{
  "type": "URL",
  "indicator": "https://registrar.amazon.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://registrar.amazon.com",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #10",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #29",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain amazon.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain amazon.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2907166929,
      "indicator": "https://registrar.amazon.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 15,
      "pulses": [
        {
          "id": "6992bae83a5988dff8311490",
          "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
          "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
          "modified": "2026-04-13T23:46:20.071000",
          "created": "2026-02-16T06:36:24.788000",
          "tags": [
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
            "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#PotentialUS-Origin_FalseFlag_Obfuscation"
          ],
          "references": [
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
            "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
            "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
            "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
            "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
            "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
            "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
            "",
            "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
            "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
            "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
            "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
            "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
            "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
            "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
            "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
            "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
            "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
            "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
            "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
          ],
          "public": 1,
          "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware Family: StealthWorker / GoBrut",
              "display_name": "Malware Family: StealthWorker / GoBrut",
              "target": "/malware/Malware Family: StealthWorker / GoBrut"
            },
            {
              "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2166,
            "FileHash-SHA1": 2067,
            "FileHash-SHA256": 3371,
            "domain": 13295,
            "URL": 6860,
            "email": 272,
            "hostname": 4705,
            "SSLCertFingerprint": 268,
            "CVE": 107,
            "CIDR": 6
          },
          "indicator_count": 33117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "6 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6998d15c75b59044877602c1",
          "name": "Corrupt.... Files",
          "description": "beaware",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-02-20T21:25:48.559000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 706,
            "FileHash-SHA1": 859,
            "FileHash-SHA256": 1480,
            "URL": 743,
            "domain": 1565,
            "email": 55,
            "hostname": 912,
            "CVE": 54,
            "CIDR": 27
          },
          "indicator_count": 6401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "19 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d0b00b7ccb342031594e77",
          "name": "OTX Generated with strange commentary as always",
          "description": "OTX Auto populated-> Yara Yara, a 27-year-old woman from New York, has found that a law firm allegedly controlled Tsara Brashears' life and healthcare plan under the guise of being a Medicare United Healthcare plan. |",
          "modified": "2025-10-22T02:00:03.967000",
          "created": "2025-09-22T02:10:19.819000",
          "tags": [
            "expiration",
            "url http",
            "hall render",
            "possible deep",
            "https",
            "deep panda",
            "brian sabey",
            "tsara brashears",
            "panda",
            "post",
            "virtool",
            "service",
            "fraud",
            "url https",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "claim reversal",
            "view",
            "fieldlastname",
            "filehashmd5",
            "filehashsha1",
            "domain",
            "hostname",
            "virgin islands",
            "united",
            "canada",
            "ireland",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "module load",
            "t1129",
            "show",
            "micromedia",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "copy",
            "c2 activity",
            "cnc ids",
            "beacon",
            "server",
            "domain status",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "date",
            "registrar abuse",
            "registrar",
            "data",
            "ipv4",
            "returnurl",
            "masquerade task",
            "t1448",
            "carrier billing",
            "fraud endpoint",
            "security scan",
            "iocs",
            "learn more",
            "relationship",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob",
            "t1060",
            "scan",
            "entries",
            "healthcare",
            "legal",
            "families",
            "sakurel",
            "formbook att",
            "ck ids",
            "t1199",
            "render",
            "brian",
            "sabey",
            "fieldssn",
            "elqaid16867",
            "elqat1",
            "elqcst272",
            "formbookatt",
            "white insane",
            "law firm",
            "run keys",
            "ta0011",
            "command",
            "control",
            "t1410",
            "redirection",
            "medium",
            "windows",
            "high",
            "yara detections",
            "backdoor",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2189,
            "FileHash-MD5": 469,
            "FileHash-SHA1": 447,
            "FileHash-SHA256": 2446,
            "domain": 465,
            "hostname": 1224,
            "email": 15
          },
          "indicator_count": 7255,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "180 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d09835fed794bdc304de40",
          "name": "Deep Panda | Hall Render | Brian Sabey controlled Tsara Brashears life & Healthcare",
          "description": "Insane. Law Firm Hall Render including attorneys allegedly named M. \u2018Brian Sabey\u2019 and \u2018Gregg Wallender\u2019 began hosting a private pay healthcare plan for Tsara Brashears under the the guise of being a Medicare United Healthcare plan from 3/2021 -  12/2024. What Fraud! Brashears became millions $ in debt. Multiple insurance companies have had to be updated only to be cancelled. She\u2019d been denied spinal stabilization surgery worsening SCI C1 - L5. I didn\u2019t expect to find this at all. When her supplies weren\u2019t paid for. Angry supplier gave information to caregiver. Since then attempts on lives. \nNone of us are safe. I wonder if this is also part of Hall Render. How is this possible?\n\nThese are very dangerous people with hitmen. \nPlease STOP!",
          "modified": "2025-10-21T23:02:21.484000",
          "created": "2025-09-22T00:28:37.292000",
          "tags": [
            "expiration",
            "related pulses",
            "language",
            "html document",
            "ascii text",
            "crlf line",
            "doctype",
            "portal",
            "enter",
            "tax id",
            "provider portal",
            "home",
            "iis windows",
            "provider web",
            "portal account",
            "please",
            "status",
            "server",
            "domain status",
            "registrar abuse",
            "registrar",
            "dnssec",
            "us registrant",
            "email",
            "contact email",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "v3 serial",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "se review",
            "exclude data",
            "extraction",
            "search otx",
            "data upload",
            "enter source",
            "url or",
            "texurag",
            "value a",
            "se source",
            "extra",
            "referen data",
            "ica7nvfarux",
            "include review",
            "failed",
            "sc data",
            "type",
            "extra data",
            "referen",
            "hcpruxi include",
            "review exclude",
            "sugges",
            "exclude",
            "find s",
            "typ url",
            "hos hos",
            "domain hos",
            "hast",
            "referen hcpruxi",
            "include",
            "cus cndigicert",
            "sha256",
            "ca1 odigicert",
            "inc validity",
            "ogainwell",
            "subject public",
            "key info",
            "available from",
            "code",
            "registry tech",
            "admin country",
            "gb registrant",
            "organization",
            "registry domain",
            "tech email",
            "iocs",
            "name servers",
            "emails",
            "search",
            "certificate",
            "passive dns",
            "urls",
            "domain",
            "record value",
            "body",
            "united",
            "present jul",
            "present jun",
            "moved",
            "ip address",
            "entries",
            "unknown cname",
            "present may",
            "title",
            "name",
            "hostname add",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "show",
            "deep panda",
            "module load",
            "t1129",
            "post",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "backdoor",
            "present dec",
            "virgin islands",
            "trojan",
            "present feb",
            "present jan",
            "error",
            "avast avg",
            "possible deep",
            "ipv4 add",
            "pulse pulses",
            "files",
            "hosting",
            "location virgin",
            "islands",
            "twitter",
            "panda",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "read c",
            "formbook cnc",
            "checkin",
            "medium",
            "yara detections",
            "delete",
            "ids detections",
            "pulse",
            "srs ab",
            "showing",
            "uregistruotas",
            "date",
            "pulses",
            "unknown ns",
            "xloader"
          ],
          "references": [
            "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
            "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
            "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
            "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
            "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
            "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
            "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
            "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
            "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
            "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
            "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
            "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
            "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
            "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
            "https://hallrender.com/attorney/gregg-m-wallander/",
            "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            },
            {
              "id": "Sakurel",
              "display_name": "Sakurel",
              "target": null
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Virtool:Win32/Obfuscator.JM",
              "display_name": "Virtool:Win32/Obfuscator.JM",
              "target": "/malware/Virtool:Win32/Obfuscator.JM"
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1886,
            "domain": 378,
            "hostname": 882,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 172,
            "FileHash-SHA256": 1038,
            "email": 9
          },
          "indicator_count": 4538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "180 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68d1021acaa3ff0024effb9a",
          "name": "Deep Panda  \u2022 Formbook - Provider Portal Account Entry \u2022 Widespread issue| Attributed to Brian Sabey of Hall Render ",
          "description": "",
          "modified": "2025-10-21T23:02:21.484000",
          "created": "2025-09-22T08:00:26.271000",
          "tags": [
            "expiration",
            "related pulses",
            "language",
            "html document",
            "ascii text",
            "crlf line",
            "doctype",
            "portal",
            "enter",
            "tax id",
            "provider portal",
            "home",
            "iis windows",
            "provider web",
            "portal account",
            "please",
            "status",
            "server",
            "domain status",
            "registrar abuse",
            "registrar",
            "dnssec",
            "us registrant",
            "email",
            "contact email",
            "algorithm",
            "key identifier",
            "x509v3 subject",
            "full name",
            "v3 serial",
            "number",
            "cus odigicert",
            "inc cndigicert",
            "global g2",
            "tls rsa",
            "se review",
            "exclude data",
            "extraction",
            "search otx",
            "data upload",
            "enter source",
            "url or",
            "texurag",
            "value a",
            "se source",
            "extra",
            "referen data",
            "ica7nvfarux",
            "include review",
            "failed",
            "sc data",
            "type",
            "extra data",
            "referen",
            "hcpruxi include",
            "review exclude",
            "sugges",
            "exclude",
            "find s",
            "typ url",
            "hos hos",
            "domain hos",
            "hast",
            "referen hcpruxi",
            "include",
            "cus cndigicert",
            "sha256",
            "ca1 odigicert",
            "inc validity",
            "ogainwell",
            "subject public",
            "key info",
            "available from",
            "code",
            "registry tech",
            "admin country",
            "gb registrant",
            "organization",
            "registry domain",
            "tech email",
            "iocs",
            "name servers",
            "emails",
            "search",
            "certificate",
            "passive dns",
            "urls",
            "domain",
            "record value",
            "body",
            "united",
            "present jul",
            "present jun",
            "moved",
            "ip address",
            "entries",
            "unknown cname",
            "present may",
            "title",
            "name",
            "hostname add",
            "writeconsolea",
            "regsetvalueexa",
            "regdword",
            "show",
            "deep panda",
            "module load",
            "t1129",
            "post",
            "write",
            "markus",
            "april",
            "win32",
            "lost",
            "malware",
            "backdoor",
            "present dec",
            "virgin islands",
            "trojan",
            "present feb",
            "present jan",
            "error",
            "avast avg",
            "possible deep",
            "ipv4 add",
            "pulse pulses",
            "files",
            "hosting",
            "location virgin",
            "islands",
            "twitter",
            "panda",
            "associated urls",
            "date checked",
            "url hostname",
            "server response",
            "read c",
            "formbook cnc",
            "checkin",
            "medium",
            "yara detections",
            "delete",
            "ids detections",
            "pulse",
            "srs ab",
            "showing",
            "uregistruotas",
            "date",
            "pulses",
            "unknown ns",
            "xloader"
          ],
          "references": [
            "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
            "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
            "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
            "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
            "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
            "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
            "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
            "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
            "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
            "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
            "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
            "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
            "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
            "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
            "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
            "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
            "https://hallrender.com/attorney/gregg-m-wallander/",
            "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
            "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Plugx.N!dha",
              "display_name": "Backdoor:Win32/Plugx.N!dha",
              "target": "/malware/Backdoor:Win32/Plugx.N!dha"
            },
            {
              "id": "Sakurel",
              "display_name": "Sakurel",
              "target": null
            },
            {
              "id": "Win.Packed.Generic-9967832-0",
              "display_name": "Win.Packed.Generic-9967832-0",
              "target": null
            },
            {
              "id": "Virtool:Win32/Obfuscator.JM",
              "display_name": "Virtool:Win32/Obfuscator.JM",
              "target": "/malware/Virtool:Win32/Obfuscator.JM"
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [
            "Healthcare",
            "Legal",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": "68d09835fed794bdc304de40",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1886,
            "domain": 378,
            "hostname": 882,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 172,
            "FileHash-SHA256": 1038,
            "email": 9
          },
          "indicator_count": 4538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "180 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68453dcd748d9a0345cf4758",
          "name": "Malicious - Botnet activity (via X.com) monopolizes music artists",
          "description": "Malicious - Botnet activity monopolizes music artists profiles, financial, network, spyware, virus, Trojan, etc. Very stealthy spyware. Without further investigation, it is difficult to explain just how invasive and dangerous this threat is. \n\u2022 bothelp-205443a5a052.intercom-attachments-1.com\n\u2022 botify-24ab73991b03.intercom-attachments-1.com\n\u2022 contentbot.intercom-attachments-1.com\n\n*OTX is not fully functional for me.Unable to add information re: compromises , references, affected countries.",
          "modified": "2025-07-08T07:01:05.781000",
          "created": "2025-06-08T07:37:49.907000",
          "tags": [
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "url https",
            "entries",
            "server",
            "date",
            "domain name",
            "domain status",
            "email",
            "registrar abuse",
            "registrar url",
            "available from",
            "dnssec",
            "status",
            "code",
            "v3 serial",
            "number",
            "algorithm",
            "cus oamazon",
            "cnamazon rsa",
            "m03 validity",
            "subject public",
            "key info",
            "key algorithm",
            "aaaa",
            "record type",
            "ttl value",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "ascii text",
            "pattern match",
            "mitre att",
            "ck id",
            "show technique",
            "null",
            "refresh",
            "body",
            "span",
            "june",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "emails",
            "servers",
            "moved",
            "passive dns",
            "urls",
            "registrar",
            "creation date",
            "search",
            "name servers",
            "unknown ns",
            "united",
            "domain",
            "domain add",
            "pulse submit",
            "url analysis",
            "dynamicloader",
            "directui",
            "element",
            "write c",
            "classinfobase",
            "high",
            "medium",
            "default",
            "getclassinfoptr",
            "write",
            "themida",
            "movie",
            "insert",
            "malware",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 85,
            "hostname": 747,
            "domain": 217,
            "email": 8,
            "FileHash-SHA1": 198,
            "FileHash-MD5": 195,
            "FileHash-SHA256": 1269
          },
          "indicator_count": 2719,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "286 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b809ec9da9326e1bdf8743",
          "name": "Pegasus | Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com]",
          "description": "",
          "modified": "2024-01-29T20:26:20.769000",
          "created": "2024-01-29T20:26:20.769000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "657feca7df9ea6c21350c01a",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "811 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b809eabd76cbbfdfc07c6e",
          "name": "Pegasus | Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com]",
          "description": "",
          "modified": "2024-01-29T20:26:18.174000",
          "created": "2024-01-29T20:26:18.174000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "657feca7df9ea6c21350c01a",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "811 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657f69115e6b1bdc8a7dcdbc",
          "name": "RallyPoint.com",
          "description": "MyPublicWiFi.exe\nRallyPoint.com",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-17T21:33:05.056000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657f6919cafcba3ac406d5b2",
          "name": "RallyPoint.com",
          "description": "MyPublicWiFi.exe\nRallyPoint.com",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-17T21:33:13.375000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657f6920d79aa646c2d5db49",
          "name": "RallyPoint.com",
          "description": "MyPublicWiFi.exe\nRallyPoint.com",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-17T21:33:20.787000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657f6b136775cbf67d25ddfb",
          "name": "Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com] Alias Brian Sabey?",
          "description": "",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-17T21:41:39.434000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "657f69115e6b1bdc8a7dcdbc",
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657feca7df9ea6c21350c01a",
          "name": "Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com] ",
          "description": "",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-18T06:54:31.063000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "657f6b136775cbf67d25ddfb",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6581d8d30621e6303cad9da4",
          "name": "RallyPoint.com",
          "description": "",
          "modified": "2024-01-16T18:00:08.947000",
          "created": "2023-12-19T17:54:27.416000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "search",
            "showing",
            "aaaa",
            "emails",
            "name servers",
            "servers",
            "as54113",
            "body",
            "date",
            "as15169 google",
            "cname",
            "as393648",
            "moved",
            "creation date",
            "record value",
            "entries",
            "domain related",
            "domains show",
            "asn15169",
            "google",
            "frankfurt",
            "main",
            "germany",
            "http",
            "ashburn",
            "amazonaes",
            "asn16509",
            "facebook",
            "june",
            "general full",
            "url https",
            "reverse dns",
            "protocol h2",
            "security tls",
            "get h2",
            "software",
            "resource",
            "hash",
            "value",
            "search live",
            "api blog",
            "docs pricing",
            "login",
            "december",
            "variables",
            "paq object",
            "piwik",
            "matomo",
            "article",
            "join url",
            "facebook url",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "ip detail",
            "domains domain",
            "tree links",
            "certs frames",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware",
            "heur",
            "malware site",
            "malicious site",
            "million",
            "phishing site",
            "phishing",
            "unsafe",
            "applicunwnt",
            "artemis",
            "riskware",
            "revenue service",
            "iframe",
            "downldr",
            "agent",
            "presenoker",
            "vidar",
            "alexa",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "urls http",
            "njrat",
            "ransomware",
            "communicating",
            "referrer",
            "whois whois",
            "hostname",
            "hostnames",
            "ip address",
            "javascript",
            "detections type",
            "name",
            "win32 exe",
            "email holokaust",
            "android",
            "files",
            "android file",
            "domains",
            "hashes",
            "westlaw njrat",
            "whois",
            "collections",
            "contacted",
            "pe resource",
            "threat roundup",
            "january",
            "collection",
            "august",
            "lolkek",
            "installer",
            "hacktool",
            "emotet",
            "lazarus",
            "makop",
            "core"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "657f69115e6b1bdc8a7dcdbc",
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 149,
            "FileHash-SHA1": 97,
            "URL": 15233,
            "domain": 3362,
            "email": 14,
            "hostname": 5001,
            "FileHash-SHA256": 2750,
            "CVE": 5
          },
          "indicator_count": 26611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "824 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "622a30749031252d90bdfa74",
          "name": "DanielCasais.com ~ Senior Voting Systems Specialist at the Colorado Department of State",
          "description": "",
          "modified": "2022-04-09T00:00:32.009000",
          "created": "2022-03-10T17:08:04.550000",
          "tags": [
            "registrar",
            "date",
            "passive dns",
            "server",
            "registrar abuse",
            "redacted",
            "domain name",
            "registrar url",
            "contact phone",
            "domain status",
            "whois privacy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 374,
            "URL": 408,
            "domain": 216,
            "FileHash-SHA256": 24,
            "email": 1
          },
          "indicator_count": 1023,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1472 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
        "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
        "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
        "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
        "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
        "https://hallrender.com/attorney/gregg-m-wallander/",
        "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
        "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
        "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
        "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
        "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
        "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
        "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
        "T1110.001 (Brute Force: Password Guessing)",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset.",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s"
          ],
          "malware_families": [
            "Virtool:win32/obfuscator.jm",
            "Sakurel",
            "Backdoor:win32/plugx.n!dha",
            "Formbook",
            "Win.packed.generic-9967832-0",
            "Md5 hash: f8add7e7161460ea2b1970cf4ca535bf",
            "Malware family: stealthworker / gobrut"
          ],
          "industries": [
            "Government",
            "Legal",
            "Healthcare"
          ],
          "unique_indicators": 65700
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/amazon.com",
    "whois": "http://whois.domaintools.com/amazon.com",
    "domain": "amazon.com",
    "hostname": "registrar.amazon.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 15,
  "pulses": [
    {
      "id": "6992bae83a5988dff8311490",
      "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
      "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
      "modified": "2026-04-13T23:46:20.071000",
      "created": "2026-02-16T06:36:24.788000",
      "tags": [
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
        "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
        "#PotentialUS-Origin_FalseFlag_Obfuscation"
      ],
      "references": [
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
      ],
      "public": 1,
      "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware Family: StealthWorker / GoBrut",
          "display_name": "Malware Family: StealthWorker / GoBrut",
          "target": "/malware/Malware Family: StealthWorker / GoBrut"
        },
        {
          "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2166,
        "FileHash-SHA1": 2067,
        "FileHash-SHA256": 3371,
        "domain": 13295,
        "URL": 6860,
        "email": 272,
        "hostname": 4705,
        "SSLCertFingerprint": 268,
        "CVE": 107,
        "CIDR": 6
      },
      "indicator_count": 33117,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 62,
      "modified_text": "6 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6998d15c75b59044877602c1",
      "name": "Corrupt.... Files",
      "description": "beaware",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-02-20T21:25:48.559000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 706,
        "FileHash-SHA1": 859,
        "FileHash-SHA256": 1480,
        "URL": 743,
        "domain": 1565,
        "email": 55,
        "hostname": 912,
        "CVE": 54,
        "CIDR": 27
      },
      "indicator_count": 6401,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "19 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d0b00b7ccb342031594e77",
      "name": "OTX Generated with strange commentary as always",
      "description": "OTX Auto populated-> Yara Yara, a 27-year-old woman from New York, has found that a law firm allegedly controlled Tsara Brashears' life and healthcare plan under the guise of being a Medicare United Healthcare plan. |",
      "modified": "2025-10-22T02:00:03.967000",
      "created": "2025-09-22T02:10:19.819000",
      "tags": [
        "expiration",
        "url http",
        "hall render",
        "possible deep",
        "https",
        "deep panda",
        "brian sabey",
        "tsara brashears",
        "panda",
        "post",
        "virtool",
        "service",
        "fraud",
        "url https",
        "search",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "claim reversal",
        "view",
        "fieldlastname",
        "filehashmd5",
        "filehashsha1",
        "domain",
        "hostname",
        "virgin islands",
        "united",
        "canada",
        "ireland",
        "writeconsolea",
        "regsetvalueexa",
        "regdword",
        "module load",
        "t1129",
        "show",
        "micromedia",
        "write",
        "markus",
        "april",
        "win32",
        "lost",
        "malware",
        "copy",
        "c2 activity",
        "cnc ids",
        "beacon",
        "server",
        "domain status",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "full name",
        "date",
        "registrar abuse",
        "registrar",
        "data",
        "ipv4",
        "returnurl",
        "masquerade task",
        "t1448",
        "carrier billing",
        "fraud endpoint",
        "security scan",
        "iocs",
        "learn more",
        "relationship",
        "t1040",
        "sniffing",
        "t1045",
        "packing",
        "t1053",
        "taskjob",
        "t1060",
        "scan",
        "entries",
        "healthcare",
        "legal",
        "families",
        "sakurel",
        "formbook att",
        "ck ids",
        "t1199",
        "render",
        "brian",
        "sabey",
        "fieldssn",
        "elqaid16867",
        "elqat1",
        "elqcst272",
        "formbookatt",
        "white insane",
        "law firm",
        "run keys",
        "ta0011",
        "command",
        "control",
        "t1410",
        "redirection",
        "medium",
        "windows",
        "high",
        "yara detections",
        "backdoor",
        "showing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1448",
          "name": "Carrier Billing Fraud",
          "display_name": "T1448 - Carrier Billing Fraud"
        }
      ],
      "industries": [
        "Healthcare",
        "Legal",
        "Government"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2189,
        "FileHash-MD5": 469,
        "FileHash-SHA1": 447,
        "FileHash-SHA256": 2446,
        "domain": 465,
        "hostname": 1224,
        "email": 15
      },
      "indicator_count": 7255,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "180 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d09835fed794bdc304de40",
      "name": "Deep Panda | Hall Render | Brian Sabey controlled Tsara Brashears life & Healthcare",
      "description": "Insane. Law Firm Hall Render including attorneys allegedly named M. \u2018Brian Sabey\u2019 and \u2018Gregg Wallender\u2019 began hosting a private pay healthcare plan for Tsara Brashears under the the guise of being a Medicare United Healthcare plan from 3/2021 -  12/2024. What Fraud! Brashears became millions $ in debt. Multiple insurance companies have had to be updated only to be cancelled. She\u2019d been denied spinal stabilization surgery worsening SCI C1 - L5. I didn\u2019t expect to find this at all. When her supplies weren\u2019t paid for. Angry supplier gave information to caregiver. Since then attempts on lives. \nNone of us are safe. I wonder if this is also part of Hall Render. How is this possible?\n\nThese are very dangerous people with hitmen. \nPlease STOP!",
      "modified": "2025-10-21T23:02:21.484000",
      "created": "2025-09-22T00:28:37.292000",
      "tags": [
        "expiration",
        "related pulses",
        "language",
        "html document",
        "ascii text",
        "crlf line",
        "doctype",
        "portal",
        "enter",
        "tax id",
        "provider portal",
        "home",
        "iis windows",
        "provider web",
        "portal account",
        "please",
        "status",
        "server",
        "domain status",
        "registrar abuse",
        "registrar",
        "dnssec",
        "us registrant",
        "email",
        "contact email",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "full name",
        "v3 serial",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "se review",
        "exclude data",
        "extraction",
        "search otx",
        "data upload",
        "enter source",
        "url or",
        "texurag",
        "value a",
        "se source",
        "extra",
        "referen data",
        "ica7nvfarux",
        "include review",
        "failed",
        "sc data",
        "type",
        "extra data",
        "referen",
        "hcpruxi include",
        "review exclude",
        "sugges",
        "exclude",
        "find s",
        "typ url",
        "hos hos",
        "domain hos",
        "hast",
        "referen hcpruxi",
        "include",
        "cus cndigicert",
        "sha256",
        "ca1 odigicert",
        "inc validity",
        "ogainwell",
        "subject public",
        "key info",
        "available from",
        "code",
        "registry tech",
        "admin country",
        "gb registrant",
        "organization",
        "registry domain",
        "tech email",
        "iocs",
        "name servers",
        "emails",
        "search",
        "certificate",
        "passive dns",
        "urls",
        "domain",
        "record value",
        "body",
        "united",
        "present jul",
        "present jun",
        "moved",
        "ip address",
        "entries",
        "unknown cname",
        "present may",
        "title",
        "name",
        "hostname add",
        "writeconsolea",
        "regsetvalueexa",
        "regdword",
        "show",
        "deep panda",
        "module load",
        "t1129",
        "post",
        "write",
        "markus",
        "april",
        "win32",
        "lost",
        "malware",
        "backdoor",
        "present dec",
        "virgin islands",
        "trojan",
        "present feb",
        "present jan",
        "error",
        "avast avg",
        "possible deep",
        "ipv4 add",
        "pulse pulses",
        "files",
        "hosting",
        "location virgin",
        "islands",
        "twitter",
        "panda",
        "associated urls",
        "date checked",
        "url hostname",
        "server response",
        "read c",
        "formbook cnc",
        "checkin",
        "medium",
        "yara detections",
        "delete",
        "ids detections",
        "pulse",
        "srs ab",
        "showing",
        "uregistruotas",
        "date",
        "pulses",
        "unknown ns",
        "xloader"
      ],
      "references": [
        "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
        "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
        "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
        "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
        "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
        "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
        "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
        "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
        "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
        "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
        "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
        "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
        "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
        "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
        "https://hallrender.com/attorney/gregg-m-wallander/",
        "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
        "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        },
        {
          "id": "Sakurel",
          "display_name": "Sakurel",
          "target": null
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "Virtool:Win32/Obfuscator.JM",
          "display_name": "Virtool:Win32/Obfuscator.JM",
          "target": "/malware/Virtool:Win32/Obfuscator.JM"
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1448",
          "name": "Carrier Billing Fraud",
          "display_name": "T1448 - Carrier Billing Fraud"
        }
      ],
      "industries": [
        "Healthcare",
        "Legal",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1886,
        "domain": 378,
        "hostname": 882,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 172,
        "FileHash-SHA256": 1038,
        "email": 9
      },
      "indicator_count": 4538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "180 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68d1021acaa3ff0024effb9a",
      "name": "Deep Panda  \u2022 Formbook - Provider Portal Account Entry \u2022 Widespread issue| Attributed to Brian Sabey of Hall Render ",
      "description": "",
      "modified": "2025-10-21T23:02:21.484000",
      "created": "2025-09-22T08:00:26.271000",
      "tags": [
        "expiration",
        "related pulses",
        "language",
        "html document",
        "ascii text",
        "crlf line",
        "doctype",
        "portal",
        "enter",
        "tax id",
        "provider portal",
        "home",
        "iis windows",
        "provider web",
        "portal account",
        "please",
        "status",
        "server",
        "domain status",
        "registrar abuse",
        "registrar",
        "dnssec",
        "us registrant",
        "email",
        "contact email",
        "algorithm",
        "key identifier",
        "x509v3 subject",
        "full name",
        "v3 serial",
        "number",
        "cus odigicert",
        "inc cndigicert",
        "global g2",
        "tls rsa",
        "se review",
        "exclude data",
        "extraction",
        "search otx",
        "data upload",
        "enter source",
        "url or",
        "texurag",
        "value a",
        "se source",
        "extra",
        "referen data",
        "ica7nvfarux",
        "include review",
        "failed",
        "sc data",
        "type",
        "extra data",
        "referen",
        "hcpruxi include",
        "review exclude",
        "sugges",
        "exclude",
        "find s",
        "typ url",
        "hos hos",
        "domain hos",
        "hast",
        "referen hcpruxi",
        "include",
        "cus cndigicert",
        "sha256",
        "ca1 odigicert",
        "inc validity",
        "ogainwell",
        "subject public",
        "key info",
        "available from",
        "code",
        "registry tech",
        "admin country",
        "gb registrant",
        "organization",
        "registry domain",
        "tech email",
        "iocs",
        "name servers",
        "emails",
        "search",
        "certificate",
        "passive dns",
        "urls",
        "domain",
        "record value",
        "body",
        "united",
        "present jul",
        "present jun",
        "moved",
        "ip address",
        "entries",
        "unknown cname",
        "present may",
        "title",
        "name",
        "hostname add",
        "writeconsolea",
        "regsetvalueexa",
        "regdword",
        "show",
        "deep panda",
        "module load",
        "t1129",
        "post",
        "write",
        "markus",
        "april",
        "win32",
        "lost",
        "malware",
        "backdoor",
        "present dec",
        "virgin islands",
        "trojan",
        "present feb",
        "present jan",
        "error",
        "avast avg",
        "possible deep",
        "ipv4 add",
        "pulse pulses",
        "files",
        "hosting",
        "location virgin",
        "islands",
        "twitter",
        "panda",
        "associated urls",
        "date checked",
        "url hostname",
        "server response",
        "read c",
        "formbook cnc",
        "checkin",
        "medium",
        "yara detections",
        "delete",
        "ids detections",
        "pulse",
        "srs ab",
        "showing",
        "uregistruotas",
        "date",
        "pulses",
        "unknown ns",
        "xloader"
      ],
      "references": [
        "/hcp/ruxitagentjs_ICA7NVfqrux_10321250808084810.js",
        "IDS Detections: Possible DEEP PANDA C2 Activity Possible Deep Panda - Sakula/Mivast RAT CnC",
        "IDS: Beacon 5 Sakula/Mivast C2 Activity HTTP traffic on port 443 (POST)",
        "Yara Detections: RAT_Sakula ,  ScanBox_Malware_Generic ,  Nrv2x ,  UPX_OEP_place ,  UPX20030XMarkusOberhumerLaszloMolnarJohnReiser ,",
        "Yara: UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ,  UPXv20MarkusLaszloReiser ,  UPX",
        "Yara: kernel32_dll_xor_exe_key_11 ,  xor_0xb_kernel32_dll",
        "Alerts: network_icmp persistence_autorun modifies_proxy_wpad packer_polymorphic",
        "IDS: FormBook CnC Checkin (POST) Terse HTTP 1.0 Request Possible Nivdort Beacon 5 Possible DEEP PANDA C2 Activity (208.91.197.27)",
        "IDS:  Possible HTTP 403 XSS Attempt (Local Source) Possible Deep Panda - Sakula/Mivast RAT CnC (208.91.197.27)",
        "Craziest thing ever! Hall Render \u2018alleged\u2019 Law Firm was paying Tara Brasheats insurance?!",
        "Insane! They 1st kicked her of her Private pay United Healthcare. Put her off of Medicare. Won\u2019t pay!",
        "http://2fwww.hallrender.com/ \u2022  http://citrix.hallrender.com/ \u2022 http://dev.hallrender.com/  http://hallrender.com/attorney/brian-sabey/ No Expiration\t0\t  URL http://hallrender.com/resource-blog No Expiration\t0\t  URL http://hallrender.com/resources No Expiration\t0\t  URL http://mail.hallrender.com/ No Expiration\t0\t  URL http://www.hallrender.com/attorney/brian-sabey",
        "autodiscover.hallrender.com \u2022 hallrender.com \u2022 https://www.hallrender.com/wp-json/oembed",
        "image.marketing.hallrender.com \u2022  https://hallrender.com/resources \u2022",
        "https://hallrender.com/resources/blog/ \u2022 https://www.hallrender.com/attorn",
        "www.podcast.hallrender.com  \u2022 https://hallrender.com/resource-blog \u2022",
        "https://hallrender.com/attorney/gregg-m-wallander/",
        "https://elite.hallrender.com/TE_3E_PROD/web/ui/dashboard/ActionList_CCC",
        "https://hallrender.com/attorney/brian-sabey/ \u2022 https://hallrender.com/resources/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Plugx.N!dha",
          "display_name": "Backdoor:Win32/Plugx.N!dha",
          "target": "/malware/Backdoor:Win32/Plugx.N!dha"
        },
        {
          "id": "Sakurel",
          "display_name": "Sakurel",
          "target": null
        },
        {
          "id": "Win.Packed.Generic-9967832-0",
          "display_name": "Win.Packed.Generic-9967832-0",
          "target": null
        },
        {
          "id": "Virtool:Win32/Obfuscator.JM",
          "display_name": "Virtool:Win32/Obfuscator.JM",
          "target": "/malware/Virtool:Win32/Obfuscator.JM"
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1448",
          "name": "Carrier Billing Fraud",
          "display_name": "T1448 - Carrier Billing Fraud"
        }
      ],
      "industries": [
        "Healthcare",
        "Legal",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": "68d09835fed794bdc304de40",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1886,
        "domain": 378,
        "hostname": 882,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 172,
        "FileHash-SHA256": 1038,
        "email": 9
      },
      "indicator_count": 4538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "180 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68453dcd748d9a0345cf4758",
      "name": "Malicious - Botnet activity (via X.com) monopolizes music artists",
      "description": "Malicious - Botnet activity monopolizes music artists profiles, financial, network, spyware, virus, Trojan, etc. Very stealthy spyware. Without further investigation, it is difficult to explain just how invasive and dangerous this threat is. \n\u2022 bothelp-205443a5a052.intercom-attachments-1.com\n\u2022 botify-24ab73991b03.intercom-attachments-1.com\n\u2022 contentbot.intercom-attachments-1.com\n\n*OTX is not fully functional for me.Unable to add information re: compromises , references, affected countries.",
      "modified": "2025-07-08T07:01:05.781000",
      "created": "2025-06-08T07:37:49.907000",
      "tags": [
        "indicator role",
        "title added",
        "active related",
        "pulses url",
        "url http",
        "url https",
        "entries",
        "server",
        "date",
        "domain name",
        "domain status",
        "email",
        "registrar abuse",
        "registrar url",
        "available from",
        "dnssec",
        "status",
        "code",
        "v3 serial",
        "number",
        "algorithm",
        "cus oamazon",
        "cnamazon rsa",
        "m03 validity",
        "subject public",
        "key info",
        "key algorithm",
        "aaaa",
        "record type",
        "ttl value",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha256",
        "sha1",
        "ascii text",
        "pattern match",
        "mitre att",
        "ck id",
        "show technique",
        "null",
        "refresh",
        "body",
        "span",
        "june",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "emails",
        "servers",
        "moved",
        "passive dns",
        "urls",
        "registrar",
        "creation date",
        "search",
        "name servers",
        "unknown ns",
        "united",
        "domain",
        "domain add",
        "pulse submit",
        "url analysis",
        "dynamicloader",
        "directui",
        "element",
        "write c",
        "classinfobase",
        "high",
        "medium",
        "default",
        "getclassinfoptr",
        "write",
        "themida",
        "movie",
        "insert",
        "malware",
        "copy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 85,
        "hostname": 747,
        "domain": 217,
        "email": 8,
        "FileHash-SHA1": 198,
        "FileHash-MD5": 195,
        "FileHash-SHA256": 1269
      },
      "indicator_count": 2719,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "286 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b809ec9da9326e1bdf8743",
      "name": "Pegasus | Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com]",
      "description": "",
      "modified": "2024-01-29T20:26:20.769000",
      "created": "2024-01-29T20:26:20.769000",
      "tags": [
        "united",
        "unknown",
        "as13335",
        "search",
        "showing",
        "aaaa",
        "emails",
        "name servers",
        "servers",
        "as54113",
        "body",
        "date",
        "as15169 google",
        "cname",
        "as393648",
        "moved",
        "creation date",
        "record value",
        "entries",
        "domain related",
        "domains show",
        "asn15169",
        "google",
        "frankfurt",
        "main",
        "germany",
        "http",
        "ashburn",
        "amazonaes",
        "asn16509",
        "facebook",
        "june",
        "general full",
        "url https",
        "reverse dns",
        "protocol h2",
        "security tls",
        "get h2",
        "software",
        "resource",
        "hash",
        "value",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "december",
        "variables",
        "paq object",
        "piwik",
        "matomo",
        "article",
        "join url",
        "facebook url",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "ip detail",
        "domains domain",
        "tree links",
        "certs frames",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "malware",
        "heur",
        "malware site",
        "malicious site",
        "million",
        "phishing site",
        "phishing",
        "unsafe",
        "applicunwnt",
        "artemis",
        "riskware",
        "revenue service",
        "iframe",
        "downldr",
        "agent",
        "presenoker",
        "vidar",
        "alexa",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "urls http",
        "njrat",
        "ransomware",
        "communicating",
        "referrer",
        "whois whois",
        "hostname",
        "hostnames",
        "ip address",
        "javascript",
        "detections type",
        "name",
        "win32 exe",
        "email holokaust",
        "android",
        "files",
        "android file",
        "domains",
        "hashes",
        "westlaw njrat",
        "whois",
        "collections",
        "contacted",
        "pe resource",
        "threat roundup",
        "january",
        "collection",
        "august",
        "lolkek",
        "installer",
        "hacktool",
        "emotet",
        "lazarus",
        "makop",
        "core"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "657feca7df9ea6c21350c01a",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 149,
        "FileHash-SHA1": 97,
        "URL": 15233,
        "domain": 3362,
        "email": 14,
        "hostname": 5001,
        "FileHash-SHA256": 2750,
        "CVE": 5
      },
      "indicator_count": 26611,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "811 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65b809eabd76cbbfdfc07c6e",
      "name": "Pegasus | Lazarus Group [Hallrender.com = safebae.oeg + rallypoint.com]",
      "description": "",
      "modified": "2024-01-29T20:26:18.174000",
      "created": "2024-01-29T20:26:18.174000",
      "tags": [
        "united",
        "unknown",
        "as13335",
        "search",
        "showing",
        "aaaa",
        "emails",
        "name servers",
        "servers",
        "as54113",
        "body",
        "date",
        "as15169 google",
        "cname",
        "as393648",
        "moved",
        "creation date",
        "record value",
        "entries",
        "domain related",
        "domains show",
        "asn15169",
        "google",
        "frankfurt",
        "main",
        "germany",
        "http",
        "ashburn",
        "amazonaes",
        "asn16509",
        "facebook",
        "june",
        "general full",
        "url https",
        "reverse dns",
        "protocol h2",
        "security tls",
        "get h2",
        "software",
        "resource",
        "hash",
        "value",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "december",
        "variables",
        "paq object",
        "piwik",
        "matomo",
        "article",
        "join url",
        "facebook url",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "ip detail",
        "domains domain",
        "tree links",
        "certs frames",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "malware",
        "heur",
        "malware site",
        "malicious site",
        "million",
        "phishing site",
        "phishing",
        "unsafe",
        "applicunwnt",
        "artemis",
        "riskware",
        "revenue service",
        "iframe",
        "downldr",
        "agent",
        "presenoker",
        "vidar",
        "alexa",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "urls http",
        "njrat",
        "ransomware",
        "communicating",
        "referrer",
        "whois whois",
        "hostname",
        "hostnames",
        "ip address",
        "javascript",
        "detections type",
        "name",
        "win32 exe",
        "email holokaust",
        "android",
        "files",
        "android file",
        "domains",
        "hashes",
        "westlaw njrat",
        "whois",
        "collections",
        "contacted",
        "pe resource",
        "threat roundup",
        "january",
        "collection",
        "august",
        "lolkek",
        "installer",
        "hacktool",
        "emotet",
        "lazarus",
        "makop",
        "core"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "657feca7df9ea6c21350c01a",
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 149,
        "FileHash-SHA1": 97,
        "URL": 15233,
        "domain": 3362,
        "email": 14,
        "hostname": 5001,
        "FileHash-SHA256": 2750,
        "CVE": 5
      },
      "indicator_count": 26611,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "811 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657f69115e6b1bdc8a7dcdbc",
      "name": "RallyPoint.com",
      "description": "MyPublicWiFi.exe\nRallyPoint.com",
      "modified": "2024-01-16T18:00:08.947000",
      "created": "2023-12-17T21:33:05.056000",
      "tags": [
        "united",
        "unknown",
        "as13335",
        "search",
        "showing",
        "aaaa",
        "emails",
        "name servers",
        "servers",
        "as54113",
        "body",
        "date",
        "as15169 google",
        "cname",
        "as393648",
        "moved",
        "creation date",
        "record value",
        "entries",
        "domain related",
        "domains show",
        "asn15169",
        "google",
        "frankfurt",
        "main",
        "germany",
        "http",
        "ashburn",
        "amazonaes",
        "asn16509",
        "facebook",
        "june",
        "general full",
        "url https",
        "reverse dns",
        "protocol h2",
        "security tls",
        "get h2",
        "software",
        "resource",
        "hash",
        "value",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "december",
        "variables",
        "paq object",
        "piwik",
        "matomo",
        "article",
        "join url",
        "facebook url",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "ip detail",
        "domains domain",
        "tree links",
        "certs frames",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "malware",
        "heur",
        "malware site",
        "malicious site",
        "million",
        "phishing site",
        "phishing",
        "unsafe",
        "applicunwnt",
        "artemis",
        "riskware",
        "revenue service",
        "iframe",
        "downldr",
        "agent",
        "presenoker",
        "vidar",
        "alexa",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "urls http",
        "njrat",
        "ransomware",
        "communicating",
        "referrer",
        "whois whois",
        "hostname",
        "hostnames",
        "ip address",
        "javascript",
        "detections type",
        "name",
        "win32 exe",
        "email holokaust",
        "android",
        "files",
        "android file",
        "domains",
        "hashes",
        "westlaw njrat",
        "whois",
        "collections",
        "contacted",
        "pe resource",
        "threat roundup",
        "january",
        "collection",
        "august",
        "lolkek",
        "installer",
        "hacktool",
        "emotet",
        "lazarus",
        "makop",
        "core"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 149,
        "FileHash-SHA1": 97,
        "URL": 15233,
        "domain": 3362,
        "email": 14,
        "hostname": 5001,
        "FileHash-SHA256": 2750,
        "CVE": 5
      },
      "indicator_count": 26611,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "824 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "657f6919cafcba3ac406d5b2",
      "name": "RallyPoint.com",
      "description": "MyPublicWiFi.exe\nRallyPoint.com",
      "modified": "2024-01-16T18:00:08.947000",
      "created": "2023-12-17T21:33:13.375000",
      "tags": [
        "united",
        "unknown",
        "as13335",
        "search",
        "showing",
        "aaaa",
        "emails",
        "name servers",
        "servers",
        "as54113",
        "body",
        "date",
        "as15169 google",
        "cname",
        "as393648",
        "moved",
        "creation date",
        "record value",
        "entries",
        "domain related",
        "domains show",
        "asn15169",
        "google",
        "frankfurt",
        "main",
        "germany",
        "http",
        "ashburn",
        "amazonaes",
        "asn16509",
        "facebook",
        "june",
        "general full",
        "url https",
        "reverse dns",
        "protocol h2",
        "security tls",
        "get h2",
        "software",
        "resource",
        "hash",
        "value",
        "search live",
        "api blog",
        "docs pricing",
        "login",
        "december",
        "variables",
        "paq object",
        "piwik",
        "matomo",
        "article",
        "join url",
        "facebook url",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "ip detail",
        "domains domain",
        "tree links",
        "certs frames",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "malware",
        "heur",
        "malware site",
        "malicious site",
        "million",
        "phishing site",
        "phishing",
        "unsafe",
        "applicunwnt",
        "artemis",
        "riskware",
        "revenue service",
        "iframe",
        "downldr",
        "agent",
        "presenoker",
        "vidar",
        "alexa",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "urls http",
        "njrat",
        "ransomware",
        "communicating",
        "referrer",
        "whois whois",
        "hostname",
        "hostnames",
        "ip address",
        "javascript",
        "detections type",
        "name",
        "win32 exe",
        "email holokaust",
        "android",
        "files",
        "android file",
        "domains",
        "hashes",
        "westlaw njrat",
        "whois",
        "collections",
        "contacted",
        "pe resource",
        "threat roundup",
        "january",
        "collection",
        "august",
        "lolkek",
        "installer",
        "hacktool",
        "emotet",
        "lazarus",
        "makop",
        "core"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 149,
        "FileHash-SHA1": 97,
        "URL": 15233,
        "domain": 3362,
        "email": 14,
        "hostname": 5001,
        "FileHash-SHA256": 2750,
        "CVE": 5
      },
      "indicator_count": 26611,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "824 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://registrar.amazon.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://registrar.amazon.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776700637.9284258
}