": [
        "united",
        "facebook",
        "phishtank",
        "detection list",
        "ip address",
        "blacklist",
        "paypal",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "million",
        "malicious url",
        "malware site",
        "malicious site",
        "malware",
        "name verdict",
        "falcon sandbox",
        "reports no",
        "speci",
        "efr1",
        "pattern match",
        "file",
        "web open",
        "font format",
        "truetype",
        "indicator",
        "windows nt",
        "et tor",
        "known tor",
        "relayrouter",
        "date",
        "unknown",
        "general",
        "hybrid",
        "local",
        "stream",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "self",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "phishing site",
        "heur",
        "cyber threat",
        "unsafe",
        "riskware",
        "phishing",
        "bank",
        "service",
        "artemis",
        "team",
        "xtrat",
        "agent",
        "xrat",
        "filetour",
        "exploit",
        "conduit",
        "opencandy",
        "fusioncore",
        "orkut",
        "steam",
        "genkryptik",
        "runescape",
        "presenoker",
        "ramnit",
        "msil",
        "crack",
        "tofsee",
        "suppobox",
        "malicious",
        "simda",
        "vawtrak",
        "hotmail",
        "generic",
        "webtoolbar",
        "hsbc",
        "maltiverse",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "count blacklist",
        "tag count",
        "downldr",
        "cleaner",
        "iframe",
        "wacatac",
        "alexa",
        "win64",
        "swrort",
        "installcore",
        "azorult",
        "download",
        "blacknet rat",
        "stealer",
        "softcnapp",
        "nircmd",
        "unruy",
        "patcher",
        "adload",
        "dropper",
        "installpack",
        "tiggre",
        "gamehack",
        "trojanspy",
        "germany http",
        "attacker",
        "static engine",
        "internet storm",
        "center",
        "passive dns",
        "urls",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "related nids"
      ],
      "references": [
        "https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
        "object.prototype.hasownproperty.call",
        "hasownproperty.call",
        "a.default.meta.applestore.id",
        "applestore.id",
        "http://decafsmob.this.id",
        "id.google.com",
        "http://critical-system-failure7250.21ny35098453.com-bm3y-v806d9gk.cricket/",
        "http://git.io/yBU2rg",
        "critical-failure-alert2286.40ek97931491.com-4nj1ze3ivfwy.website",
        "https://fairspin.io/?track_id=44698569&pid=1&geo=6252001&utm_source=bonafides&utm_medium=&utm_campaign=smarttds&utm_term=incorrect_param",
        "http://tracking.3061331.corn10wuk.club",
        "http://information.7174932.cakcuk.az/tracking/tracking.php?id=8459701&page=904",
        "apps.apple.com/us/app/id$",
        "t.name",
        "http://e.id?e.id:e.id.getAttribute",
        "location.search",
        "https://dnsorangetel.dn2.n-helix.com",
        "1080p-torrent.ml",
        "states.app",
        "dev-2.ernestatech.com",
        "https://hybrid-analysis.com/sample/d26000dfe1137f05f9187996dc752a703000402fe9e35a8ea216e9215a34560d",
        "209.85.145.113 [malware]",
        "cdn.fuckporntube.com",
        "www.search.app.goo.gl",
        "apps.apple.com",
        "http://www.youtube.com/gen_204?cplatform=tablet&c=android&cver=5.6.36&cos=Android&cosver=4.4.2&cbr=com.google.android.youtube&cbrv",
        "https://coloradosprings.americanlisted.com/pets-animals/beautiful-ragdoll-kittens_31591993.html",
        "globalworker1.sol.us",
        "worker-m-tlcus1.sol.us"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Ireland",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1015,
        "hostname": 1309,
        "FileHash-MD5": 466,
        "FileHash-SHA1": 255,
        "FileHash-SHA256": 3783,
        "URL": 4001,
        "CVE": 9,
        "email": 3
      },
      "indicator_count": 10841,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "867 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6546d0120a7e479fecffe2b1",
      "name": "Browser Malware Attack",
      "description": "Attacking  browser to identify researcher.\nCommand for critical failure/destruction:    https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
      "modified": "2023-12-04T22:00:43.514000",
      "created": "2023-11-04T23:13:21.883000",
      "tags": [
        "united",
        "facebook",
        "phishtank",
        "detection list",
        "ip address",
        "blacklist",
        "paypal",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "million",
        "malicious url",
        "malware site",
        "malicious site",
        "malware",
        "name verdict",
        "falcon sandbox",
        "reports no",
        "speci",
        "efr1",
        "pattern match",
        "file",
        "web open",
        "font format",
        "truetype",
        "indicator",
        "windows nt",
        "et tor",
        "known tor",
        "relayrouter",
        "date",
        "unknown",
        "general",
        "hybrid",
        "local",
        "stream",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "self",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "phishing site",
        "heur",
        "cyber threat",
        "unsafe",
        "riskware",
        "phishing",
        "bank",
        "service",
        "artemis",
        "team",
        "xtrat",
        "agent",
        "xrat",
        "filetour",
        "exploit",
        "conduit",
        "opencandy",
        "fusioncore",
        "orkut",
        "steam",
        "genkryptik",
        "runescape",
        "presenoker",
        "ramnit",
        "msil",
        "crack",
        "tofsee",
        "suppobox",
        "malicious",
        "simda",
        "vawtrak",
        "hotmail",
        "generic",
        "webtoolbar",
        "hsbc",
        "maltiverse",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "count blacklist",
        "tag count",
        "downldr",
        "cleaner",
        "iframe",
        "wacatac",
        "alexa",
        "win64",
        "swrort",
        "installcore",
        "azorult",
        "download",
        "blacknet rat",
        "stealer",
        "softcnapp",
        "nircmd",
        "unruy",
        "patcher",
        "adload",
        "dropper",
        "installpack",
        "tiggre",
        "gamehack",
        "trojanspy",
        "germany http",
        "attacker",
        "static engine",
        "internet storm",
        "center",
        "passive dns",
        "urls",
        "scan endpoints",
        "all search",
        "otx scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "related nids"
      ],
      "references": [
        "https://search.app.goo.gl/?ofl=https://lens.google&al=googleapp://lens?lens_data=KAw&apn=com.google.android.googlequicksearchbox&amv=301204913&isi=284815942&ius=googleapp&ibi=com.goog",
        "object.prototype.hasownproperty.call",
        "hasownproperty.call",
        "a.default.meta.applestore.id",
        "applestore.id",
        "http://decafsmob.this.id",
        "id.google.com",
        "http://critical-system-failure7250.21ny35098453.com-bm3y-v806d9gk.cricket/",
        "http://git.io/yBU2rg",
        "critical-failure-alert2286.40ek97931491.com-4nj1ze3ivfwy.website",
        "https://fairspin.io/?track_id=44698569&pid=1&geo=6252001&utm_source=bonafides&utm_medium=&utm_campaign=smarttds&utm_term=incorrect_param",
        "http://tracking.3061331.corn10wuk.club",
        "http://information.7174932.cakcuk.az/tracking/tracking.php?id=8459701&page=904",
        "apps.apple.com/us/app/id$",
        "t.name",
        "http://e.id?e.id:e.id.getAttribute",
        "location.search",
        "https://dnsorangetel.dn2.n-helix.com",
        "1080p-torrent.ml",
        "states.app",
        "dev-2.ernestatech.com",
        "https://hybrid-analysis.com/sample/d26000dfe1137f05f9187996dc752a703000402fe9e35a8ea216e9215a34560d",
        "209.85.145.113 [malware]",
        "cdn.fuckporntube.com",
        "www.search.app.goo.gl",
        "apps.apple.com",
        "http://www.youtube.com/gen_204?cplatform=tablet&c=android&cver=5.6.36&cos=Android&cosver=4.4.2&cbr=com.google.android.youtube&cbrv",
        "https://coloradosprings.americanlisted.com/pets-animals/beautiful-ragdoll-kittens_31591993.html",
        "globalworker1.sol.us",
        "worker-m-tlcus1.sol.us"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany",
        "Ireland",
        "Singapore"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "HSBC",
          "display_name": "HSBC",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1015,
        "hostname": 1309,
        "FileHash-MD5": 466,
        "FileHash-SHA1": 255,
        "FileHash-SHA256": 3783,
        "URL": 4001,
        "CVE": 9,
        "email": 3
      },
      "indicator_count": 10841,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "867 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653bf3b076e4dbcd0c099992",
      "name": "Remote Access | DeepScan | Dumping | DNS | Internal System Infiltration",
      "description": "DeepScan run (absolute overkill). I witnessed excessive data use, device is completely practically unusable, many black pages, denial of most services. CNC. Browser bar became a malicious app that returns 0 searches. Attack directed towards my devices.\nNo stone left unturned. Passwords taken. Apps installed to device Covered can on device takes pictures/flash at will. Evasive. Very talented hackers.  \nBravo! Very intrusive. Constantly attacking.\nTarget: Tsara Brashears and researcher",
      "modified": "2023-11-26T14:04:04.692000",
      "created": "2023-10-27T17:30:24.926000",
      "tags": [
        "ssl certificate",
        "historical ssl",
        "resolutions",
        "referrer",
        "collections",
        "contacted",
        "efr1",
        "parent domain",
        "amazon 02",
        "metro",
        "crypto",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malware",
        "alexa top",
        "million",
        "malicious url",
        "malware site",
        "malicious site",
        "opencandy",
        "riskware",
        "unsafe",
        "phishing",
        "zbot",
        "team",
        "exploit",
        "agent",
        "mimikatz",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "downldr",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "artemis",
        "blacknet rat",
        "stealer",
        "trojanspy",
        "blacklist https",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "count blacklist",
        "tag count",
        "tsara brashears",
        "self",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "whois record",
        "contacted urls",
        "siblings domain",
        "execution",
        "goldmax",
        "goldfinder",
        "sibot",
        "emotet",
        "united",
        "phishing site",
        "maltiverse",
        "adware",
        "phishtank",
        "xtrat",
        "xrat",
        "redline stealer",
        "xtreme",
        "crack",
        "genkryptik",
        "deepscan",
        "win64",
        "quasar rat",
        "fareit",
        "downloader",
        "trojan",
        "alexa",
        "iframe",
        "cve201711882",
        "phish",
        "genpack",
        "suspicious",
        "magazine",
        "applicunwnt",
        "cobalt strike",
        "malicious",
        "pattern match",
        "file",
        "web open",
        "font format",
        "truetype",
        "indicator",
        "windows nt",
        "ascii text",
        "mitre att",
        "ck id",
        "date",
        "unknown",
        "hybrid",
        "accept",
        "local",
        "stream",
        "click",
        "strings",
        "class",
        "generator",
        "critical",
        "error",
        "pmejdjsu12",
        "Royal Bank of Scotland",
        "Phishing Bank of America Corporation",
        "Phishing Netflix",
        "Phishing Wells Fargo",
        "Phishing RuneScape",
        "Phishing Internal Revenue Service",
        "Phtarget unspecified phishing",
        "PAYPAL phishing",
        "Phishing Indeed",
        "Phishing eBay, Inc",
        "PhisSafe",
        "mobigame",
        "Phishing Facebook",
        "remote",
        "mitm",
        "tower",
        "worm",
        "firm",
        "privilege",
        "attacker",
        "monitoring",
        "cyber threat",
        "apple",
        "illegal",
        "DNS_PROBE_STARTED",
        "insurance",
        "revenge",
        "legal entities",
        "https://boxofporn.com"
      ],
      "references": [],
      "public": 1,
      "adversary": "[Unnamed group]",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan.Hotkeychick",
          "display_name": "Trojan.Hotkeychick",
          "target": null
        },
        {
          "id": "CVE Exploits",
          "display_name": "CVE Exploits",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Generic.ASMalwS",
          "display_name": "Generic.ASMalwS",
          "target": null
        },
        {
          "id": "HackTool.CheatEngine",
          "display_name": "HackTool.CheatEngine",
          "target": null
        },
        {
          "id": "HackTool.BruteForce",
          "display_name": "HackTool.BruteForce",
          "target": null
        },
        {
          "id": "Virus.Sality",
          "display_name": "Virus.Sality",
          "target": null
        },
        {
          "id": "W32.Malware",
          "display_name": "W32.Malware",
          "target": null
        },
        {
          "id": "TSGeneric",
          "display_name": "TSGeneric",
          "target": null
        },
        {
          "id": "Trojan.OTNR",
          "display_name": "Trojan.OTNR",
          "target": null
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Mimikatz - S0002",
          "display_name": "Mimikatz - S0002",
          "target": null
        },
        {
          "id": "GoldFinder",
          "display_name": "GoldFinder",
          "target": null
        },
        {
          "id": "GoldMax - S0588",
          "display_name": "GoldMax - S0588",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Sibot",
          "display_name": "Sibot",
          "target": null
        },
        {
          "id": "Downloader.OpenCandy",
          "display_name": "Downloader.OpenCandy",
          "target": null
        },
        {
          "id": "Azorult",
          "display_name": "Azorult",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "GoogleToolbar",
          "display_name": "GoogleToolbar",
          "target": null
        },
        {
          "id": "BScope.Adware.MSIL",
          "display_name": "BScope.Adware.MSIL",
          "target": null
        },
        {
          "id": "Application.Auslogics",
          "display_name": "Application.Auslogics",
          "target": null
        },
        {
          "id": "PE.Heur",
          "display_name": "PE.Heur",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler.DownloadGuide",
          "display_name": "Gen:Variant.Application.Bundler.DownloadGuide",
          "target": null
        },
        {
          "id": "Trojan:Win32/Xtrat",
          "display_name": "Trojan:Win32/Xtrat",
          "target": "/malware/Trojan:Win32/Xtrat"
        },
        {
          "id": "Xtreme RAT",
          "display_name": "Xtreme RAT",
          "target": null
        },
        {
          "id": "ML.Attribute",
          "display_name": "ML.Attribute",
          "target": null
        },
        {
          "id": "AGEN.1045143",
          "display_name": "AGEN.1045143",
          "target": null
        },
        {
          "id": "Hoax.DeceptPCClean",
          "display_name": "Hoax.DeceptPCClean",
          "target": null
        },
        {
          "id": "Packed.Themida",
          "display_name": "Packed.Themida",
          "target": null
        },
        {
          "id": "MSIL_Bladabindi.G.gen",
          "display_name": "MSIL_Bladabindi.G.gen",
          "target": null
        },
        {
          "id": "Gen:NN.ZexaF.34090",
          "display_name": "Gen:NN.ZexaF.34090",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_95% 2",
          "display_name": "Unsafe.AI_Score_95% 2",
          "target": null
        },
        {
          "id": "BScope.Trojan",
          "display_name": "BScope.Trojan",
          "target": null
        },
        {
          "id": "JS:Trojan.HideLink 2",
          "display_name": "JS:Trojan.HideLink 2",
          "target": null
        },
        {
          "id": "Gen:Variant.Symmi",
          "display_name": "Gen:Variant.Symmi",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Inject",
          "display_name": "Gen:Heur.MSIL.Inject",
          "target": null
        },
        {
          "id": "Application.BitCoinMiner",
          "display_name": "Application.BitCoinMiner",
          "target": null
        },
        {
          "id": "WebToolbar.Asparnet",
          "display_name": "WebToolbar.Asparnet",
          "target": null
        },
        {
          "id": "W32.HfsAutoB",
          "display_name": "W32.HfsAutoB",
          "target": null
        },
        {
          "id": "Gen:Variant.Ursu",
          "display_name": "Gen:Variant.Ursu",
          "target": null
        },
        {
          "id": "HW32.Packed",
          "display_name": "HW32.Packed",
          "target": null
        },
        {
          "id": "Application.Deceptor",
          "display_name": "Application.Deceptor",
          "target": null
        },
        {
          "id": "Backdoor.Androm",
          "display_name": "Backdoor.Androm",
          "target": null
        },
        {
          "id": "HEUR:Hoax.PCFixer",
          "display_name": "HEUR:Hoax.PCFixer",
          "target": null
        },
        {
          "id": "Gen:Variant.Jacard",
          "display_name": "Gen:Variant.Jacard",
          "target": null
        },
        {
          "id": "Tool.Patcher",
          "display_name": "Tool.Patcher",
          "target": null
        },
        {
          "id": "Trojan.Khalesi 2\tAdware 2",
          "display_name": "Trojan.Khalesi 2\tAdware 2",
          "target": null
        },
        {
          "id": "RiskWare.HackTool.Agent",
          "display_name": "RiskWare.HackTool.Agent",
          "target": null
        },
        {
          "id": "Unsafe.AI_Score_94%",
          "display_name": "Unsafe.AI_Score_94%",
          "target": null
        },
        {
          "id": "Trojan.WisdomEyes.16070401.9500",
          "display_name": "Trojan.WisdomEyes.16070401.9500",
          "target": null
        },
        {
          "id": "RiskWare.Crack",
          "display_name": "RiskWare.Crack",
          "target": null
        },
        {
          "id": "Gen:Variant.Bulz",
          "display_name": "Gen:Variant.Bulz",
          "target": null
        },
        {
          "id": "VB:Trojan.Valyria",
          "display_name": "VB:Trojan.Valyria",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Warezov.gen3",
          "display_name": "Warezov.gen3",
          "target": null
        },
        {
          "id": "JS:Trojan.Clicker",
          "display_name": "JS:Trojan.Clicker",
          "target": null
        },
        {
          "id": "Nemucod.21C8",
          "display_name": "Nemucod.21C8",
          "target": null
        },
        {
          "id": "Asparnet.P",
          "display_name": "Asparnet.P",
          "target": null
        },
        {
          "id": "InstallCore.Gen7",
          "display_name": "InstallCore.Gen7",
          "target": null
        },
        {
          "id": "CsQKHtaAI",
          "display_name": "CsQKHtaAI",
          "target": null
        },
        {
          "id": "Clicker.VB",
          "display_name": "Clicker.VB",
          "target": null
        },
        {
          "id": "Exploit.Zip.Heuristic",
          "display_name": "Exploit.Zip.Heuristic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GandCrab",
          "display_name": "Trojan.Ransom.GandCrab",
          "target": null
        },
        {
          "id": "ScrInject.B",
          "display_name": "ScrInject.B",
          "target": null
        },
        {
          "id": "ScrInject.eric",
          "display_name": "ScrInject.eric",
          "target": null
        },
        {
          "id": "HEUR:Trojan.Diztakun",
          "display_name": "HEUR:Trojan.Diztakun",
          "target": null
        },
        {
          "id": "Agent.OCJ",
          "display_name": "Agent.OCJ",
          "target": null
        },
        {
          "id": "Vdehu.A",
          "display_name": "Vdehu.A",
          "target": null
        },
        {
          "id": "Hacktool.Crack",
          "display_name": "Hacktool.Crack",
          "target": null
        },
        {
          "id": "Backdoor.DTR.15",
          "display_name": "Backdoor.DTR.15",
          "target": null
        },
        {
          "id": "Freemake.A potentially unwanted",
          "display_name": "Freemake.A potentially unwanted",
          "target": null
        },
        {
          "id": "Absolute Uninstaller",
          "display_name": "Absolute Uninstaller",
          "target": null
        },
        {
          "id": "HTML:Script",
          "display_name": "HTML:Script",
          "target": null
        },
        {
          "id": "Trojan.Small",
          "display_name": "Trojan.Small",
          "target": null
        },
        {
          "id": "HackTool.Crack",
          "display_name": "HackTool.Crack",
          "target": null
        },
        {
          "id": "Generic.Application.JS.Sobrab.1",
          "display_name": "Generic.Application.JS.Sobrab.1",
          "target": null
        },
        {
          "id": "Trojan.Rozena",
          "display_name": "Trojan.Rozena",
          "target": null
        },
        {
          "id": "Trojan.Downloader",
          "display_name": "Trojan.Downloader",
          "target": null
        },
        {
          "id": "Trojan.Bayrob",
          "display_name": "Trojan.Bayrob",
          "target": null
        },
        {
          "id": "Adware.OxyPumper",
          "display_name": "Adware.OxyPumper",
          "target": null
        },
        {
          "id": "Worm.Chir",
          "display_name": "Worm.Chir",
          "target": null
        },
        {
          "id": "Trojan.Linux.Generic",
          "display_name": "Trojan.Linux.Generic",
          "target": null
        },
        {
          "id": "Trojan.Ransom.GenericKD",
          "display_name": "Trojan.Ransom.GenericKD",
          "target": null
        },
        {
          "id": "Heur.BZC.YAX.Boxter.819",
          "display_name": "Heur.BZC.YAX.Boxter.819",
          "target": null
        },
        {
          "id": "Faceliker.D",
          "display_name": "Faceliker.D",
          "target": null
        },
        {
          "id": "Adware",
          "display_name": "Adware",
          "target": null
        },
        {
          "id": "DeepScan:Generic.BrResMon.1",
          "display_name": "DeepScan:Generic.BrResMon.1",
          "target": null
        },
        {
          "id": "Adware.KuziTui",
          "display_name": "Adware.KuziTui",
          "target": null
        },
        {
          "id": "Trojan.Brsecmon",
          "display_name": "Trojan.Brsecmon",
          "target": null
        },
        {
          "id": "SigRiskware.LespeedTechnologyLtd",
          "display_name": "SigRiskware.LespeedTechnologyLtd",
          "target": null
        },
        {
          "id": "Doplik.J",
          "display_name": "Doplik.J",
          "target": null
        },
        {
          "id": "Backdoor.Nhopro",
          "display_name": "Backdoor.Nhopro",
          "target": null
        },
        {
          "id": "TrojanBanker.Banbra",
          "display_name": "TrojanBanker.Banbra",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.32515",
          "display_name": "Gen:NN.ZemsilF.32515",
          "target": null
        },
        {
          "id": "Downware",
          "display_name": "Downware",
          "target": null
        },
        {
          "id": "MxResIcn.Heur",
          "display_name": "MxResIcn.Heur",
          "target": null
        },
        {
          "id": "Mimikatz",
          "display_name": "Mimikatz",
          "target": null
        },
        {
          "id": "Magazine phishing",
          "display_name": "Magazine phishing",
          "target": null
        },
        {
          "id": "ApplicUnwnt@#2n6\tIRS",
          "display_name": "ApplicUnwnt@#2n6\tIRS",
          "target": null
        },
        {
          "id": "TEL:Trojan:HTML/Phishing",
          "display_name": "TEL:Trojan:HTML/Phishing",
          "target": null
        },
        {
          "id": "DriverReviver.A potentially unwanted",
          "display_name": "DriverReviver.A potentially unwanted",
          "target": null
        },
        {
          "id": "Trojan.GandCrypt",
          "display_name": "Trojan.GandCrypt",
          "target": null
        },
        {
          "id": "Redirector.AN",
          "display_name": "Redirector.AN",
          "target": null
        },
        {
          "id": "Agent.CUX.gen",
          "display_name": "Agent.CUX.gen",
          "target": null
        },
        {
          "id": "Gen:Variant.Application.Bundler",
          "display_name": "Gen:Variant.Application.Bundler",
          "target": null
        },
        {
          "id": "Downloader.Generic",
          "display_name": "Downloader.Generic",
          "target": null
        },
        {
          "id": "Trojan.ClipBanker",
          "display_name": "Trojan.ClipBanker",
          "target": null
        },
        {
          "id": "TrojanDropper.Autit",
          "display_name": "TrojanDropper.Autit",
          "target": null
        },
        {
          "id": "Dropper.Trojan.Agent",
          "display_name": "Dropper.Trojan.Agent",
          "target": null
        },
        {
          "id": "QVM05.1.08E5.Malware",
          "display_name": "QVM05.1.08E5.Malware",
          "target": null
        },
        {
          "id": "Trojan.CookiesStealer",
          "display_name": "Trojan.CookiesStealer",
          "target": null
        },
        {
          "id": "Agent.MU",
          "display_name": "Agent.MU",
          "target": null
        },
        {
          "id": "Wacatac.B",
          "display_name": "Wacatac.B",
          "target": null
        },
        {
          "id": "Dropper.Gen",
          "display_name": "Dropper.Gen",
          "target": null
        },
        {
          "id": "WiseCleaner.A potentially unwanted",
          "display_name": "WiseCleaner.A potentially unwanted",
          "target": null
        },
        {
          "id": "Gen:Heur.MSIL.Androm",
          "display_name": "Gen:Heur.MSIL.Androm",
          "target": null
        },
        {
          "id": "Gen:NN.ZemsilF.34170",
          "display_name": "Gen:NN.ZemsilF.34170",
          "target": null
        },
        {
          "id": "Gen:Variant.MSILHeracles",
          "display_name": "Gen:Variant.MSILHeracles",
          "target": null
        },
        {
          "id": "Trojan.DownLoader33",
          "display_name": "Trojan.DownLoader33",
          "target": null
        },
        {
          "id": "Trojan.MSIL",
          "display_name": "Trojan.MSIL",
          "target": null
        },
        {
          "id": "Program.Freemake",
          "display_name": "Program.Freemake",
          "target": null
        },
        {
          "id": "Kryptik.dawvk",
          "display_name": "Kryptik.dawvk",
          "target": null
        },
        {
          "id": "AdwareSig [Adw]",
          "display_name": "AdwareSig [Adw]",
          "target": null
        },
        {
          "id": "Phishing JPMorgan Chase and Co.",
          "display_name": "Phishing JPMorgan Chase and Co.",
          "target": null
        },
        {
          "id": "Adware.BrowseFoxCRTD",
          "display_name": "Adware.BrowseFoxCRTD",
          "target": null
        },
        {
          "id": "Suspici.1F4405D1",
          "display_name": "Suspici.1F4405D1",
          "target": null
        },
        {
          "id": "PUA.Wombat",
          "display_name": "PUA.Wombat",
          "target": null
        },
        {
          "id": "AdWare.DealPly",
          "display_name": "AdWare.DealPly",
          "target": null
        },
        {
          "id": "Injector.CUAM",
          "display_name": "Injector.CUAM",
          "target": null
        },
        {
          "id": "Downldr.gen",
          "display_name": "Downldr.gen",
          "target": null
        },
        {
          "id": "Troj_Gen.F04IE00CI19",
          "display_name": "Troj_Gen.F04IE00CI19",
          "target": null
        },
        {
          "id": "Worm.Autorun",
          "display_name": "Worm.Autorun",
          "target": null
        },
        {
          "id": "Worm.Boychi",
          "display_name": "Worm.Boychi",
          "target": null
        },
        {
          "id": "Worm.Allaple",
          "display_name": "Worm.Allaple",
          "target": null
        },
        {
          "id": "CVE-2014-3153",
          "display_name": "CVE-2014-3153",
          "target": null
        },
        {
          "id": "BehavesLike.ICLoader",
          "display_name": "BehavesLike.ICLoader",
          "target": null
        },
        {
          "id": "BScope.Backdoor",
          "display_name": "BScope.Backdoor",
          "target": null
        },
        {
          "id": "Trojan.WIN32.PDF.Alien",
          "display_name": "Trojan.WIN32.PDF.Alien",
          "target": null
        },
        {
          "id": "PUP.Systweak",
          "display_name": "PUP.Systweak",
          "target": null
        },
        {
          "id": "Sabsik.FL.B",
          "display_name": "Sabsik.FL.B",
          "target": null
        },
        {
          "id": "malicious.f01f67",
          "display_name": "malicious.f01f67",
          "target": null
        },
        {
          "id": "AGEN.1144657",
          "display_name": "AGEN.1144657",
          "target": null
        },
        {
          "id": "Gen:Variant.Tedy HackTool.VulnDriver",
          "display_name": "Gen:Variant.Tedy HackTool.VulnDriver",
          "target": null
        },
        {
          "id": "Backdoor.Predator",
          "display_name": "Backdoor.Predator",
          "target": null
        },
        {
          "id": "Kryptik.GKQR",
          "display_name": "Kryptik.GKQR",
          "target": null
        },
        {
          "id": "DarkKomet.ife",
          "display_name": "DarkKomet.ife",
          "target": null
        },
        {
          "id": "BehavesLike.Downloader",
          "display_name": "BehavesLike.Downloader",
          "target": null
        },
        {
          "id": "Trojan.JS.Iframe",
          "display_name": "Trojan.JS.Iframe",
          "target": null
        },
        {
          "id": "InstallCore.NP",
          "display_name": "InstallCore.NP",
          "target": null
        },
        {
          "id": "Generic.JS.BlackHole",
          "display_name": "Generic.JS.BlackHole",
          "target": null
        },
        {
          "id": "Dropper.Wanna",
          "display_name": "Dropper.Wanna",
          "target": null
        },
        {
          "id": "Remote Utilities",
          "display_name": "Remote Utilities",
          "target": null
        },
        {
          "id": "W32.InstallCore.AGX",
          "display_name": "W32.InstallCore.AGX",
          "target": null
        },
        {
          "id": "NetTool.RemoteExec",
          "display_name": "NetTool.RemoteExec",
          "target": null
        },
        {
          "id": "Bondat.A",
          "display_name": "Bondat.A",
          "target": null
        },
        {
          "id": "VM201.0.B70B.Malware",
          "display_name": "VM201.0.B70B.Malware",
          "target": null
        },
        {
          "id": "Riskware.NetFilter",
          "display_name": "Riskware.NetFilter",
          "target": null
        },
        {
          "id": "Infected.WebPage",
          "display_name": "Infected.WebPage",
          "target": null
        },
        {
          "id": "HEUR:Exploit.Script",
          "display_name": "HEUR:Exploit.Script",
          "target": null
        },
        {
          "id": "BScope.TrojanDownloader",
          "display_name": "BScope.TrojanDownloader",
          "target": null
        },
        {
          "id": "HTML:RedirBA",
          "display_name": "HTML:RedirBA",
          "target": null
        },
        {
          "id": "Trojan.BAT.Qhost",
          "display_name": "Trojan.BAT.Qhost",
          "target": null
        },
        {
          "id": "HTML:RedirME",
          "display_name": "HTML:RedirME",
          "target": null
        },
        {
          "id": "TrojWare.JS.AdWare.Agent",
          "display_name": "TrojWare.JS.AdWare.Agent",
          "target": null
        },
        {
          "id": "Packed.Dico",
          "display_name": "Packed.Dico",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1602.001",
          "name": "SNMP (MIB Dump)",
          "display_name": "T1602.001 - SNMP (MIB Dump)"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 34,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1695,
        "FileHash-SHA1": 756,
        "FileHash-SHA256": 2029,
        "domain": 290,
        "URL": 1854,
        "hostname": 568,
        "CVE": 5
      },
      "indicator_count": 7197,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "876 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://realketodaily.org",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://realketodaily.org",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776699764.6202204
}