{
  "type": "URL",
  "indicator": "https://rocx42.site/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://rocx42.site/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4170596756,
      "indicator": "https://rocx42.site/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "695fd5fa266f9ea34c8f5c45",
          "name": "Cats and Kittens Attack Mirai Botnet and how it may target Threat Exchange users",
          "description": "Cat attacks related to LummaC2 attacks,info stealing, domain seizures, etc. Including are references to the Lumma C2 with cats and Aura Stealer attacks. Same attack group , includes Mirai Botnet. Has the group become a larger , stronger adversary? \nSony Music connection. I\u2019m aware (The US Department of Justice and Microsoft disrupted LummaC2 infostealing-malware through domain seizures, taking down over 2,300 associated domains. The FBI and CISA by AlienVault) Further research necessary.",
          "modified": "2026-02-07T14:04:48.556000",
          "created": "2026-01-08T16:06:18.126000",
          "tags": [
            "levelblue labs",
            "mirai",
            "windows",
            "ck ids",
            "application",
            "network denial",
            "service",
            "contacted",
            "search",
            "unknown",
            "top source",
            "top destination",
            "source source",
            "china as4812",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "enter",
            "udp include",
            "country",
            "unique",
            "unique asns",
            "ip hostname",
            "reverse ip",
            "lookup country",
            "china as17429",
            "taiwan as3462",
            "new caledonia",
            "as18200 office",
            "china as4538",
            "china as9394",
            "india as137654",
            "japan as2514",
            "japan as9365",
            "china as45083",
            "endian",
            "linux",
            "apple",
            "linux subsys",
            "lang c",
            "linenum",
            "lsyms",
            "machine",
            "static",
            "va",
            "os linux",
            "nx",
            "relocs",
            "intel 8038",
            "elf32",
            "malware distribution",
            "domain seizures",
            "infostealing malware",
            "cat-themed domains",
            "gather victim",
            "t1589",
            "t1568",
            "t1590",
            "web protocols",
            "drop resolver",
            "t1568 t1590",
            "show",
            "filehash",
            "md5 add",
            "pulse pulses",
            "copy",
            "affected _and_fixed",
            "thank you"
          ],
          "references": [
            "cat-are-here.ru",
            "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
            "Yara Detections: LZMA",
            "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
            "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
            "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
            "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
            "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
            "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
            "CloudFlare Domain: apple-dns.net",
            "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
            "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
            "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
            "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
            "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
            "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
            "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
            "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
            "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
            "https://view.emails.sonymusicfans.com/Error.aspx",
            "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
            "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click",
            "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
            "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
            "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
            "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
            "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
            "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
            "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai (ELF)",
              "display_name": "Mirai (ELF)",
              "target": null
            },
            {
              "id": "Mirai (Windows)",
              "display_name": "Mirai (Windows)",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-10028259-0",
              "display_name": "Unix.Trojan.Mirai-10028259-0",
              "target": null
            },
            {
              "id": "Unix.Trojan.Gafgyt-6981160-0",
              "display_name": "Unix.Trojan.Gafgyt-6981160-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1584.001",
              "name": "Domains",
              "display_name": "T1584.001 - Domains"
            },
            {
              "id": "T1102.001",
              "name": "Dead Drop Resolver",
              "display_name": "T1102.001 - Dead Drop Resolver"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 74,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 1067,
            "URL": 2140,
            "domain": 247,
            "hostname": 674,
            "CVE": 2
          },
          "indicator_count": 4278,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "71 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "695c7b40f5d2f292a7512e81",
          "name": "USteal Reputation Smear  | Malicious Media | TrojanSpy - CrazyFrost.com",
          "description": "Who is CrazyFrost? USteal Reputation Smear  | Malicious Media | TrojanSpy would affect anyone who clicks on honeypot / dga domain. iPhone spyware. We\u2019ve been working on exposing spyware. Emotet / AutoIT , cabs, password stealer, and more found. Investigators and attorneys from the past Investigators reported victims life, was being promoted over the dark web. From bathing to cooking , conversations to arguments, getting dressed to passing gas. Haha. Small cameras were accessed remotely in her former. Castle Pines, Co hideaway. A third investigator confirmed tiny cameras were installed when victim was in staycationing. When family arrived home garage door  and secured doors were boldly left open. Crazy True. [otx auto generated- The following is the full text of the public-key-precert-scts, which has been posted on the website of Redporn.video, the site of an unauthorised sex tape.]",
          "modified": "2026-02-05T02:03:26.707000",
          "created": "2026-01-06T03:02:24.932000",
          "tags": [
            "gmtn",
            "log id",
            "ca issuers",
            "b0n timestamp",
            "signature",
            "d097",
            "f2334482",
            "fc46",
            "b10b2898797d",
            "fingerprintsha1",
            "tsara",
            "we1 certificate",
            "dynamicloader",
            "medium",
            "write c",
            "host",
            "yara rule",
            "myapp",
            "delphi",
            "worm",
            "win32",
            "error",
            "write",
            "code",
            "malware",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "ssl certificate",
            "execution att",
            "t1204 user",
            "united",
            "mitre att",
            "ck matrix",
            "flag",
            "ogoogle trust",
            "href",
            "network traffic",
            "span",
            "babe",
            "super",
            "close",
            "general",
            "local",
            "path",
            "encrypt",
            "click",
            "strings",
            "form",
            "extraction",
            "data upload",
            "all ht",
            "enter source",
            "one on",
            "tezunau",
            "daut un",
            "dauwol lype",
            "ur extraction",
            "extrac",
            "n tezunau",
            "one opa",
            "included review",
            "faileextra",
            "include data",
            "review exclude",
            "sugges",
            "delete c",
            "json",
            "ascii text",
            "high",
            "data",
            "search",
            "stream",
            "unknown",
            "push",
            "next",
            "dirty",
            "enter s",
            "type",
            "extr data",
            "include",
            "ff d5",
            "ee fc",
            "eb d8",
            "f0 ff",
            "ff bb",
            "fd ff",
            "ff eb",
            "ed b8",
            "agent",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "read c",
            "execution",
            "dock",
            "persistence",
            "sc data",
            "present jan",
            "present mar",
            "present dec",
            "unknown aaaa",
            "passive dns",
            "urls",
            "trojanspy",
            "date",
            "present feb",
            "susp",
            "moved",
            "ip address",
            "backdoor",
            "usteal",
            "body",
            "title",
            "hybrid",
            "regopenkeyexa",
            "memcommit",
            "regsz",
            "english",
            "copy",
            "ufr stealer",
            "markus",
            "april",
            "updater",
            "entries",
            "rsds",
            "c reg",
            "environment",
            "launch"
          ],
          "references": [
            "https://www.redporn.video/tsara-brashears-slandered-.htm \u2022 www.redporn.video \u2022 http://www.redporn",
            "guidepaparazzisurface.com",
            "http://www.crazyfrost.com\t\u2022 http://www.crazyfrost",
            "http://chaturbate.com/notabottom/\t\u2022 http://chaturbate.com/notabottom/\\",
            "iPhone Spyware - https://bam.nr-data.net/1/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/&ap=123&fe=4218&dc=4218&af=err",
            "iPhone Spyware - https://bam.nr-data.net/jserrors/ping/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/",
            "https://chaturbate.com/notabottom/",
            "https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1390847564&t=pageview&_s=1&dl=https%3A%2F%2Fchaturbate.com%2Fnotabottom%2F&ul=en-us&de=utf-8&dt=Chaturbate%20-%20100%25%20Free%20Chat%20%26%20Webcams&sd=32-bit&sr=1024x768&vp=780x439&je=0&_u=YEBAAE~&jid=915940444&gjid=1686072238&cid=922362881.1595496808&tid=UA-23607725-1&_gid=1317601001.1595496808&_r=1&cd1=chaturbate.com&cd2=&cd3=-&cd4=&cd5=anonymous&z=762468946"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Usteal",
              "display_name": "TrojanSpy:Win32/Usteal",
              "target": "/malware/TrojanSpy:Win32/Usteal"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1204.003",
              "name": "Malicious Image",
              "display_name": "T1204.003 - Malicious Image"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2543,
            "hostname": 848,
            "FileHash-SHA256": 1320,
            "SSLCertFingerprint": 25,
            "domain": 463,
            "FileHash-MD5": 418,
            "FileHash-SHA1": 197,
            "email": 2
          },
          "indicator_count": 5816,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "73 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "695555b664c8998371393b8f",
          "name": "\u200emyMetro App - App Store \u2022 Access Attack via  iOS App",
          "description": "Apple iOS attack. Drive by compromise. Device fully compromised. Service provider incorrect. Device user  does not use MetroPCS as Cellular carrier. \n\n#cyberwarfare #pegasus #endgame #apple #earsinthecornfield #compromised_device #zombie",
          "modified": "2026-01-30T16:01:37.437000",
          "created": "2025-12-31T16:56:22.577000",
          "tags": [
            "espaol",
            "metro pcs",
            "metro",
            "english",
            "data",
            "privacy",
            "learn",
            "requires",
            "strong",
            "see all",
            "bernie",
            "mint",
            "never",
            "example",
            "click",
            "indonesia",
            "\u2019m",
            "win32mydoom dec",
            "united",
            "trojan",
            "name servers",
            "servers",
            "expiration date",
            "backdoor",
            "found",
            "passive dns",
            "gmt connection",
            "control",
            "content type",
            "twitter",
            "title",
            "aaaa",
            "ember cli",
            "ember view",
            "certificate",
            "win32",
            "invalid url",
            "body html",
            "head title",
            "title head",
            "body h1",
            "reference",
            "urls",
            "akamai",
            "unknown ns",
            "domain",
            "search",
            "ipv4",
            "files",
            "reverse dns",
            "location united",
            "america flag",
            "america asn",
            "dynamicloader",
            "port",
            "high",
            "medium",
            "windows",
            "displayname",
            "write",
            "destination",
            "tofsee",
            "stream",
            "malware",
            "hostile",
            "read c",
            "show",
            "rgba",
            "unicode",
            "whitelisted",
            "memcommit",
            "delete",
            "execution",
            "dock",
            "persistence",
            "msie",
            "chrome",
            "ip address",
            "otx telemetry",
            "unknown soa",
            "gmt content",
            "for privacy",
            "moved",
            "record value",
            "ubuntu date",
            "encrypt",
            "a domains",
            "welcome",
            "type",
            "content length",
            "ipv4 add",
            "url analysis",
            "accept",
            "overview domain",
            "files ip",
            "address",
            "location france",
            "asn as16276",
            "tags none",
            "indicator facts",
            "historical otx",
            "france unknown",
            "ovhcloud meta",
            "domain add",
            "present dec",
            "status",
            "service",
            "win32cutwail",
            "setcookie",
            "gmt server",
            "refloadapihash",
            "virtool",
            "present nov",
            "present oct",
            "all ipv4",
            "hostname",
            "present jul",
            "saudi arabia",
            "present mar",
            "present jun",
            "present feb",
            "entries",
            "france asn",
            "asn as16509",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "pattern match",
            "ascii text",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "hybrid",
            "local",
            "path",
            "strings",
            "delete c",
            "okrndate",
            "grum",
            "powershell",
            "pegasus",
            "unknown",
            "crlf line",
            "ff d5",
            "unicode text",
            "utf8",
            "ee fc",
            "yara rule",
            "f0 ff",
            "ff bb",
            "push",
            "autorun",
            "suspicious",
            "pulse pulses",
            "date",
            "music",
            "apple",
            "apple id",
            "show process",
            "flag",
            "markmonitor",
            "name tactics",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "access att",
            "t1566 phishing",
            "zerobits",
            "allocationtype",
            "protect",
            "programfiles",
            "processhandle",
            "commitsize",
            "viewsize",
            "regionsize",
            "handles modules",
            "files amsi",
            "filehandle",
            "path filehandle",
            "porthandle",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "href",
            "null",
            "refresh",
            "body",
            "span",
            "general",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "html",
            "x22scriptx22",
            "binary file",
            "t1189",
            "cyberwarfare",
            "brian sabey",
            "never say anything",
            "christopher ahmann",
            "colorado state",
            "quasi",
            "zombie device",
            "present may",
            "emails",
            "exif standard",
            "tiff image",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "jpeg image",
            "copy",
            "next",
            "pecompact",
            "february",
            "packer",
            "delphi",
            "code",
            "tlsv1",
            "ogoogle trust",
            "xserver",
            "lowfi",
            "creation date",
            "domain name",
            "showing",
            "ids detections",
            "yara detections",
            "worm",
            "arial",
            "present aug",
            "meta",
            "dns domain",
            "site",
            "free dns",
            "msil",
            "dnssec",
            "penetration",
            "injections",
            "dead host"
          ],
          "references": [
            "https://apps.apple.com/app/",
            "metropcs.com/account/sign-in.html",
            "smtp.google.com \u2022 www.google.com/images/errors/robot.png",
            "https://www.endgamesystems.com/ \u2022 https://www.endgames.com/",
            "https://freedns.afraid.org/images/exclamation",
            "xred.mooo.com \u2022 mooo.com \u2022 afraid.org",
            "admin@bigtits.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "\u2019m",
              "display_name": "\u2019m",
              "target": null
            },
            {
              "id": "Win.Malware.Jaik-9968280-0",
              "display_name": "Win.Malware.Jaik-9968280-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Mydoom",
              "display_name": "Worm:Win32/Mydoom",
              "target": "/malware/Worm:Win32/Mydoom"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Win.Trojan.Installcore-877",
              "display_name": "Win.Trojan.Installcore-877",
              "target": null
            },
            {
              "id": "Win.Downloader.Small",
              "display_name": "Win.Downloader.Small",
              "target": null
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "Tibs",
              "display_name": "Tibs",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "ALF:JASYP:PUA:Win32/4Shared",
              "display_name": "ALF:JASYP:PUA:Win32/4Shared",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1418",
              "name": "Application Discovery",
              "display_name": "T1418 - Application Discovery"
            },
            {
              "id": "T1444",
              "name": "Masquerade as Legitimate Application",
              "display_name": "T1444 - Masquerade as Legitimate Application"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1589",
              "name": "Gather Victim Identity Information",
              "display_name": "T1589 - Gather Victim Identity Information"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1592",
              "name": "Gather Victim Host Information",
              "display_name": "T1592 - Gather Victim Host Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1195.001",
              "name": "Compromise Software Dependencies and Development Tools",
              "display_name": "T1195.001 - Compromise Software Dependencies and Development Tools"
            },
            {
              "id": "T1577",
              "name": "Compromise Application Executable",
              "display_name": "T1577 - Compromise Application Executable"
            },
            {
              "id": "T1584",
              "name": "Compromise Infrastructure",
              "display_name": "T1584 - Compromise Infrastructure"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1086",
              "name": "PowerShell",
              "display_name": "T1086 - PowerShell"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1863,
            "URL": 4952,
            "FileHash-SHA256": 1990,
            "FileHash-MD5": 981,
            "FileHash-SHA1": 791,
            "email": 26,
            "domain": 1277,
            "SSLCertFingerprint": 24
          },
          "indicator_count": 11904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "78 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6953775a0aed71947ca3f90e",
          "name": "Ransom WannaCrypt- Hackers masquerade as a law firm | Social Engineering |",
          "description": "Hackers , likely Colorado State employees masquerading as legal, entities, social\nengineering, financial exchanges involved. Fraud. Dangerous enterprise. Found in an \u2018alleged \u2018 Plaintiff Law Firms malicious link discovered in old print out, also seen in earlier pulse. [OTX generated description: Adversaries may be able to evade detection and network filtering by blending in with existing traffic, as well as using web protocols, in order to avoid detection/network filtering. and other measures.]",
          "modified": "2026-01-29T06:09:08.504000",
          "created": "2025-12-30T06:55:22.105000",
          "tags": [
            "united",
            "urls",
            "moved",
            "files",
            "ip address",
            "gmt content",
            "x adblock",
            "encrypt",
            "backdoor",
            "bq dec",
            "virtool",
            "ipv4 add",
            "ascii text",
            "pattern match",
            "ck id",
            "mitre att",
            "meta",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "unknown",
            "simplified",
            "etpro trojan",
            "possible virut",
            "dga nxdomain",
            "responses",
            "virus",
            "medium",
            "virustotal",
            "vipre",
            "baidu",
            "vitro",
            "drweb",
            "mcafee",
            "panda",
            "malware",
            "write",
            "dynamicloader",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "yara rule",
            "simda",
            "internal",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "discovery att",
            "ck matrix",
            "network traffic",
            "t1071",
            "t1057",
            "hybrid",
            "yara detections",
            "composite",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "none related",
            "passive dns",
            "hosting",
            "reverse dns",
            "location united",
            "title",
            "ences s",
            "data upload",
            "extraction",
            "status",
            "hostname add",
            "url analysis",
            "push",
            "present sep",
            "present may",
            "present jul",
            "present jan",
            "win32small dec",
            "ransom",
            "write c",
            "show",
            "search",
            "high",
            "et exploit",
            "probe ms17010",
            "eternal blue",
            "englewood colorado",
            "wannacry",
            "wannacrypt",
            "ransom",
            "wanna"
          ],
          "references": [
            "https://aws.hirecar.net/",
            "w32.virut.cf \u2022 win32.virut.am \u2022 virut.cf \u2022 http://w32.virut.cf \u2022http://w32.virut.cf/ \u2022 https://w32.virut.cf",
            "pandacookie2018.xyz",
            "Antivirus Detections: Win.Ransomware.Wanna-9769986-0 ,  Ransom:Win32/WannaCrypt.H",
            "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS",
            "DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) Possible ETERNALBLUE Probe MS17-010 (Generic Flags) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  Win32_Ransomware_WannaCry ,  Wanna_Cry_Ransomware_Generic ,  MS17_010_WanaCry_worm ,  stack_string More Alerts 25 Alerts suspicious_iocontrol_codes persistence_autorun persistence_autorun_tasks stealth_file suricata_alert antivm_generic_disk anomalous_deletefil",
            "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com \u2022\u2019survey-smiles.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Small.IR",
              "display_name": "Backdoor:Win32/Small.IR",
              "target": "/malware/Backdoor:Win32/Small.IR"
            },
            {
              "id": "Win.Trojan.Agent-31853",
              "display_name": "Win.Trojan.Agent-31853",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Win.Ransomware.Wanna-9769986-0",
              "display_name": "Win.Ransomware.Wanna-9769986-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt.H",
              "display_name": "Ransom:Win32/WannaCrypt.H",
              "target": "/malware/Ransom:Win32/WannaCrypt.H"
            },
            {
              "id": "Virtool:Win32/Injector.gen!BQ",
              "display_name": "Virtool:Win32/Injector.gen!BQ",
              "target": "/malware/Virtool:Win32/Injector.gen!BQ"
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [
            "Government",
            "Technology",
            "Legal"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8605,
            "domain": 1228,
            "email": 2,
            "hostname": 1981,
            "FileHash-SHA256": 1617,
            "FileHash-SHA1": 184,
            "FileHash-MD5": 206,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 13825,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "80 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6951f52a5af00a9be445ad41",
          "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
          "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
          "modified": "2026-01-28T02:03:16.337000",
          "created": "2025-12-29T03:27:38.183000",
          "tags": [
            "no expiration",
            "expiration",
            "url http",
            "url https",
            "iocs",
            "enter source",
            "url or",
            "name servers",
            "a domains",
            "accept encoding",
            "urls",
            "emails",
            "servers",
            "url add",
            "http",
            "files domain",
            "files related",
            "related tags",
            "united",
            "gmt contenttype",
            "ipv4 add",
            "url analysis",
            "files",
            "present dec",
            "cname",
            "virtool",
            "cryp",
            "ip address",
            "trojan",
            "win32",
            "therahand",
            "jeffrey reimer",
            "reimer  dpt",
            "msie",
            "chrome",
            "unknown ns",
            "unknown cname",
            "record value",
            "accept",
            "encrypt",
            "passive dns",
            "moved",
            "wp engine",
            "meta",
            "wordpress",
            "pegasus",
            "america flag",
            "america asn",
            "reverse dns",
            "flag",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "analysis",
            "tor analysis",
            "dns requests",
            "united states",
            "hostname",
            "pulse submit",
            "domain",
            "files ip",
            "eva lisa",
            "eva reimer",
            "all ipv4",
            "dynamic_content",
            "fingerprinting",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "status",
            "hostname add",
            "evasion",
            "proximity",
            "pulse pulses",
            "address",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "command",
            "initial access",
            "spawns",
            "present mar",
            "present jun",
            "title",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "data recovery",
            "ms windows",
            "process32nextw",
            "intel",
            "pe32",
            "format",
            "mozilla",
            "installcapital",
            "generic",
            "write",
            "unknown",
            "malware",
            "next",
            "installer",
            "template",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "script script",
            "pragma",
            "port",
            "destination",
            "binbusybox",
            "high",
            "post",
            "icmp traffic",
            "dns query",
            "newstatusurl",
            "mirai",
            "prefetch8",
            "ck matrix",
            "localappdata",
            "info",
            "ssl certificate",
            "czech republic",
            "prefetch1",
            "prefetch2",
            "israel israel",
            "analysis tip",
            "href",
            "ascii text",
            "null",
            "refresh",
            "span",
            "iframe",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "beginstring",
            "windir",
            "openurl c",
            "programfiles",
            "related nids",
            "files location",
            "flag united",
            "dynamicloader",
            "medium",
            "named pipe",
            "win64",
            "download",
            "delphi",
            "smartassembly",
            "m. brian sabey",
            "quasi government",
            "no such agency",
            "facebook",
            "search",
            "date",
            "showing",
            "ukraine",
            "\u2018buzz\u2019",
            "alex karp",
            "peter theil",
            "elon musk",
            "ff d5",
            "yara rule",
            "ee fc",
            "generic http",
            "exe upload",
            "f0 ff",
            "eb e1",
            "ff bb",
            "show process",
            "sha1",
            "sub domain",
            "show technique",
            "network traffic",
            "class",
            "starfield",
            "cyber crime",
            "yara detections",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "sha256 add",
            "av detections",
            "ids detections",
            "alerts",
            "show",
            "dock",
            "execution",
            "present feb",
            "value",
            "content type",
            "mirai",
            "sha256",
            "body",
            "gmt content",
            "ddos",
            "mtb sep",
            "hosting",
            "domain robot",
            "expiration date",
            "welcome",
            "apple",
            "christopher p. ahmann",
            "tsara",
            "monitored target",
            "github https",
            "github",
            "smart assembly",
            "red hat",
            "hackers",
            "google"
          ],
          "references": [
            "https://therahand.com",
            "www.socialimages.reputationdatabase.com",
            "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
            "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
            "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
            "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
            "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
            "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "BinBusyBox: 0x.un5t48l3.host",
            "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
            "AS24961 MyLoc Managed IT AG",
            "PSI | Planned Systems International https://www.plan-sys.com/cyber",
            "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
            "https://www.red-gate.com/products/smartassembly",
            "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
            "Colorado maintains a public-facing police misconduct database via the state's",
            "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
            "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
          ],
          "public": 1,
          "adversary": "NSO Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-306281",
              "display_name": "Win.Trojan.Agent-306281",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.KI",
              "display_name": "VirTool:Win32/Obfuscator.KI",
              "target": "/malware/VirTool:Win32/Obfuscator.KI"
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "ELF:Gafgyt-DZ\\ [Trj]",
              "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-5607483-0",
              "display_name": "Unix.Trojan.Mirai-5607483-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1036.005",
              "name": "Match Legitimate Name or Location",
              "display_name": "T1036.005 - Match Legitimate Name or Location"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 523,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 2165,
            "URL": 4953,
            "domain": 1118,
            "hostname": 1951,
            "email": 12,
            "SSLCertFingerprint": 52,
            "CVE": 2
          },
          "indicator_count": 11178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "81 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Yara Detections: LZMA",
        "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
        "https://therahand.com",
        "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) Possible ETERNALBLUE Probe MS17-010 (Generic Flags) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  Win32_Ransomware_WannaCry ,  Wanna_Cry_Ransomware_Generic ,  MS17_010_WanaCry_worm ,  stack_string More Alerts 25 Alerts suspicious_iocontrol_codes persistence_autorun persistence_autorun_tasks stealth_file suricata_alert antivm_generic_disk anomalous_deletefil",
        "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
        "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "https://chaturbate.com/notabottom/",
        "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
        "iPhone Spyware - https://bam.nr-data.net/jserrors/ping/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://freedns.afraid.org/images/exclamation",
        "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
        "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
        "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
        "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
        "https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1390847564&t=pageview&_s=1&dl=https%3A%2F%2Fchaturbate.com%2Fnotabottom%2F&ul=en-us&de=utf-8&dt=Chaturbate%20-%20100%25%20Free%20Chat%20%26%20Webcams&sd=32-bit&sr=1024x768&vp=780x439&je=0&_u=YEBAAE~&jid=915940444&gjid=1686072238&cid=922362881.1595496808&tid=UA-23607725-1&_gid=1317601001.1595496808&_r=1&cd1=chaturbate.com&cd2=&cd3=-&cd4=&cd5=anonymous&z=762468946",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "www.socialimages.reputationdatabase.com",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "pandacookie2018.xyz",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "https://www.endgamesystems.com/ \u2022 https://www.endgames.com/",
        "https://www.redporn.video/tsara-brashears-slandered-.htm \u2022 www.redporn.video \u2022 http://www.redporn",
        "admin@bigtits.com",
        "cat-are-here.ru",
        "https://www.red-gate.com/products/smartassembly",
        "guidepaparazzisurface.com",
        "Antivirus Detections: Win.Ransomware.Wanna-9769986-0 ,  Ransom:Win32/WannaCrypt.H",
        "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "w32.virut.cf \u2022 win32.virut.am \u2022 virut.cf \u2022 http://w32.virut.cf \u2022http://w32.virut.cf/ \u2022 https://w32.virut.cf",
        "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com \u2022\u2019survey-smiles.com",
        "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "BinBusyBox: 0x.un5t48l3.host",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "metropcs.com/account/sign-in.html",
        "CloudFlare Domain: apple-dns.net",
        "https://aws.hirecar.net/",
        "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click",
        "xred.mooo.com \u2022 mooo.com \u2022 afraid.org",
        "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
        "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
        "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!",
        "AS24961 MyLoc Managed IT AG",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
        "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
        "http://www.crazyfrost.com\t\u2022 http://www.crazyfrost",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
        "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
        "iPhone Spyware - https://bam.nr-data.net/1/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/&ap=123&fe=4218&dc=4218&af=err",
        "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
        "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
        "https://view.emails.sonymusicfans.com/Error.aspx",
        "https://apps.apple.com/app/",
        "http://chaturbate.com/notabottom/\t\u2022 http://chaturbate.com/notabottom/\\",
        "smtp.google.com \u2022 www.google.com/images/errors/robot.png",
        "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO Pegasus"
          ],
          "malware_families": [
            "Win.ransomware.wanna-9769986-0",
            "Autoit",
            "Win.trojan.barys-10005825-0",
            "Pegasus",
            "Backdoor:win32/small.ir",
            "Emotet",
            "Win.trojan.installcore-877",
            "\u2019m",
            "Worm:win32/mydoom",
            "Tofsee",
            "Unix.trojan.gafgyt-6981160-0",
            "Unix.trojan.mirai-10028259-0",
            "Virut",
            "Worm:win32/autorun",
            "Ransom:win32/wannacrypt.h",
            "Trojandownloader:win32/cutwail",
            "Virtool:win32/injector.gen!bq",
            "Alf:jasyp:pua:win32/4shared",
            "Fakeav.for",
            "Trojanspy:win32/usteal",
            "Mirai",
            "Unix.trojan.mirai-5607483-0",
            "Mirai (windows)",
            "Win.downloader.small",
            "Mirai (elf)",
            "Win.trojan.agent-31853",
            "Win.malware.jaik-9968280-0",
            "Tibs",
            "Win.trojan.agent-306281",
            "Elf:gafgyt-dz\\ [trj]",
            "Other malware",
            "Win32:malob-db\\ [cryp]",
            "Elf:mirai-gh\\ [trj]",
            "Virtool:win32/obfuscator.ki"
          ],
          "industries": [
            "Legal",
            "Technology",
            "Government"
          ],
          "unique_indicators": 48500
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/rocx42.site",
    "whois": "http://whois.domaintools.com/rocx42.site",
    "domain": "rocx42.site",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "695fd5fa266f9ea34c8f5c45",
      "name": "Cats and Kittens Attack Mirai Botnet and how it may target Threat Exchange users",
      "description": "Cat attacks related to LummaC2 attacks,info stealing, domain seizures, etc. Including are references to the Lumma C2 with cats and Aura Stealer attacks. Same attack group , includes Mirai Botnet. Has the group become a larger , stronger adversary? \nSony Music connection. I\u2019m aware (The US Department of Justice and Microsoft disrupted LummaC2 infostealing-malware through domain seizures, taking down over 2,300 associated domains. The FBI and CISA by AlienVault) Further research necessary.",
      "modified": "2026-02-07T14:04:48.556000",
      "created": "2026-01-08T16:06:18.126000",
      "tags": [
        "levelblue labs",
        "mirai",
        "windows",
        "ck ids",
        "application",
        "network denial",
        "service",
        "contacted",
        "search",
        "unknown",
        "top source",
        "top destination",
        "source source",
        "china as4812",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "enter",
        "udp include",
        "country",
        "unique",
        "unique asns",
        "ip hostname",
        "reverse ip",
        "lookup country",
        "china as17429",
        "taiwan as3462",
        "new caledonia",
        "as18200 office",
        "china as4538",
        "china as9394",
        "india as137654",
        "japan as2514",
        "japan as9365",
        "china as45083",
        "endian",
        "linux",
        "apple",
        "linux subsys",
        "lang c",
        "linenum",
        "lsyms",
        "machine",
        "static",
        "va",
        "os linux",
        "nx",
        "relocs",
        "intel 8038",
        "elf32",
        "malware distribution",
        "domain seizures",
        "infostealing malware",
        "cat-themed domains",
        "gather victim",
        "t1589",
        "t1568",
        "t1590",
        "web protocols",
        "drop resolver",
        "t1568 t1590",
        "show",
        "filehash",
        "md5 add",
        "pulse pulses",
        "copy",
        "affected _and_fixed",
        "thank you"
      ],
      "references": [
        "cat-are-here.ru",
        "Antivirus Detections:  Unix.Trojan.Mirai-10028259-0  | Mirai (ELF) Mirai (Windows",
        "Yara Detections: LZMA",
        "IP\u2019s Contacted: 32.227.223.238 107.74.143.88 69.196.71.159 96.16.197.80  101.80.61.229 125.101.205.34",
        "IP\u2019s Contacted: 16.85.50.206 215.160.125.18 40.71.227.8 57.122.151.130",
        "All Domains Contacted: thekittler.ru newkittler.ru cats-master.ru",
        "https://otx.alienvault.com/indicator/file/b57042ed9a7d7dbe1f7c7f32de74d2b367ee835d",
        "https://otx.alienvault.com/indicator/domain/cat-are-here.ru",
        "CloudFlare IP\u2019s: 104.18.36.237 ,104.18.37.237",
        "CloudFlare Domain: apple-dns.net",
        "Cloudflare URL: https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "https://forms.sonymusicfans.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js",
        "http://213.209.143.24/ppc \u2022  http://213.209.143.24/rep.i486 \u2022  http://213.209.143.24/rep.sh4",
        "http://213.209.143.24/x32 \u2022 https://250-mail.simswap.in \u2022  https://mail.simswap.in",
        "http://kittler.ru/arm5 \u2022  http://kittler.ru/mpsl \u2022 http://thekittler.ru/rep.arm7",
        "http://kittler.ru/rep.sh4 \u2022  http://kittler.ru/x32 \u2022 http://cats-master.ru/x86_64",
        "sonymusicfans.com \u2022 forms.sonymusicfans.com \u2022 image.emails.sonymusicfans.com \u2022 url8878.e.sonymusicfans.com",
        "https://forms.sonymusicfans.com/campaign/cannons-all-i-need-pre-add-pre-save/",
        "https://forms.sonymusicfans.com/wp-content/plugins/smf-core/assets/css/campaign_333c4e8b19a72989caf8.css",
        "https://view.emails.sonymusicfans.com/Error.aspx",
        "URL http://url8878.e.sonymusicfans.com/ls/click \u2022 https://forms.sonymusicfans.com/campaign/all",
        "http://url8878.e.sonymusicfans.com/ \u2022 http://url8878.e.sonymusicfans.com/ls/click",
        "https://forms.sonymusicfans.com/campaign/all \u2022 https://forms.sonymusicfans.com/campaign/mmph/",
        "https://image.emails.sonymusicfans.com/lib/fe9a12747566007d70/m/1/eb6e3ce4-7a7b-4435-a2cd-968f7277e6e0.png",
        "https://image.emails.sonymusicfans.com/lib/fe9412747566057a72/m/1/b381d305-8e17-49be-bc99-e5fab3a7cd17.gif",
        "push.apple.com \u2022 emails.redvue.com \u2022 apple-dns.net \u2022 57.122.151.130 \u2022 https://teja8.kuikr.com/i6/20181130/Apple",
        "Tracking LummaC2 Infrastructure with Cats (byAlienVault) https://otx.alienvault.com/pulse/6839003a3028827e1ebbfb1a",
        "Interesting relationships: LummaC2 , Mirai Botnet , Sony Music Group , Apple",
        "https://otx.alienvault.com/pulse/694898db3a9999fecfd893cb"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai (ELF)",
          "display_name": "Mirai (ELF)",
          "target": null
        },
        {
          "id": "Mirai (Windows)",
          "display_name": "Mirai (Windows)",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-10028259-0",
          "display_name": "Unix.Trojan.Mirai-10028259-0",
          "target": null
        },
        {
          "id": "Unix.Trojan.Gafgyt-6981160-0",
          "display_name": "Unix.Trojan.Gafgyt-6981160-0",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1584.001",
          "name": "Domains",
          "display_name": "T1584.001 - Domains"
        },
        {
          "id": "T1102.001",
          "name": "Dead Drop Resolver",
          "display_name": "T1102.001 - Dead Drop Resolver"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 74,
        "FileHash-SHA1": 74,
        "FileHash-SHA256": 1067,
        "URL": 2140,
        "domain": 247,
        "hostname": 674,
        "CVE": 2
      },
      "indicator_count": 4278,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 143,
      "modified_text": "71 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "695c7b40f5d2f292a7512e81",
      "name": "USteal Reputation Smear  | Malicious Media | TrojanSpy - CrazyFrost.com",
      "description": "Who is CrazyFrost? USteal Reputation Smear  | Malicious Media | TrojanSpy would affect anyone who clicks on honeypot / dga domain. iPhone spyware. We\u2019ve been working on exposing spyware. Emotet / AutoIT , cabs, password stealer, and more found. Investigators and attorneys from the past Investigators reported victims life, was being promoted over the dark web. From bathing to cooking , conversations to arguments, getting dressed to passing gas. Haha. Small cameras were accessed remotely in her former. Castle Pines, Co hideaway. A third investigator confirmed tiny cameras were installed when victim was in staycationing. When family arrived home garage door  and secured doors were boldly left open. Crazy True. [otx auto generated- The following is the full text of the public-key-precert-scts, which has been posted on the website of Redporn.video, the site of an unauthorised sex tape.]",
      "modified": "2026-02-05T02:03:26.707000",
      "created": "2026-01-06T03:02:24.932000",
      "tags": [
        "gmtn",
        "log id",
        "ca issuers",
        "b0n timestamp",
        "signature",
        "d097",
        "f2334482",
        "fc46",
        "b10b2898797d",
        "fingerprintsha1",
        "tsara",
        "we1 certificate",
        "dynamicloader",
        "medium",
        "write c",
        "host",
        "yara rule",
        "myapp",
        "delphi",
        "worm",
        "win32",
        "error",
        "write",
        "code",
        "malware",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "ssl certificate",
        "execution att",
        "t1204 user",
        "united",
        "mitre att",
        "ck matrix",
        "flag",
        "ogoogle trust",
        "href",
        "network traffic",
        "span",
        "babe",
        "super",
        "close",
        "general",
        "local",
        "path",
        "encrypt",
        "click",
        "strings",
        "form",
        "extraction",
        "data upload",
        "all ht",
        "enter source",
        "one on",
        "tezunau",
        "daut un",
        "dauwol lype",
        "ur extraction",
        "extrac",
        "n tezunau",
        "one opa",
        "included review",
        "faileextra",
        "include data",
        "review exclude",
        "sugges",
        "delete c",
        "json",
        "ascii text",
        "high",
        "data",
        "search",
        "stream",
        "unknown",
        "push",
        "next",
        "dirty",
        "enter s",
        "type",
        "extr data",
        "include",
        "ff d5",
        "ee fc",
        "eb d8",
        "f0 ff",
        "ff bb",
        "fd ff",
        "ff eb",
        "ed b8",
        "agent",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "read c",
        "execution",
        "dock",
        "persistence",
        "sc data",
        "present jan",
        "present mar",
        "present dec",
        "unknown aaaa",
        "passive dns",
        "urls",
        "trojanspy",
        "date",
        "present feb",
        "susp",
        "moved",
        "ip address",
        "backdoor",
        "usteal",
        "body",
        "title",
        "hybrid",
        "regopenkeyexa",
        "memcommit",
        "regsz",
        "english",
        "copy",
        "ufr stealer",
        "markus",
        "april",
        "updater",
        "entries",
        "rsds",
        "c reg",
        "environment",
        "launch"
      ],
      "references": [
        "https://www.redporn.video/tsara-brashears-slandered-.htm \u2022 www.redporn.video \u2022 http://www.redporn",
        "guidepaparazzisurface.com",
        "http://www.crazyfrost.com\t\u2022 http://www.crazyfrost",
        "http://chaturbate.com/notabottom/\t\u2022 http://chaturbate.com/notabottom/\\",
        "iPhone Spyware - https://bam.nr-data.net/1/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/&ap=123&fe=4218&dc=4218&af=err",
        "iPhone Spyware - https://bam.nr-data.net/jserrors/ping/6f524845d1?a=24279235&v=1169.7b094c0&to=MwYEbUdYXxJQWhULDApMIExbWkUIXldOAQsFF0hPXFxGEgtrDg0OMgoDThteVBU%3D&rst=6546&ck=1&ref=https://chaturbate.com/notabottom/",
        "https://chaturbate.com/notabottom/",
        "https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1390847564&t=pageview&_s=1&dl=https%3A%2F%2Fchaturbate.com%2Fnotabottom%2F&ul=en-us&de=utf-8&dt=Chaturbate%20-%20100%25%20Free%20Chat%20%26%20Webcams&sd=32-bit&sr=1024x768&vp=780x439&je=0&_u=YEBAAE~&jid=915940444&gjid=1686072238&cid=922362881.1595496808&tid=UA-23607725-1&_gid=1317601001.1595496808&_r=1&cd1=chaturbate.com&cd2=&cd3=-&cd4=&cd5=anonymous&z=762468946"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "AutoIT",
          "display_name": "AutoIT",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Usteal",
          "display_name": "TrojanSpy:Win32/Usteal",
          "target": "/malware/TrojanSpy:Win32/Usteal"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1204.003",
          "name": "Malicious Image",
          "display_name": "T1204.003 - Malicious Image"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2543,
        "hostname": 848,
        "FileHash-SHA256": 1320,
        "SSLCertFingerprint": 25,
        "domain": 463,
        "FileHash-MD5": 418,
        "FileHash-SHA1": 197,
        "email": 2
      },
      "indicator_count": 5816,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "73 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "695555b664c8998371393b8f",
      "name": "\u200emyMetro App - App Store \u2022 Access Attack via  iOS App",
      "description": "Apple iOS attack. Drive by compromise. Device fully compromised. Service provider incorrect. Device user  does not use MetroPCS as Cellular carrier. \n\n#cyberwarfare #pegasus #endgame #apple #earsinthecornfield #compromised_device #zombie",
      "modified": "2026-01-30T16:01:37.437000",
      "created": "2025-12-31T16:56:22.577000",
      "tags": [
        "espaol",
        "metro pcs",
        "metro",
        "english",
        "data",
        "privacy",
        "learn",
        "requires",
        "strong",
        "see all",
        "bernie",
        "mint",
        "never",
        "example",
        "click",
        "indonesia",
        "\u2019m",
        "win32mydoom dec",
        "united",
        "trojan",
        "name servers",
        "servers",
        "expiration date",
        "backdoor",
        "found",
        "passive dns",
        "gmt connection",
        "control",
        "content type",
        "twitter",
        "title",
        "aaaa",
        "ember cli",
        "ember view",
        "certificate",
        "win32",
        "invalid url",
        "body html",
        "head title",
        "title head",
        "body h1",
        "reference",
        "urls",
        "akamai",
        "unknown ns",
        "domain",
        "search",
        "ipv4",
        "files",
        "reverse dns",
        "location united",
        "america flag",
        "america asn",
        "dynamicloader",
        "port",
        "high",
        "medium",
        "windows",
        "displayname",
        "write",
        "destination",
        "tofsee",
        "stream",
        "malware",
        "hostile",
        "read c",
        "show",
        "rgba",
        "unicode",
        "whitelisted",
        "memcommit",
        "delete",
        "execution",
        "dock",
        "persistence",
        "msie",
        "chrome",
        "ip address",
        "otx telemetry",
        "unknown soa",
        "gmt content",
        "for privacy",
        "moved",
        "record value",
        "ubuntu date",
        "encrypt",
        "a domains",
        "welcome",
        "type",
        "content length",
        "ipv4 add",
        "url analysis",
        "accept",
        "overview domain",
        "files ip",
        "address",
        "location france",
        "asn as16276",
        "tags none",
        "indicator facts",
        "historical otx",
        "france unknown",
        "ovhcloud meta",
        "domain add",
        "present dec",
        "status",
        "service",
        "win32cutwail",
        "setcookie",
        "gmt server",
        "refloadapihash",
        "virtool",
        "present nov",
        "present oct",
        "all ipv4",
        "hostname",
        "present jul",
        "saudi arabia",
        "present mar",
        "present jun",
        "present feb",
        "entries",
        "france asn",
        "asn as16509",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "pattern match",
        "ascii text",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "hybrid",
        "local",
        "path",
        "strings",
        "delete c",
        "okrndate",
        "grum",
        "powershell",
        "pegasus",
        "unknown",
        "crlf line",
        "ff d5",
        "unicode text",
        "utf8",
        "ee fc",
        "yara rule",
        "f0 ff",
        "ff bb",
        "push",
        "autorun",
        "suspicious",
        "pulse pulses",
        "date",
        "music",
        "apple",
        "apple id",
        "show process",
        "flag",
        "markmonitor",
        "name tactics",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "access att",
        "t1566 phishing",
        "zerobits",
        "allocationtype",
        "protect",
        "programfiles",
        "processhandle",
        "commitsize",
        "viewsize",
        "regionsize",
        "handles modules",
        "files amsi",
        "filehandle",
        "path filehandle",
        "porthandle",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "href",
        "null",
        "refresh",
        "body",
        "span",
        "general",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "html",
        "x22scriptx22",
        "binary file",
        "t1189",
        "cyberwarfare",
        "brian sabey",
        "never say anything",
        "christopher ahmann",
        "colorado state",
        "quasi",
        "zombie device",
        "present may",
        "emails",
        "exif standard",
        "tiff image",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "jpeg image",
        "copy",
        "next",
        "pecompact",
        "february",
        "packer",
        "delphi",
        "code",
        "tlsv1",
        "ogoogle trust",
        "xserver",
        "lowfi",
        "creation date",
        "domain name",
        "showing",
        "ids detections",
        "yara detections",
        "worm",
        "arial",
        "present aug",
        "meta",
        "dns domain",
        "site",
        "free dns",
        "msil",
        "dnssec",
        "penetration",
        "injections",
        "dead host"
      ],
      "references": [
        "https://apps.apple.com/app/",
        "metropcs.com/account/sign-in.html",
        "smtp.google.com \u2022 www.google.com/images/errors/robot.png",
        "https://www.endgamesystems.com/ \u2022 https://www.endgames.com/",
        "https://freedns.afraid.org/images/exclamation",
        "xred.mooo.com \u2022 mooo.com \u2022 afraid.org",
        "admin@bigtits.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "\u2019m",
          "display_name": "\u2019m",
          "target": null
        },
        {
          "id": "Win.Malware.Jaik-9968280-0",
          "display_name": "Win.Malware.Jaik-9968280-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Mydoom",
          "display_name": "Worm:Win32/Mydoom",
          "target": "/malware/Worm:Win32/Mydoom"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Win.Trojan.Installcore-877",
          "display_name": "Win.Trojan.Installcore-877",
          "target": null
        },
        {
          "id": "Win.Downloader.Small",
          "display_name": "Win.Downloader.Small",
          "target": null
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "Tibs",
          "display_name": "Tibs",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "ALF:JASYP:PUA:Win32/4Shared",
          "display_name": "ALF:JASYP:PUA:Win32/4Shared",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1190",
          "name": "Exploit Public-Facing Application",
          "display_name": "T1190 - Exploit Public-Facing Application"
        },
        {
          "id": "T1418",
          "name": "Application Discovery",
          "display_name": "T1418 - Application Discovery"
        },
        {
          "id": "T1444",
          "name": "Masquerade as Legitimate Application",
          "display_name": "T1444 - Masquerade as Legitimate Application"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1589",
          "name": "Gather Victim Identity Information",
          "display_name": "T1589 - Gather Victim Identity Information"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1592",
          "name": "Gather Victim Host Information",
          "display_name": "T1592 - Gather Victim Host Information"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1195.001",
          "name": "Compromise Software Dependencies and Development Tools",
          "display_name": "T1195.001 - Compromise Software Dependencies and Development Tools"
        },
        {
          "id": "T1577",
          "name": "Compromise Application Executable",
          "display_name": "T1577 - Compromise Application Executable"
        },
        {
          "id": "T1584",
          "name": "Compromise Infrastructure",
          "display_name": "T1584 - Compromise Infrastructure"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1086",
          "name": "PowerShell",
          "display_name": "T1086 - PowerShell"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1863,
        "URL": 4952,
        "FileHash-SHA256": 1990,
        "FileHash-MD5": 981,
        "FileHash-SHA1": 791,
        "email": 26,
        "domain": 1277,
        "SSLCertFingerprint": 24
      },
      "indicator_count": 11904,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "78 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6953775a0aed71947ca3f90e",
      "name": "Ransom WannaCrypt- Hackers masquerade as a law firm | Social Engineering |",
      "description": "Hackers , likely Colorado State employees masquerading as legal, entities, social\nengineering, financial exchanges involved. Fraud. Dangerous enterprise. Found in an \u2018alleged \u2018 Plaintiff Law Firms malicious link discovered in old print out, also seen in earlier pulse. [OTX generated description: Adversaries may be able to evade detection and network filtering by blending in with existing traffic, as well as using web protocols, in order to avoid detection/network filtering. and other measures.]",
      "modified": "2026-01-29T06:09:08.504000",
      "created": "2025-12-30T06:55:22.105000",
      "tags": [
        "united",
        "urls",
        "moved",
        "files",
        "ip address",
        "gmt content",
        "x adblock",
        "encrypt",
        "backdoor",
        "bq dec",
        "virtool",
        "ipv4 add",
        "ascii text",
        "pattern match",
        "ck id",
        "mitre att",
        "meta",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "unknown",
        "simplified",
        "etpro trojan",
        "possible virut",
        "dga nxdomain",
        "responses",
        "virus",
        "medium",
        "virustotal",
        "vipre",
        "baidu",
        "vitro",
        "drweb",
        "mcafee",
        "panda",
        "malware",
        "write",
        "dynamicloader",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "yara rule",
        "simda",
        "internal",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "discovery att",
        "ck matrix",
        "network traffic",
        "t1071",
        "t1057",
        "hybrid",
        "yara detections",
        "composite",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "none related",
        "passive dns",
        "hosting",
        "reverse dns",
        "location united",
        "title",
        "ences s",
        "data upload",
        "extraction",
        "status",
        "hostname add",
        "url analysis",
        "push",
        "present sep",
        "present may",
        "present jul",
        "present jan",
        "win32small dec",
        "ransom",
        "write c",
        "show",
        "search",
        "high",
        "et exploit",
        "probe ms17010",
        "eternal blue",
        "englewood colorado",
        "wannacry",
        "wannacrypt",
        "ransom",
        "wanna"
      ],
      "references": [
        "https://aws.hirecar.net/",
        "w32.virut.cf \u2022 win32.virut.am \u2022 virut.cf \u2022 http://w32.virut.cf \u2022http://w32.virut.cf/ \u2022 https://w32.virut.cf",
        "pandacookie2018.xyz",
        "Antivirus Detections: Win.Ransomware.Wanna-9769986-0 ,  Ransom:Win32/WannaCrypt.H",
        "IDS Detections: Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS",
        "DNS Lookup) Possible ETERNALBLUE Probe MS17-010 (MSF style) Possible ETERNALBLUE Probe MS17-010 (Generic Flags) ETERNALBLUE Probe Vulnerable System Response MS17-010 Possible ETERNALBLUE MS17-010 Heap Spray More Yara Detections WannaCry_Ransomware ,  Win32_Ransomware_WannaCry ,  Wanna_Cry_Ransomware_Generic ,  MS17_010_WanaCry_worm ,  stack_string More Alerts 25 Alerts suspicious_iocontrol_codes persistence_autorun persistence_autorun_tasks stealth_file suricata_alert antivm_generic_disk anomalous_deletefil",
        "Domains Contacted: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com \u2022\u2019survey-smiles.com"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Small.IR",
          "display_name": "Backdoor:Win32/Small.IR",
          "target": "/malware/Backdoor:Win32/Small.IR"
        },
        {
          "id": "Win.Trojan.Agent-31853",
          "display_name": "Win.Trojan.Agent-31853",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Win.Ransomware.Wanna-9769986-0",
          "display_name": "Win.Ransomware.Wanna-9769986-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt.H",
          "display_name": "Ransom:Win32/WannaCrypt.H",
          "target": "/malware/Ransom:Win32/WannaCrypt.H"
        },
        {
          "id": "Virtool:Win32/Injector.gen!BQ",
          "display_name": "Virtool:Win32/Injector.gen!BQ",
          "target": "/malware/Virtool:Win32/Injector.gen!BQ"
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [
        "Government",
        "Technology",
        "Legal"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 8605,
        "domain": 1228,
        "email": 2,
        "hostname": 1981,
        "FileHash-SHA256": 1617,
        "FileHash-SHA1": 184,
        "FileHash-MD5": 206,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 13825,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "80 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6951f52a5af00a9be445ad41",
      "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
      "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
      "modified": "2026-01-28T02:03:16.337000",
      "created": "2025-12-29T03:27:38.183000",
      "tags": [
        "no expiration",
        "expiration",
        "url http",
        "url https",
        "iocs",
        "enter source",
        "url or",
        "name servers",
        "a domains",
        "accept encoding",
        "urls",
        "emails",
        "servers",
        "url add",
        "http",
        "files domain",
        "files related",
        "related tags",
        "united",
        "gmt contenttype",
        "ipv4 add",
        "url analysis",
        "files",
        "present dec",
        "cname",
        "virtool",
        "cryp",
        "ip address",
        "trojan",
        "win32",
        "therahand",
        "jeffrey reimer",
        "reimer  dpt",
        "msie",
        "chrome",
        "unknown ns",
        "unknown cname",
        "record value",
        "accept",
        "encrypt",
        "passive dns",
        "moved",
        "wp engine",
        "meta",
        "wordpress",
        "pegasus",
        "america flag",
        "america asn",
        "reverse dns",
        "flag",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "analysis",
        "tor analysis",
        "dns requests",
        "united states",
        "hostname",
        "pulse submit",
        "domain",
        "files ip",
        "eva lisa",
        "eva reimer",
        "all ipv4",
        "dynamic_content",
        "fingerprinting",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "status",
        "hostname add",
        "evasion",
        "proximity",
        "pulse pulses",
        "address",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "command",
        "initial access",
        "spawns",
        "present mar",
        "present jun",
        "title",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "data recovery",
        "ms windows",
        "process32nextw",
        "intel",
        "pe32",
        "format",
        "mozilla",
        "installcapital",
        "generic",
        "write",
        "unknown",
        "malware",
        "next",
        "installer",
        "template",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "script script",
        "pragma",
        "port",
        "destination",
        "binbusybox",
        "high",
        "post",
        "icmp traffic",
        "dns query",
        "newstatusurl",
        "mirai",
        "prefetch8",
        "ck matrix",
        "localappdata",
        "info",
        "ssl certificate",
        "czech republic",
        "prefetch1",
        "prefetch2",
        "israel israel",
        "analysis tip",
        "href",
        "ascii text",
        "null",
        "refresh",
        "span",
        "iframe",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "beginstring",
        "windir",
        "openurl c",
        "programfiles",
        "related nids",
        "files location",
        "flag united",
        "dynamicloader",
        "medium",
        "named pipe",
        "win64",
        "download",
        "delphi",
        "smartassembly",
        "m. brian sabey",
        "quasi government",
        "no such agency",
        "facebook",
        "search",
        "date",
        "showing",
        "ukraine",
        "\u2018buzz\u2019",
        "alex karp",
        "peter theil",
        "elon musk",
        "ff d5",
        "yara rule",
        "ee fc",
        "generic http",
        "exe upload",
        "f0 ff",
        "eb e1",
        "ff bb",
        "show process",
        "sha1",
        "sub domain",
        "show technique",
        "network traffic",
        "class",
        "starfield",
        "cyber crime",
        "yara detections",
        "top source",
        "top destination",
        "source source",
        "filehash",
        "sha256 add",
        "av detections",
        "ids detections",
        "alerts",
        "show",
        "dock",
        "execution",
        "present feb",
        "value",
        "content type",
        "mirai",
        "sha256",
        "body",
        "gmt content",
        "ddos",
        "mtb sep",
        "hosting",
        "domain robot",
        "expiration date",
        "welcome",
        "apple",
        "christopher p. ahmann",
        "tsara",
        "monitored target",
        "github https",
        "github",
        "smart assembly",
        "red hat",
        "hackers",
        "google"
      ],
      "references": [
        "https://therahand.com",
        "www.socialimages.reputationdatabase.com",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "BinBusyBox: 0x.un5t48l3.host",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "AS24961 MyLoc Managed IT AG",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://www.red-gate.com/products/smartassembly",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
      ],
      "public": 1,
      "adversary": "NSO Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-306281",
          "display_name": "Win.Trojan.Agent-306281",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.KI",
          "display_name": "VirTool:Win32/Obfuscator.KI",
          "target": "/malware/VirTool:Win32/Obfuscator.KI"
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "ELF:Gafgyt-DZ\\ [Trj]",
          "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-5607483-0",
          "display_name": "Unix.Trojan.Mirai-5607483-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1036.005",
          "name": "Match Legitimate Name or Location",
          "display_name": "T1036.005 - Match Legitimate Name or Location"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 523,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 2165,
        "URL": 4953,
        "domain": 1118,
        "hostname": 1951,
        "email": 12,
        "SSLCertFingerprint": 52,
        "CVE": 2
      },
      "indicator_count": 11178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "81 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://rocx42.site/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://rocx42.site/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776608051.9388182
}