{
  "type": "URL",
  "indicator": "https://safe.imoneso.cn",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://safe.imoneso.cn",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3318120291,
      "indicator": "https://safe.imoneso.cn",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 32,
      "pulses": [
        {
          "id": "69a9cd444aa144401d0c4988",
          "name": "Pools Open",
          "description": "",
          "modified": "2026-04-15T19:21:28.851000",
          "created": "2026-03-05T18:36:52.014000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 8098,
            "URL": 23428,
            "hostname": 9592,
            "domain": 4727,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 696,
            "FileHash-SHA1": 457,
            "CIDR": 78,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 47103,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "3 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "5fa57698ac0f6638b7b9a8ba",
          "name": "Pool's Closed",
          "description": "Two paupers from the meadow spring forth an upheaval of nasty sites on the world wide web.",
          "modified": "2025-12-27T05:02:34.910000",
          "created": "2020-11-06T16:15:20.139000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 61,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 4,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 8098,
            "URL": 23426,
            "hostname": 9590,
            "domain": 4727,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 696,
            "FileHash-SHA1": 457,
            "CIDR": 78,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 47099,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 133,
          "modified_text": "113 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f27f90cb56df78929c01d4",
          "name": "CO.gov/PEAK - Post Mail Social Engineering | M Brian Sabey and CBI",
          "description": "",
          "modified": "2024-09-24T14:02:17.711000",
          "created": "2024-03-14T04:39:44.522000",
          "tags": [
            "united",
            "command decode",
            "suricata ipv4",
            "mitre att",
            "suricata udpv4",
            "programfiles",
            "ck id",
            "show technique",
            "ck matrix",
            "windir",
            "date",
            "win64",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "contact",
            "hostnames",
            "urls http",
            "samples",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "siblings",
            "contacted",
            "pe resource",
            "communicating",
            "subdomains",
            "whois whois",
            "copy",
            "ursnif",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "ramnit",
            "lskeyc",
            "maxage31536000",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "team top",
            "site top",
            "site safe",
            "heur",
            "ccleaner",
            "adware",
            "downldr",
            "union",
            "bank",
            "cve201711882",
            "xrat",
            "phishing",
            "team",
            "alexa",
            "static engine",
            "passive dns",
            "unknown",
            "title error",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "thu jul",
            "fri dec",
            "hybridanalysis",
            "generic malware",
            "malware",
            "wed dec",
            "free automated",
            "service",
            "thu dec",
            "cidr",
            "sun aug",
            "ip sun",
            "country code",
            "system as",
            "as16509",
            "mon sep",
            "registrant name",
            "amazon",
            "terry ave",
            "code",
            "as36081 state",
            "pulse pulses",
            "files",
            "reverse dns",
            "asnone united",
            "moved",
            "body",
            "certificate",
            "g2 tls",
            "rsa sha256",
            "search",
            "showing",
            "online sun",
            "online sat",
            "online",
            "12345",
            "as44273 host",
            "status",
            "for privacy",
            "redacted for",
            "cname",
            "domain",
            "nxdomain",
            "ip related",
            "creation date",
            "servers",
            "name servers",
            "next",
            "cloudfront x",
            "sfo5 c1",
            "a domains",
            "nice botet",
            "srellik",
            "sreredrem",
            "hit",
            "men",
            "man",
            "women",
            "spider",
            "mail spammer",
            "gov"
          ],
          "references": [
            "CO.gov/PEAK -Postal mail Spam. Urgent demand to login.",
            "https://hybrid-analysis.com/sample/23e867fef441df664d0122961782722157df2bfb0d468c8804ffc850c0b6c875",
            "Redirection chain: http://co.gov/peak | https://co.gov/peak | http://colorado.gov/peak | https://colorado.gov/peak | https://www.colorado.gov/peak",
            "Redirection chain: https://coloradopeak.secure.force.com/ https://colorado.gov:443/peak | coloradopeak.secure.force.com | dns01.salesforce.com",
            "Redirection chain: dns1.p06.nsone.net l ns1-204.azure-dns.com | ns1.google.com |  ns1.msedge.net | peak.my.salesforce-sites.com |",
            "Redirection chain: www.colorado.gov | salesforce-sites.com | peak.my.si (Malformed domain) www.bing.com",
            "AS36081 State of Colorado General Government Computer: 165.127.10.10 | Location - LakeWood - CO - United States | Emails: isoc@state.co.us",
            "AS Name: AS36081 State of Colorado General Government Computer AS Country Code: US AS Registry: arin AS : AS CIDR: 165.127.0.0/16",
            "Registrant: State of Colorado General Government Computer Address: 690 Kipling St. Postal Code: 80215 Country Code: USA City: LakeWood State: CO",
            "http://bundled.toolbar.google http://bundled.toolbar.google/http://toolbar.google. https://bundled.toolbar.google. https://bundled.toolbar.google/",
            "Remotely accessing to targets devices: http://maps.co.gov/ | Maps & Calendar pop ups obfuscate targets screens. Pinging",
            "http://6.no.me.malware.com | http://6.no.me.malware.com/download",
            "Sexual Content Titles: http://analyticschecker.com/survey/sexynews24.js | http://sex.utub.com/ | http://wap.18.orgsex.utub.com/",
            "https://ak.deephicy.net/?z=6118780&syncedCookie=true&rhd=false&rb=4Qar0ipdalmNR5Sicj8o7oK9WuZVXLChC0EcEUDBDY4n5ISECZrApfC-gjpDjsMLofKZlJaeh_gobm2lTLNRbwBynCFo6CRsgTd-gbOZKn6hkTMO15e_qN9jmE8T9QytmggiZaSD7Ys_RCMg-fY8kjd5ELPE8MLrz-t9Dm7bxqLgQ8U1SWuTcrT09Npw1M6dvd7WA_91bWtr2m-EiV0umKwr5ZDSUqAYTPVfrEmvFKmZ32EfwaKGnKgKEGYaQGvQe1ga-4TccFs5A6Kh-HLSeXuKYMPVlODFrOgLcCUQi81bKgkG7ceuo8sG_5o6_ilHG6krYsCSk8Qwzdpn5AnwWweNPG9uC3hYGroh8tnINyQkdEnWp7O38iOgkAxqQoYhttqKqq7Cf6P8l9y-w4NtLBEm6c_ASSKggtwrI11Jvee9YxytSZBVlA==&sfr=n",
            "Co.gov: Autonomous System: AS16509 - Amazon.com, Inc. AS Country Code: US AS AS CIDR: 13.225.192.0/21 CIDR: 13.200.0.0/13 13.224.0.0/12 13.208.0.0/12",
            "Registrant Information: Amazon Technologies Inc. Address: 410 Terry Ave N. Postal Code: H3A 2A6 Country Code: CA (Canada)  City: Montreal State: WA",
            "AS Registry: arin:aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
            "Emails: aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
            "AIG: Malicious CMS prefix -cmsportal.app.hurdman.org (key identifier/decoder)",
            "Targeted espionage: cms.wavebrowser.co | https://cms.wavebrowser.co/ | http://t4tonly.com/cms/web-services/get-all-city.php",
            "0-w5-cms.ultimate-guitar.com",
            "Redirect Chain: https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/ K9p1aHVpkkzIn1S7Dakqexnw4nP6ZmG7kNifaOtuay4%3Ahttp%3A%2F%2Fjaegertracing.match-growth.alicloud-production.glintsintern.com%2F https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/",
            "Redirect Chain: https://accounts.google.com/o/oauth2/auth?access_type=offline&approval_prompt=force&client_id=795490584532-smtoie0juhaj5tq9h07si1ekd4m6pvlr.apps.googleusercontent.com&redirect_uri=https%3A%2F%2Foauth2-proxy.glintsintern.com%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=",
            "If you knew how you're wasting time and resources hacking a front facing archive with a 443:"
          ],
          "public": 1,
          "adversary": "Out For Blood",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1534",
              "name": "Internal Spearphishing",
              "display_name": "T1534 - Internal Spearphishing"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1578.003",
              "name": "Delete Cloud Instance",
              "display_name": "T1578.003 - Delete Cloud Instance"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [
            "Private Sector",
            "Healthcare",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": "65f2691bb1405f9a30cf46b6",
          "export_count": 76,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6664,
            "FileHash-MD5": 89,
            "FileHash-SHA1": 82,
            "FileHash-SHA256": 2523,
            "domain": 1792,
            "hostname": 1889,
            "CVE": 2,
            "CIDR": 19,
            "email": 22
          },
          "indicator_count": 13082,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "572 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6692cf0e2273bb06aa43e43c",
          "name": "Banker: Through The Nights - YouTube | Errors |",
          "description": "YouTube creator issue. Hijacked channel. Won't open in  VT, 303 error, ransomware files. Ransomware confirmed, limited access/research for today's pulse.",
          "modified": "2024-08-12T18:02:56.458000",
          "created": "2024-07-13T19:01:34.484000",
          "tags": [
            "united",
            "command decode",
            "suricata ipv4",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "name server",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "low risk",
            "domain",
            "no malware",
            "found",
            "site",
            "ip address",
            "google network",
            "unknown",
            "low security",
            "risk",
            "hacked",
            "protect",
            "path",
            "secure",
            "httponly",
            "secchuabitness",
            "secchuamodel",
            "secchuawow64",
            "secchuaplatform",
            "samesitenone",
            "http response",
            "final url",
            "status code",
            "body length",
            "kb body",
            "pragma",
            "song culture",
            "tsara lynn",
            "culture",
            "chime sa",
            "mediawarning",
            "youtube twitter",
            "jess",
            "tsara brashears",
            "zafira songs",
            "youtube og",
            "hope",
            "html info",
            "meta tags",
            "data",
            "v3 serial",
            "number",
            "cus ogoogle",
            "trust",
            "llc cngts",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "name",
            "whois lookup",
            "create date",
            "expiry date",
            "query time",
            "update date",
            "update",
            "passive dns",
            "gmt content",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "urls",
            "files",
            "related pulses",
            "error",
            "code",
            "algorithm",
            "first"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 3,
            "FileHash-SHA1": 3,
            "FileHash-SHA256": 343,
            "SSLCertFingerprint": 8,
            "URL": 333,
            "domain": 69,
            "hostname": 165
          },
          "indicator_count": 924,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "615 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603369ad0e38e313883c4fa",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root HELP! RETALIATION HAS OCCURRED ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:56:58.037000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 4468,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6603360b48908ae9b9835563",
          "name": "IoT Dark Nexus + Mirai BotNet HELP HER PLEASE!!- Enom | TELNET Root |",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-26T20:54:35.118000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 38,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015553ad4633eb85c66817",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:31.072000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66015551faca20cb510f9121",
          "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
          "description": "",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-25T10:43:29.149000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "660021cdfd20f6237e3892c0",
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cdfd20f6237e3892c0",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:25.910000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "660021cc958e062575a9a160",
          "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
          "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
          "modified": "2024-04-23T11:04:58.191000",
          "created": "2024-03-24T12:51:24.154000",
          "tags": [
            "referrer",
            "communicating",
            "contacted",
            "siblings domain",
            "parent domain",
            "subdomains",
            "execution",
            "bundled",
            "threat",
            "paste",
            "iocs",
            "e4609l",
            "urls http",
            "blacklist http",
            "cisco umbrella",
            "heur",
            "site",
            "html",
            "million",
            "team",
            "alexa top",
            "script",
            "malicious url",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "swrort",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "riskware",
            "unsafe",
            "webshell",
            "exploit",
            "crack",
            "malware",
            "phishing",
            "union",
            "bank",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "blacklist",
            "site top",
            "malware site",
            "site safe",
            "deepscan",
            "genpack",
            "zbot",
            "united",
            "proxy",
            "firehol mail",
            "spammer",
            "anonymizer",
            "team proxy",
            "firehol",
            "noname057",
            "alexa safe",
            "maltiverse safe",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "orgabusehandle",
            "route",
            "appli22",
            "address",
            "orgtechhandle",
            "appliedi abuse",
            "orgnochandle",
            "peter heather",
            "appliedi",
            "general info",
            "geo united",
            "as14519",
            "us note",
            "registrar arin",
            "ptr record",
            "command decode",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "contacted urls",
            "cert valid",
            "malicious",
            "phone",
            "text",
            "microsoft",
            "uk telco",
            "js tel",
            "metro",
            "redacted for",
            "record value",
            "emails abuse",
            "name redacted",
            "for privacy",
            "name servers",
            "privacy address",
            "privacy city",
            "privacy country",
            "resolutions",
            "a domains",
            "canada unknown",
            "div div",
            "format a",
            "a ul",
            "models a",
            "gmt path",
            "search",
            "unknown",
            "passive dns",
            "title",
            "all scoreblue",
            "ipv4",
            "url analysis",
            "body",
            "next",
            "port",
            "destination",
            "forbidden",
            "high",
            "tcp syn",
            "telnet root",
            "suspicious path",
            "busybox",
            "bad login",
            "telnet login",
            "copy",
            "mirai",
            "domain",
            "hostname",
            "script script",
            "link",
            "app themesskin",
            "status",
            "content type",
            "lakeside tool",
            "meta",
            "find",
            "tools",
            "cookie",
            "front",
            "li ul",
            "mower shop",
            "creation date",
            "showing",
            "pragma",
            "this",
            "span",
            "open ports",
            "body doctype",
            "privacy admin",
            "privacy tech",
            "server",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "code",
            "script urls",
            "aaaa",
            "as8068",
            "cname",
            "as20446",
            "encrypt",
            "falcon",
            "name verdict",
            "abuse",
            "as55081",
            "dnssec",
            "dynamicloader",
            "alerts",
            "pulses",
            "java",
            "windows",
            "guard",
            "medium",
            "dynamic",
            "servers",
            "certificate",
            "as54113",
            "trojan",
            "neue",
            "trojanspy",
            "alexa",
            "team google",
            "maltiverse top",
            "ccleaner",
            "xrat",
            "downldr",
            "tsara brashears",
            "entries",
            "transactional"
          ],
          "references": [
            "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
            "HOSTEDBYAPPLIEDI.NET - Enom",
            "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
            "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
            "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
            "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
            "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
            "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
            "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
            "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
            "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
            "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
            "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
            "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
            "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
            "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "nr-data.net [Apple Private Data Collection]",
            "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
            "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
            "smartertrack.appliedi.net, http://analytics.com/track?id=55",
            "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
            "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1504",
              "name": "PowerShell Profile",
              "display_name": "T1504 - PowerShell Profile"
            },
            {
              "id": "T1503",
              "name": "Credentials from Web Browsers",
              "display_name": "T1503 - Credentials from Web Browsers"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2979,
            "FileHash-SHA1": 406,
            "FileHash-SHA256": 2293,
            "URL": 1804,
            "domain": 814,
            "hostname": 1025,
            "email": 9,
            "CVE": 12,
            "CIDR": 2
          },
          "indicator_count": 9344,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "726 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f980471600645142bcd924",
          "name": "Control Server | Browser Install| Kernel Modules and Extensions ",
          "description": "",
          "modified": "2024-04-15T08:03:32.381000",
          "created": "2024-03-19T12:08:39.100000",
          "tags": [
            "hostname",
            "sort",
            "domain",
            "type",
            "hostname c",
            "all octoseek",
            "groups",
            "search filter",
            "time",
            "x show",
            "indicator type",
            "cidr",
            "for privacy",
            "unknown",
            "united",
            "link",
            "search",
            "servers",
            "strapi app",
            "passive dns",
            "urls",
            "date",
            "body",
            "meta",
            "span",
            "next",
            "octoseek",
            "url https",
            "url http",
            "role title",
            "added active",
            "execution",
            "ssl certificate",
            "whois record",
            "contacted",
            "pe resource",
            "bundled",
            "historical ssl",
            "referrer",
            "communicating",
            "collections",
            "status",
            "emails",
            "creation date",
            "record value",
            "expiration date",
            "showing",
            "threat analyzer",
            "threat",
            "iocs",
            "hostnames",
            "urls https",
            "samples",
            "firehol",
            "proxy",
            "detection list",
            "ip address",
            "blacklist",
            "malicious url",
            "anonymizer",
            "botnet command",
            "malware",
            "generic malware",
            "count blacklist",
            "no data",
            "tag count",
            "detection",
            "count",
            "generic",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "safe site",
            "malware site",
            "alexa top",
            "million",
            "filerepmetagen",
            "filerepmalware",
            "artemis",
            "presenoker",
            "unsafe",
            "riskware",
            "crack",
            "opencandy",
            "downloader",
            "coinminer",
            "installpack",
            "agent",
            "fusioncore",
            "conduit",
            "wacatac",
            "zbot",
            "cl0p",
            "maltiverse",
            "trojanspy",
            "engb",
            "emotet",
            "cyberwar",
            "ursnif",
            "attack",
            "hacktool",
            "ransomexx",
            "startpage",
            "bitrat",
            "ryuk",
            "agent tesla",
            "stealer",
            "critical",
            "copy",
            "evilnum",
            "threat report",
            "back",
            "ip summary",
            "url summary",
            "summary",
            "download csv",
            "download",
            "json sample",
            "malicious site",
            "phishing site",
            "iframe",
            "domaiq",
            "alexa",
            "downldr",
            "phishing",
            "cyber threat",
            "control server",
            "team",
            "installcore",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "bank",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "windir",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "contact",
            "paste",
            "win32",
            "gmt content",
            "scan endpoints",
            "ipv4",
            "pulse pulses",
            "files",
            "accept",
            "date hash",
            "avast avg",
            "entries",
            "as15169 google",
            "aaaa",
            "ireland unknown",
            "germany unknown",
            "as43350 nforce"
          ],
          "references": [
            "https://api.wavebrowserbase.com",
            "Ransom: message.htm.com",
            "ZBot: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzl0WlhSaGJtOXBZV1pwYm1GdVkybGhiQzVqYjIxY0x6OTFkRzFmYzI5MWNtTmxQV1Z0WVdsc1gzTnBaMjVoZEhWeVpTWmhiWEE3ZFhSdFgyMWxaR2wxYlQxbGJXRnBiQ1poYlhBN2RYUnRYMk5oYlhCaGFXZHVQWEJ5YjIxdmRHbHZiaUlzSW1oaGMyZ2lPaUkwTjFGWlUzZFlTMkYxVDA1dVIxb2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2lhbWx0YlhrdWQyRnNhMlZ5UUdGc2JITjBZWFJsTG1OdmJTSjk9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOXRaWFJoYm05cFlX",
            "Ryuk: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzkzZDNjdWEybHdiR2x1WjJWeUxtTnZiVnd2WldOdmJtOXRhV010Wm05eVpXTmhjM1J6WEM5cGJuUmxjbVZ6ZEMxeVlYUmxjeUlzSW1oaGMyZ2lPaUpzYmtJMWFUSjJkbmRvU21GQ1RuZ2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2liV052ZUVCdGIzSnlhWE56WlhsbGJtZHBibVZsY21sdVp5NWpiMjBpZlE9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOTNkM2N1YTJsd2JHbHVaMlZ5TG1OdmJWd3ZaV052Ym05dGFXTXRabTl5WldOaGMzUnpYQzlwYm5SbGNtVnpkQzF5",
            "Ryuk: http://kramtechnology.com/",
            "Ryuk: kramtechnology.com",
            "Pony: https://allspice.ordavida.com/api/mailings/opened/PMRGSZBCHIYTMNZQGYWCE33SM4RDUIRZGQZDONDBGIZC2MBXMM2S2NBYMM2S2YTEHE3C2MJZGI4DSOBYHAYTGNRZEIWCE5TFOJZWS33OEI5CENBCFQRHG2LHEI5CEYSPONYXS4RRGFBUIY3DKRIHSSRRK44WSY3FNM4ESVTJKZMHOWRTJBLXIYLIHFRWS3DUKU6SE7I=.gif",
            "Botnet Server IP: 141.226.230.48",
            "newrelic.se"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1584.004",
              "name": "Server",
              "display_name": "T1584.004 - Server"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65f55ed2015e05ffbc2b72a8",
          "export_count": 186919,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9838,
            "domain": 2085,
            "hostname": 3006,
            "FileHash-SHA256": 3685,
            "FileHash-MD5": 965,
            "FileHash-SHA1": 532,
            "email": 6,
            "CVE": 7
          },
          "indicator_count": 20124,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "734 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f55ed2015e05ffbc2b72a8",
          "name": "Control Server | Browser Install| Kernel Modules and Extensions",
          "description": "",
          "modified": "2024-04-15T08:03:32.381000",
          "created": "2024-03-16T08:56:50.387000",
          "tags": [
            "hostname",
            "sort",
            "domain",
            "type",
            "hostname c",
            "all octoseek",
            "groups",
            "search filter",
            "time",
            "x show",
            "indicator type",
            "cidr",
            "for privacy",
            "unknown",
            "united",
            "link",
            "search",
            "servers",
            "strapi app",
            "passive dns",
            "urls",
            "date",
            "body",
            "meta",
            "span",
            "next",
            "octoseek",
            "url https",
            "url http",
            "role title",
            "added active",
            "execution",
            "ssl certificate",
            "whois record",
            "contacted",
            "pe resource",
            "bundled",
            "historical ssl",
            "referrer",
            "communicating",
            "collections",
            "status",
            "emails",
            "creation date",
            "record value",
            "expiration date",
            "showing",
            "threat analyzer",
            "threat",
            "iocs",
            "hostnames",
            "urls https",
            "samples",
            "firehol",
            "proxy",
            "detection list",
            "ip address",
            "blacklist",
            "malicious url",
            "anonymizer",
            "botnet command",
            "malware",
            "generic malware",
            "count blacklist",
            "no data",
            "tag count",
            "detection",
            "count",
            "generic",
            "blacklist http",
            "cisco umbrella",
            "site",
            "heur",
            "safe site",
            "malware site",
            "alexa top",
            "million",
            "filerepmetagen",
            "filerepmalware",
            "artemis",
            "presenoker",
            "unsafe",
            "riskware",
            "crack",
            "opencandy",
            "downloader",
            "coinminer",
            "installpack",
            "agent",
            "fusioncore",
            "conduit",
            "wacatac",
            "zbot",
            "cl0p",
            "maltiverse",
            "trojanspy",
            "engb",
            "emotet",
            "cyberwar",
            "ursnif",
            "attack",
            "hacktool",
            "ransomexx",
            "startpage",
            "bitrat",
            "ryuk",
            "agent tesla",
            "stealer",
            "critical",
            "copy",
            "evilnum",
            "threat report",
            "back",
            "ip summary",
            "url summary",
            "summary",
            "download csv",
            "download",
            "json sample",
            "malicious site",
            "phishing site",
            "iframe",
            "domaiq",
            "alexa",
            "downldr",
            "phishing",
            "cyber threat",
            "control server",
            "team",
            "installcore",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "bank",
            "name verdict",
            "falcon sandbox",
            "reports",
            "falcon",
            "traffic et",
            "policy windows",
            "update p2p",
            "activity",
            "windir",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "contact",
            "paste",
            "win32",
            "gmt content",
            "scan endpoints",
            "ipv4",
            "pulse pulses",
            "files",
            "accept",
            "date hash",
            "avast avg",
            "entries",
            "as15169 google",
            "aaaa",
            "ireland unknown",
            "germany unknown",
            "as43350 nforce"
          ],
          "references": [
            "https://api.wavebrowserbase.com",
            "Ransom: message.htm.com",
            "ZBot: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzl0WlhSaGJtOXBZV1pwYm1GdVkybGhiQzVqYjIxY0x6OTFkRzFmYzI5MWNtTmxQV1Z0WVdsc1gzTnBaMjVoZEhWeVpTWmhiWEE3ZFhSdFgyMWxaR2wxYlQxbGJXRnBiQ1poYlhBN2RYUnRYMk5oYlhCaGFXZHVQWEJ5YjIxdmRHbHZiaUlzSW1oaGMyZ2lPaUkwTjFGWlUzZFlTMkYxVDA1dVIxb2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2lhbWx0YlhrdWQyRnNhMlZ5UUdGc2JITjBZWFJsTG1OdmJTSjk9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOXRaWFJoYm05cFlX",
            "Ryuk: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzkzZDNjdWEybHdiR2x1WjJWeUxtTnZiVnd2WldOdmJtOXRhV010Wm05eVpXTmhjM1J6WEM5cGJuUmxjbVZ6ZEMxeVlYUmxjeUlzSW1oaGMyZ2lPaUpzYmtJMWFUSjJkbmRvU21GQ1RuZ2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2liV052ZUVCdGIzSnlhWE56WlhsbGJtZHBibVZsY21sdVp5NWpiMjBpZlE9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOTNkM2N1YTJsd2JHbHVaMlZ5TG1OdmJWd3ZaV052Ym05dGFXTXRabTl5WldOaGMzUnpYQzlwYm5SbGNtVnpkQzF5",
            "Ryuk: http://kramtechnology.com/",
            "Ryuk: kramtechnology.com",
            "Pony: https://allspice.ordavida.com/api/mailings/opened/PMRGSZBCHIYTMNZQGYWCE33SM4RDUIRZGQZDONDBGIZC2MBXMM2S2NBYMM2S2YTEHE3C2MJZGI4DSOBYHAYTGNRZEIWCE5TFOJZWS33OEI5CENBCFQRHG2LHEI5CEYSPONYXS4RRGFBUIY3DKRIHSSRRK44WSY3FNM4ESVTJKZMHOWRTJBLXIYLIHFRWS3DUKU6SE7I=.gif",
            "Botnet Server IP: 141.226.230.48",
            "newrelic.se"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Cl0p",
              "display_name": "Cl0p",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1584.004",
              "name": "Server",
              "display_name": "T1584.004 - Server"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1547.006",
              "name": "Kernel Modules and Extensions",
              "display_name": "T1547.006 - Kernel Modules and Extensions"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9838,
            "domain": 2085,
            "hostname": 3006,
            "FileHash-SHA256": 3685,
            "FileHash-MD5": 965,
            "FileHash-SHA1": 532,
            "email": 6,
            "CVE": 7
          },
          "indicator_count": 20124,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "734 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65f2691bb1405f9a30cf46b6",
          "name": "CO.gov/PEAK - Postal Engineering |  M Brian Sabey and CBI (mail)",
          "description": "Target received urgent postal mail ,directed to login: \nCO.gov/PEAK  | Disappointed  so many reports have been modified. Logins  OTX account are governmental.with insecure headers.\nHistoryKillerPro , RedHatDelete  glintsintern.com oauth2-proxy.glintsintern.com \u2022 https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/ oauth2-proxy.glintsintern.com have attached to several OTX users.",
          "modified": "2024-04-12T14:01:31.094000",
          "created": "2024-03-14T03:03:55.928000",
          "tags": [
            "united",
            "command decode",
            "suricata ipv4",
            "mitre att",
            "suricata udpv4",
            "programfiles",
            "ck id",
            "show technique",
            "ck matrix",
            "windir",
            "date",
            "win64",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "contact",
            "hostnames",
            "urls http",
            "samples",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "siblings",
            "contacted",
            "pe resource",
            "communicating",
            "subdomains",
            "whois whois",
            "copy",
            "ursnif",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "quasar",
            "ramnit",
            "lskeyc",
            "maxage31536000",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "team top",
            "site top",
            "site safe",
            "heur",
            "ccleaner",
            "adware",
            "downldr",
            "union",
            "bank",
            "cve201711882",
            "xrat",
            "phishing",
            "team",
            "alexa",
            "static engine",
            "passive dns",
            "unknown",
            "title error",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "thu jul",
            "fri dec",
            "hybridanalysis",
            "generic malware",
            "malware",
            "wed dec",
            "free automated",
            "service",
            "thu dec",
            "cidr",
            "sun aug",
            "ip sun",
            "country code",
            "system as",
            "as16509",
            "mon sep",
            "registrant name",
            "amazon",
            "terry ave",
            "code",
            "as36081 state",
            "pulse pulses",
            "files",
            "reverse dns",
            "asnone united",
            "moved",
            "body",
            "certificate",
            "g2 tls",
            "rsa sha256",
            "search",
            "showing",
            "online sun",
            "online sat",
            "online",
            "12345",
            "as44273 host",
            "status",
            "for privacy",
            "redacted for",
            "cname",
            "domain",
            "nxdomain",
            "ip related",
            "creation date",
            "servers",
            "name servers",
            "next",
            "cloudfront x",
            "sfo5 c1",
            "a domains",
            "nice botet",
            "srellik",
            "sreredrem",
            "hit",
            "men",
            "man",
            "women",
            "spider",
            "mail spammer",
            "gov"
          ],
          "references": [
            "CO.gov/PEAK -Postal mail Spam. Urgent demand to login.",
            "https://hybrid-analysis.com/sample/23e867fef441df664d0122961782722157df2bfb0d468c8804ffc850c0b6c875",
            "Redirection chain: http://co.gov/peak | https://co.gov/peak | http://colorado.gov/peak | https://colorado.gov/peak | https://www.colorado.gov/peak",
            "Redirection chain: https://coloradopeak.secure.force.com/ https://colorado.gov:443/peak | coloradopeak.secure.force.com | dns01.salesforce.com",
            "Redirection chain: dns1.p06.nsone.net l ns1-204.azure-dns.com | ns1.google.com |  ns1.msedge.net | peak.my.salesforce-sites.com |",
            "Redirection chain: www.colorado.gov | salesforce-sites.com | peak.my.si (Malformed domain) www.bing.com",
            "AS36081 State of Colorado General Government Computer: 165.127.10.10 | Location - LakeWood - CO - United States | Emails: isoc@state.co.us",
            "AS Name: AS36081 State of Colorado General Government Computer AS Country Code: US AS Registry: arin AS : AS CIDR: 165.127.0.0/16",
            "Registrant: State of Colorado General Government Computer Address: 690 Kipling St. Postal Code: 80215 Country Code: USA City: LakeWood State: CO",
            "http://bundled.toolbar.google http://bundled.toolbar.google/http://toolbar.google. https://bundled.toolbar.google. https://bundled.toolbar.google/",
            "Remotely accessing to targets devices: http://maps.co.gov/ | Maps & Calendar pop ups obfuscate targets screens. Pinging",
            "http://6.no.me.malware.com | http://6.no.me.malware.com/download",
            "Sexual Content Titles: http://analyticschecker.com/survey/sexynews24.js | http://sex.utub.com/ | http://wap.18.orgsex.utub.com/",
            "https://ak.deephicy.net/?z=6118780&syncedCookie=true&rhd=false&rb=4Qar0ipdalmNR5Sicj8o7oK9WuZVXLChC0EcEUDBDY4n5ISECZrApfC-gjpDjsMLofKZlJaeh_gobm2lTLNRbwBynCFo6CRsgTd-gbOZKn6hkTMO15e_qN9jmE8T9QytmggiZaSD7Ys_RCMg-fY8kjd5ELPE8MLrz-t9Dm7bxqLgQ8U1SWuTcrT09Npw1M6dvd7WA_91bWtr2m-EiV0umKwr5ZDSUqAYTPVfrEmvFKmZ32EfwaKGnKgKEGYaQGvQe1ga-4TccFs5A6Kh-HLSeXuKYMPVlODFrOgLcCUQi81bKgkG7ceuo8sG_5o6_ilHG6krYsCSk8Qwzdpn5AnwWweNPG9uC3hYGroh8tnINyQkdEnWp7O38iOgkAxqQoYhttqKqq7Cf6P8l9y-w4NtLBEm6c_ASSKggtwrI11Jvee9YxytSZBVlA==&sfr=n",
            "Co.gov: Autonomous System: AS16509 - Amazon.com, Inc. AS Country Code: US AS AS CIDR: 13.225.192.0/21 CIDR: 13.200.0.0/13 13.224.0.0/12 13.208.0.0/12",
            "Registrant Information: Amazon Technologies Inc. Address: 410 Terry Ave N. Postal Code: H3A 2A6 Country Code: CA (Canada)  City: Montreal State: WA",
            "AS Registry: arin:aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
            "Emails: aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
            "AIG: Malicious CMS prefix -cmsportal.app.hurdman.org (key identifier/decoder)",
            "Targeted espionage: cms.wavebrowser.co | https://cms.wavebrowser.co/ | http://t4tonly.com/cms/web-services/get-all-city.php",
            "0-w5-cms.ultimate-guitar.com",
            "Redirect Chain: https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/ K9p1aHVpkkzIn1S7Dakqexnw4nP6ZmG7kNifaOtuay4%3Ahttp%3A%2F%2Fjaegertracing.match-growth.alicloud-production.glintsintern.com%2F https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/",
            "Redirect Chain: https://accounts.google.com/o/oauth2/auth?access_type=offline&approval_prompt=force&client_id=795490584532-smtoie0juhaj5tq9h07si1ekd4m6pvlr.apps.googleusercontent.com&redirect_uri=https%3A%2F%2Foauth2-proxy.glintsintern.com%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=",
            "If you knew how you're wasting time and resources hacking a front facing archive with a 443:"
          ],
          "public": 1,
          "adversary": "Out For Blood",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1534",
              "name": "Internal Spearphishing",
              "display_name": "T1534 - Internal Spearphishing"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1107",
              "name": "File Deletion",
              "display_name": "T1107 - File Deletion"
            },
            {
              "id": "T1578.003",
              "name": "Delete Cloud Instance",
              "display_name": "T1578.003 - Delete Cloud Instance"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1003.008",
              "name": "/etc/passwd and /etc/shadow",
              "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            }
          ],
          "industries": [
            "Private Sector",
            "Healthcare",
            "Civil Society"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6466,
            "FileHash-MD5": 89,
            "FileHash-SHA1": 82,
            "FileHash-SHA256": 2406,
            "domain": 1686,
            "hostname": 1760,
            "CVE": 2,
            "CIDR": 4,
            "email": 7
          },
          "indicator_count": 12502,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "737 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e3d1a94659d50264a78fd4",
          "name": "Phishing | TabExplorer attacks compromised networks and devices",
          "description": "",
          "modified": "2024-04-02T01:01:20.068000",
          "created": "2024-03-03T01:26:01.043000",
          "tags": [
            "command decode",
            "suricata ipv4",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "suricata udpv4",
            "date",
            "united",
            "windows nt",
            "win64",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "url http",
            "url https",
            "scan endpoints",
            "all octoseek",
            "report spam",
            "hour ago",
            "whois record",
            "glasgow",
            "scan",
            "iocs",
            "next",
            "filehashsha256",
            "filehashmd5",
            "filehashsha1",
            "ipv4",
            "contacted",
            "execution",
            "pe resource",
            "communicating",
            "urls http",
            "referrer",
            "resolutions",
            "whois whois",
            "collections ip",
            "phishing",
            "attack",
            "loaded module",
            "remote procedure call",
            "search",
            "as15133 verizon",
            "passive dns",
            "urls",
            "creation date",
            "record value",
            "showing",
            "unknown",
            "as8075",
            "as15169 google",
            "as8068",
            "aaaa",
            "cname",
            "a domains",
            "meta",
            "entries",
            "gmt server",
            "ecacc saa83dd",
            "cobalt strike",
            "mozilla",
            "body",
            "brian sabey",
            "hallrender",
            "dynamicloader",
            "show",
            "alerts",
            "trojan",
            "copy",
            "dynamic",
            "medium",
            "reads",
            "write",
            "stealth network",
            "stealth_network",
            "script urls",
            "certificate",
            "rsa sha256",
            "exports data",
            "high",
            "yara rule",
            "yara detections",
            "njrat",
            "cape",
            "njrat malware",
            "sniffs",
            "guard",
            "write c",
            "delete c",
            "ms windows",
            "default",
            "intel",
            "openpgp public",
            "stream",
            "antivm_generic_disk",
            "antivm_generic_bios",
            "network_bind",
            "stealth_file spawns_dev_utility",
            "procmem_yara",
            "enumerates_physical_drives",
            "persistence_ads",
            "dynamic_function_loading",
            "reads_self",
            "suspicious_command_tools",
            "network",
            "rat"
          ],
          "references": [
            "http://www.tabxexplorer.com [phishing]",
            "http://www.tabxexplorer.com/lenovo",
            "GET /lenovo HTTP/1.1 Host: www.tabxexplorer.com Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0",
            "identity_helper.exe",
            "cdn.easykeys.com",
            "hive21.ctcsoftware.com",
            "www.moxa.com",
            "msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com",
            "IDS Detections: Cobalt Strike Malleable C2 JQuery",
            "IDS Detections: Nullsoft Mozilla UA (NSISDL)",
            "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla))",
            "IDS Detections: SSL excessive fatal alerts (possible POODLE attack against server)",
            "IDS Detections: GENERIC Likely Malicious Fake IE Downloading .exe",
            "Tulach Malware: 114.114.114.114",
            "ns3.hallgrandsale.ru",
            "AgentTesla.KM: FileHash-MD5 e0801d62e8379b98177fd94a027e8b30",
            "AgentTesla.KM: FileHash-SHA1 0fa00a939ca8af08c90310b808d1d8fc70a518c3",
            "Yara Detection: Nullsoft_NSIS"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "ALF:Trojan:MSIL/AgentTesla.KM",
              "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
              "target": null
            },
            {
              "id": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
              "display_name": "ALF:Win32/GbdInf_305B1C9A.J!ibt",
              "target": "/malware/ALF:Win32/GbdInf_305B1C9A.J!ibt"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HackTool:Win32/CobaltStrike.A",
              "display_name": "HackTool:Win32/CobaltStrike.A",
              "target": "/malware/HackTool:Win32/CobaltStrike.A"
            },
            {
              "id": "HackTool:Win32/Atosev.A",
              "display_name": "HackTool:Win32/Atosev.A",
              "target": "/malware/HackTool:Win32/Atosev.A"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            },
            {
              "id": "Sabey",
              "display_name": "Sabey",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Win.Malware.Generickdz-9938530-0",
              "display_name": "Win.Malware.Generickdz-9938530-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1029",
              "name": "Scheduled Transfer",
              "display_name": "T1029 - Scheduled Transfer"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [
            "Civil Society",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5551,
            "hostname": 1690,
            "domain": 929,
            "FileHash-SHA256": 2696,
            "FileHash-MD5": 405,
            "FileHash-SHA1": 315,
            "email": 4,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 11591,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "747 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d8c371cc0957afd9195ae0",
          "name": ":MalwareX-gen\\ [Trj]",
          "description": "",
          "modified": "2024-03-24T08:04:17.098000",
          "created": "2024-02-23T16:10:26",
          "tags": [
            "united",
            "command decode",
            "segoe ui",
            "emoji",
            "meta",
            "script",
            "alienvault",
            "open threat",
            "exchange",
            "learn",
            "date",
            "roboto",
            "path",
            "iframe",
            "body",
            "virustotal",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "span",
            "contact",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "june",
            "october",
            "pe resource",
            "september",
            "referrer",
            "historical ssl",
            "march",
            "august",
            "formbook",
            "suspicious"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65d85bc3164cd519bc4a282d",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Enqrypted",
            "id": "272105",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 151,
            "FileHash-SHA1": 151,
            "FileHash-SHA256": 2254,
            "domain": 693,
            "hostname": 974,
            "URL": 3461,
            "CVE": 1
          },
          "indicator_count": 7685,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "756 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d85bc3164cd519bc4a282d",
          "name": "Win32:RansomX-gen\\ [Ransom] \u2022 Win32:MalwareX-gen\\ [Trj]",
          "description": "https://otx.alienvault.com/indicator/ doesn't finish loading. Unable to analyze  detections.\nnetwork_icmp\nallocates_rwx\npacker_entropy\nhas_pdb\npe_unknown_resource_name\nsysinternals_tools_usage\nallocates_rwx\nsuspicious_process",
          "modified": "2024-03-24T08:04:17.098000",
          "created": "2024-02-23T08:48:03.696000",
          "tags": [
            "united",
            "command decode",
            "segoe ui",
            "emoji",
            "meta",
            "script",
            "alienvault",
            "open threat",
            "exchange",
            "learn",
            "date",
            "roboto",
            "path",
            "iframe",
            "body",
            "virustotal",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "span",
            "contact",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "june",
            "october",
            "pe resource",
            "september",
            "referrer",
            "historical ssl",
            "march",
            "august",
            "formbook",
            "suspicious"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 151,
            "FileHash-SHA1": 151,
            "FileHash-SHA256": 2254,
            "domain": 693,
            "hostname": 974,
            "URL": 3461,
            "CVE": 1
          },
          "indicator_count": 7685,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "756 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c942169a345feccec332cd",
          "name": "Miscellaneous Attack - https://house.mo.gov/",
          "description": "Researchers at the University of Missouri in Missouri have published their results on a new web server called \"revisor.com\" (revisors.mo.gov) for the next three years..",
          "modified": "2024-03-12T21:02:15.675000",
          "created": "2024-02-11T21:54:30.139000",
          "tags": [
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "showcctrue",
            "locationchamber",
            "viewmode3",
            "analyze",
            "hostname",
            "samples",
            "url https",
            "span",
            "pattern match",
            "script",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "input",
            "iframe",
            "body",
            "form",
            "error",
            "night",
            "bill",
            "february",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "footer",
            "no data",
            "tag count",
            "count blacklist",
            "tag tag",
            "heim",
            "a domains",
            "as393601 state",
            "united",
            "link",
            "object",
            "title",
            "statutes",
            "passive dns",
            "urls",
            "cname",
            "meta",
            "date",
            "encrypt",
            "aaaa",
            "as8987 amazon",
            "nxdomain",
            "whitelisted",
            "a nxdomain",
            "scan endpoints",
            "next",
            "all octoseek",
            "ipv4",
            "trojan",
            "verdana",
            "x content",
            "x xss",
            "sameorigin x",
            "pulse submit",
            "unknown",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "request",
            "as397241",
            "name servers",
            "center oak",
            "city sterling",
            "code us",
            "name security",
            "phone number",
            "postal code",
            "pulse pulses",
            "files",
            "representative rex",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "detection list",
            "blacklist",
            "session",
            "session floor",
            "hearings",
            "sunday",
            "missouri",
            "filter view",
            "new recordings",
            "no filter",
            "session jcr",
            "hearing house",
            "live",
            "label",
            "core",
            "script urls",
            "r3 dv",
            "tls ca"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 130,
            "FileHash-SHA1": 81,
            "FileHash-SHA256": 263,
            "URL": 704,
            "domain": 368,
            "hostname": 467,
            "email": 1
          },
          "indicator_count": 2014,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "767 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b806e2724db65b47cf66e0",
          "name": "AiCloud - Comcast Dnspionage",
          "description": "",
          "modified": "2024-02-27T19:04:14.842000",
          "created": "2024-01-29T20:13:22.271000",
          "tags": [
            "prefetch8",
            "command decode",
            "prefetch1",
            "suricata ipv4",
            "suricata udpv4",
            "mitre att",
            "united",
            "ck id",
            "show technique",
            "ck matrix",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "passive dns",
            "as7922 comcast",
            "x ua",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "meta",
            "status",
            "creation date",
            "search",
            "record value",
            "expiration date",
            "name servers",
            "next",
            "ai cloud",
            "cname",
            "as7018 att",
            "win32",
            "entries",
            "unknown",
            "body",
            "no redirect",
            "dynamicloader",
            "msie",
            "windows nt",
            "as16509",
            "medium",
            "default",
            "show",
            "copy",
            "powershell",
            "write",
            "pegasus",
            "apple mobile",
            "content",
            "nso group",
            "apple web",
            "apple app capable",
            "typosquatting",
            "spyware",
            "epoch"
          ],
          "references": [
            "c-67-181-73-197.hsd1.ca.comcast.net",
            "https://www.hybrid-analysis.com/sample/dc5ce323e37bebef2abbd0374249e12355c84dba32f40511eceafa29b57e3872/65b5134ce0242fd6e30b7259",
            "identity_helper.exe"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65b6b54d59d24b1522364fd6",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 522,
            "URL": 1194,
            "domain": 440,
            "FileHash-SHA256": 1528,
            "CVE": 1,
            "email": 2,
            "FileHash-MD5": 297,
            "FileHash-SHA1": 297
          },
          "indicator_count": 4281,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65b6b54d59d24b1522364fd6",
          "name": "AiCloud - Comcast Dnspionage",
          "description": "AiCloud, a cloud-based app that connects to Apple and Google, has been compromised by a malicious virus.",
          "modified": "2024-02-27T19:04:14.842000",
          "created": "2024-01-28T20:13:01.311000",
          "tags": [
            "prefetch8",
            "command decode",
            "prefetch1",
            "suricata ipv4",
            "suricata udpv4",
            "mitre att",
            "united",
            "ck id",
            "show technique",
            "ck matrix",
            "date",
            "hybrid",
            "general",
            "click",
            "strings",
            "contact",
            "passive dns",
            "as7922 comcast",
            "x ua",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "meta",
            "status",
            "creation date",
            "search",
            "record value",
            "expiration date",
            "name servers",
            "next",
            "ai cloud",
            "cname",
            "as7018 att",
            "win32",
            "entries",
            "unknown",
            "body",
            "no redirect",
            "dynamicloader",
            "msie",
            "windows nt",
            "as16509",
            "medium",
            "default",
            "show",
            "copy",
            "powershell",
            "write",
            "pegasus",
            "apple mobile",
            "content",
            "nso group",
            "apple web",
            "apple app capable",
            "typosquatting",
            "spyware",
            "epoch"
          ],
          "references": [
            "c-67-181-73-197.hsd1.ca.comcast.net",
            "https://www.hybrid-analysis.com/sample/dc5ce323e37bebef2abbd0374249e12355c84dba32f40511eceafa29b57e3872/65b5134ce0242fd6e30b7259",
            "identity_helper.exe"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            },
            {
              "id": "AndroidOverlayMalware - MOB-S0012",
              "display_name": "AndroidOverlayMalware - MOB-S0012",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 522,
            "URL": 1194,
            "domain": 440,
            "FileHash-SHA256": 1528,
            "CVE": 1,
            "email": 2,
            "FileHash-MD5": 297,
            "FileHash-SHA1": 297
          },
          "indicator_count": 4281,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "781 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "659560d63178b32f07838efb",
          "name": "Covert | Big O Tires active cyber threat | Dark Power | Emotet|",
          "description": "Active, ongoing cyber threat, multiple malicious activities including, network rat, ransomware encryption, social engineering,  spammers, infostealer, botnet activity.\nConsumers may also be contacted by mail or phone or find account seized. I haven't benn able to properly access the magnitude of the issue, there has been at least a handful of customers in good standing , with higher limits on paid of cards that ended up being stolen or according to Big O Representatives 'closed' for unfounded reasons; failure to confirm citizenship, identity, unknown patriot act offences, failure to comply Big O Tires via mail.",
          "modified": "2024-02-02T12:04:41.638000",
          "created": "2024-01-03T13:27:50.685000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "unsafeeval",
            "path",
            "expiressat",
            "auto",
            "wheels online",
            "o tires",
            "shop tires",
            "html info",
            "title shop",
            "tires",
            "meta tags",
            "big o",
            "tires language",
            "name verdict",
            "falcon sandbox",
            "samples",
            "localappdata",
            "json data",
            "temp",
            "getprocaddress",
            "ascii text",
            "windir",
            "file",
            "indicator",
            "mitre att",
            "ck id",
            "factory",
            "hybrid",
            "model",
            "comspec",
            "ssl certificate",
            "whois record",
            "execution",
            "contacted",
            "historical ssl",
            "whois whois",
            "simda http",
            "collections",
            "historical",
            "dropped",
            "backdoor",
            "unknown",
            "united",
            "asnone",
            "show",
            "entries",
            "search",
            "intel",
            "ms windows",
            "pe32",
            "windows nt",
            "copy",
            "write",
            "logic",
            "download",
            "malware",
            "suspicious",
            "next",
            "destination",
            "port",
            "components",
            "globalnpf",
            "china as23724",
            "music",
            "data c",
            "mexico",
            "as15169 google",
            "passive dns",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "win32",
            "united kingdom",
            "explorer",
            "xserver",
            "mtb aug",
            "location united",
            "america asn",
            "open",
            "trojan",
            "worm",
            "dataadobereader",
            "as397240",
            "msie",
            "etpro trojan",
            "virgin islands",
            "script urls",
            "creation date",
            "record value",
            "date",
            "a domains",
            "all search",
            "otx octoseek",
            "url http",
            "http",
            "related nids",
            "pulse http",
            "url https",
            "files location",
            "as20940",
            "aaaa",
            "as2914 ntt",
            "canada unknown",
            "japan unknown",
            "as16625 akamai",
            "domain",
            "hostname",
            "gmt content",
            "gmt report",
            "0 report",
            "sea alt",
            "body",
            "encrypt",
            "social engineering",
            "revenge rat",
            "rat",
            "identity theft",
            "credit card",
            "referrer",
            "communicating",
            "bundled",
            "family",
            "roots",
            "lolkek",
            "tzw variants",
            "quasar rat",
            "dark power",
            "swisyn",
            "wiper",
            "ransomware",
            "cobalt strike",
            "attack",
            "core",
            "emotet",
            "exploit",
            "hacktool",
            "mail spammer",
            "as63949 linode",
            "mtb dec",
            "checkin m1",
            "trojanspy",
            "artro",
            "remote",
            "infostealer"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Ukraine",
            "Georgia",
            "India",
            "Hong Kong",
            "Canada",
            "China",
            "Indonesia",
            "South Africa",
            "Germany",
            "Slovenia",
            "Mexico",
            "Netherlands",
            "Japan",
            "Spain",
            "Argentina",
            "France",
            "Chile",
            "Italy",
            "Aruba",
            "Switzerland",
            "United Kingdom of Great Britain and Northern Ireland",
            "Denmark",
            "Poland",
            "Colombia",
            "Taiwan",
            "Bulgaria",
            "Austria",
            "Russian Federation",
            "Australia",
            "Philippines",
            "Norway",
            "Sweden"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Comspec",
              "display_name": "Trojan:Win32/Comspec",
              "target": "/malware/Trojan:Win32/Comspec"
            },
            {
              "id": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "display_name": "#Lowfi:SCPT:KiraAsciiObfuscator",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Simda",
              "display_name": "Backdoor:Win32/Simda",
              "target": "/malware/Backdoor:Win32/Simda"
            },
            {
              "id": "Crypt3.BLXP",
              "display_name": "Crypt3.BLXP",
              "target": null
            },
            {
              "id": "PWS:Win32/VB.CU",
              "display_name": "PWS:Win32/VB.CU",
              "target": "/malware/PWS:Win32/VB.CU"
            },
            {
              "id": "Trojan:MSIL/ClipBanker.GB!MTB",
              "display_name": "Trojan:MSIL/ClipBanker.GB!MTB",
              "target": "/malware/Trojan:MSIL/ClipBanker.GB!MTB"
            },
            {
              "id": "Virus:Win32/Floxif.H",
              "display_name": "Virus:Win32/Floxif.H",
              "target": "/malware/Virus:Win32/Floxif.H"
            },
            {
              "id": "Win.Packed.Zusy-7170176-0",
              "display_name": "Win.Packed.Zusy-7170176-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Zbot-9880005-0",
              "display_name": "Win.Trojan.Zbot-9880005-0",
              "target": null
            },
            {
              "id": "'Win32:Trojan-gen",
              "display_name": "'Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "display_name": "TEL:TrojanDownloader:O97M/MsiexecAbuse",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.B",
              "display_name": "Worm:Win32/Mofksys.B",
              "target": "/malware/Worm:Win32/Mofksys.B"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Worm:LOGO/Logic",
              "display_name": "Worm:LOGO/Logic",
              "target": "/malware/Worm:LOGO/Logic"
            },
            {
              "id": "ETPro Trojan",
              "display_name": "ETPro Trojan",
              "target": null
            },
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Swisyn",
              "display_name": "TrojanSpy:Win32/Swisyn",
              "target": "/malware/TrojanSpy:Win32/Swisyn"
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Artro",
              "display_name": "Artro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1546.015",
              "name": "Component Object Model Hijacking",
              "display_name": "T1546.015 - Component Object Model Hijacking"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            }
          ],
          "industries": [
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 560,
            "FileHash-SHA1": 350,
            "FileHash-SHA256": 4371,
            "URL": 8165,
            "domain": 2548,
            "hostname": 2813,
            "CVE": 4,
            "email": 3
          },
          "indicator_count": 18814,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "807 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a161f0681f4ff3d67feb",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-12-06T16:29:21.844000",
          "created": "2023-12-06T16:29:21.844000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a145926a5676de0e2a1a",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-12-06T16:28:53.979000",
          "created": "2023-12-06T16:28:53.979000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707dfb9f84eebbe3bdfe59",
          "name": "Pegasus and Friends  2 - all touch by Pegasus or Variant in some way or another",
          "description": "",
          "modified": "2023-12-06T13:58:18.607000",
          "created": "2023-12-06T13:58:18.607000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1207,
            "domain": 312,
            "hostname": 1198,
            "URL": 3217,
            "FileHash-MD5": 3
          },
          "indicator_count": 5937,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707bf3841fe9f857870735",
          "name": "Jack Posobiec\u2019s Pay-share.com Bonanza",
          "description": "",
          "modified": "2023-12-06T13:49:39.465000",
          "created": "2023-12-06T13:49:39.465000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3887,
            "hostname": 1423,
            "domain": 675,
            "FileHash-SHA256": 2044,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 212,
            "CIDR": 18,
            "email": 10,
            "CVE": 3,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 8523,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707b9630308cb99a817277",
          "name": "Pool's Closed",
          "description": "",
          "modified": "2023-12-06T13:48:06.514000",
          "created": "2023-12-06T13:48:06.514000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7844,
            "FileHash-MD5": 562,
            "FileHash-SHA1": 429,
            "URL": 22749,
            "hostname": 9461,
            "domain": 4578,
            "SSLCertFingerprint": 20,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 45680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f37719db054ccde25aa9df",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-09-02T17:55:37.269000",
          "created": "2023-09-02T17:55:37.269000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7851,
            "URL": 23098,
            "hostname": 9521,
            "domain": 4595,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 564,
            "FileHash-SHA1": 432,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 46120,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "960 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "64f3771616d9a9891947e4df",
          "name": "Pool's Closed (by @scnrscnr)",
          "description": "",
          "modified": "2023-09-02T17:55:34.095000",
          "created": "2023-09-02T17:55:34.095000",
          "tags": [
            "Timothy Pool",
            "Christopher Pool",
            "Pool's Closed"
          ],
          "references": [
            "Pool Closed",
            "Pool's Closed"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [
            "Media",
            "ad fraud"
          ],
          "TLP": "white",
          "cloned_from": "5fa57698ac0f6638b7b9a8ba",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 7851,
            "URL": 23098,
            "hostname": 9521,
            "domain": 4595,
            "SSLCertFingerprint": 22,
            "FileHash-MD5": 564,
            "FileHash-SHA1": 432,
            "CIDR": 32,
            "email": 3,
            "CVE": 2
          },
          "indicator_count": 46120,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "960 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "60e6c1075f3f5592cb7d80d2",
          "name": "Jack Posobiec\u2019s Pay-share.com Bonanza",
          "description": "Looks like a dead site, talks like a dead site, walks like a dead site, isn\u2019t a dead nor parked site.",
          "modified": "2022-06-09T00:00:13.607000",
          "created": "2021-07-08T09:10:31.087000",
          "tags": [
            "enable javascript",
            "browser",
            "internet explorer",
            "firefox",
            "chrome",
            "safari",
            "opera",
            "codes fire",
            "stick tricks",
            "coupons knoji",
            "discount codes",
            "best uk",
            "hosting omega",
            "media hoekbank",
            "leasen",
            "writers per",
            "hour frskrat"
          ],
          "references": [
            "https://www.pay-share.com/",
            "http://www.enable-javascript.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3887,
            "hostname": 1423,
            "FileHash-SHA256": 2044,
            "domain": 675,
            "FileHash-MD5": 245,
            "FileHash-SHA1": 212,
            "CIDR": 18,
            "email": 10,
            "CVE": 3,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 8523,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 99,
          "modified_text": "1410 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620d08a477f11b4221bfb402",
          "name": "inforcloudesuite",
          "description": "",
          "modified": "2022-03-18T00:04:44.902000",
          "created": "2022-02-16T14:22:28.691000",
          "tags": [
            "psiusa",
            "domain robot",
            "graph summary",
            "win32 exe",
            "server",
            "redacted for",
            "privacy tech",
            "privacy admin",
            "date",
            "country",
            "organization",
            "postal code",
            "stateprovince",
            "domain status",
            "umbrella",
            "code",
            "submission",
            "sophos",
            "comodo valkyrie",
            "verdict",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3986,
            "domain": 560,
            "FileHash-SHA256": 652,
            "hostname": 1596,
            "email": 1
          },
          "indicator_count": 6795,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1493 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620844f08a0cd181e13a81c0",
          "name": "Pegasus and Friends  2 - all touch by Pegasus or Variant in some way or another",
          "description": "",
          "modified": "2022-03-15T00:00:20.682000",
          "created": "2022-02-12T23:38:24.616000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "whois",
            "pegasus",
            "spyware"
          ],
          "references": [
            "https://pastebn.com/Q9qWTKsM",
            "https://pastebn.com/Q9qWTKsM/",
            "Graph by nilaymistry30",
            "https://www.virustotal.com/graph/g1143d9441bce4ab3b427b7bace69140516650b053aa4470584248657edc53ef3"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3217,
            "hostname": 1198,
            "domain": 312,
            "FileHash-SHA256": 1207,
            "FileHash-MD5": 3
          },
          "indicator_count": 5937,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 402,
          "modified_text": "1496 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "https://ak.deephicy.net/?z=6118780&syncedCookie=true&rhd=false&rb=4Qar0ipdalmNR5Sicj8o7oK9WuZVXLChC0EcEUDBDY4n5ISECZrApfC-gjpDjsMLofKZlJaeh_gobm2lTLNRbwBynCFo6CRsgTd-gbOZKn6hkTMO15e_qN9jmE8T9QytmggiZaSD7Ys_RCMg-fY8kjd5ELPE8MLrz-t9Dm7bxqLgQ8U1SWuTcrT09Npw1M6dvd7WA_91bWtr2m-EiV0umKwr5ZDSUqAYTPVfrEmvFKmZ32EfwaKGnKgKEGYaQGvQe1ga-4TccFs5A6Kh-HLSeXuKYMPVlODFrOgLcCUQi81bKgkG7ceuo8sG_5o6_ilHG6krYsCSk8Qwzdpn5AnwWweNPG9uC3hYGroh8tnINyQkdEnWp7O38iOgkAxqQoYhttqKqq7Cf6P8l9y-w4NtLBEm6c_ASSKggtwrI11Jvee9YxytSZBVlA==&sfr=n",
        "http://www.tabxexplorer.com/lenovo",
        "Graph by nilaymistry30",
        "AgentTesla.KM: FileHash-SHA1 0fa00a939ca8af08c90310b808d1d8fc70a518c3",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "AgentTesla.KM: FileHash-MD5 e0801d62e8379b98177fd94a027e8b30",
        "https://api.wavebrowserbase.com",
        "Ryuk: kramtechnology.com",
        "https://pastebn.com/Q9qWTKsM",
        "Remotely accessing to targets devices: http://maps.co.gov/ | Maps & Calendar pop ups obfuscate targets screens. Pinging",
        "newrelic.se",
        "Pool's Closed",
        "https://pastebn.com/Q9qWTKsM/",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "identity_helper.exe",
        "Redirection chain: www.colorado.gov | salesforce-sites.com | peak.my.si (Malformed domain) www.bing.com",
        "AS Registry: arin:aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
        "If you knew how you're wasting time and resources hacking a front facing archive with a 443:",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "hive21.ctcsoftware.com",
        "Co.gov: Autonomous System: AS16509 - Amazon.com, Inc. AS Country Code: US AS AS CIDR: 13.225.192.0/21 CIDR: 13.200.0.0/13 13.224.0.0/12 13.208.0.0/12",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Tulach Malware: 114.114.114.114",
        "IDS Detections: GENERIC Likely Malicious Fake IE Downloading .exe",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "Sexual Content Titles: http://analyticschecker.com/survey/sexynews24.js | http://sex.utub.com/ | http://wap.18.orgsex.utub.com/",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Registrant: State of Colorado General Government Computer Address: 690 Kipling St. Postal Code: 80215 Country Code: USA City: LakeWood State: CO",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "Registrant Information: Amazon Technologies Inc. Address: 410 Terry Ave N. Postal Code: H3A 2A6 Country Code: CA (Canada)  City: Montreal State: WA",
        "https://hybrid-analysis.com/sample/23e867fef441df664d0122961782722157df2bfb0d468c8804ffc850c0b6c875",
        "Redirection chain: http://co.gov/peak | https://co.gov/peak | http://colorado.gov/peak | https://colorado.gov/peak | https://www.colorado.gov/peak",
        "CO.gov/PEAK -Postal mail Spam. Urgent demand to login.",
        "http://bundled.toolbar.google http://bundled.toolbar.google/http://toolbar.google. https://bundled.toolbar.google. https://bundled.toolbar.google/",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "AS Name: AS36081 State of Colorado General Government Computer AS Country Code: US AS Registry: arin AS : AS CIDR: 165.127.0.0/16",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "http://6.no.me.malware.com | http://6.no.me.malware.com/download",
        "Botnet Server IP: 141.226.230.48",
        "https://www.virustotal.com/graph/g1143d9441bce4ab3b427b7bace69140516650b053aa4470584248657edc53ef3",
        "Redirect Chain: https://accounts.google.com/o/oauth2/auth?access_type=offline&approval_prompt=force&client_id=795490584532-smtoie0juhaj5tq9h07si1ekd4m6pvlr.apps.googleusercontent.com&redirect_uri=https%3A%2F%2Foauth2-proxy.glintsintern.com%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=",
        "Pony: https://allspice.ordavida.com/api/mailings/opened/PMRGSZBCHIYTMNZQGYWCE33SM4RDUIRZGQZDONDBGIZC2MBXMM2S2NBYMM2S2YTEHE3C2MJZGI4DSOBYHAYTGNRZEIWCE5TFOJZWS33OEI5CENBCFQRHG2LHEI5CEYSPONYXS4RRGFBUIY3DKRIHSSRRK44WSY3FNM4ESVTJKZMHOWRTJBLXIYLIHFRWS3DUKU6SE7I=.gif",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "ZBot: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzl0WlhSaGJtOXBZV1pwYm1GdVkybGhiQzVqYjIxY0x6OTFkRzFmYzI5MWNtTmxQV1Z0WVdsc1gzTnBaMjVoZEhWeVpTWmhiWEE3ZFhSdFgyMWxaR2wxYlQxbGJXRnBiQ1poYlhBN2RYUnRYMk5oYlhCaGFXZHVQWEJ5YjIxdmRHbHZiaUlzSW1oaGMyZ2lPaUkwTjFGWlUzZFlTMkYxVDA1dVIxb2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2lhbWx0YlhrdWQyRnNhMlZ5UUdGc2JITjBZWFJsTG1OdmJTSjk9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOXRaWFJoYm05cFlX",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Ryuk: https://brain.snappykraken.com/api/v1/events-recorder/clicked?clicked=eyJxdWVyeV9zdHJpbmciOiJkako3SW5WeWJDSTZJbWgwZEhCek9sd3ZYQzkzZDNjdWEybHdiR2x1WjJWeUxtTnZiVnd2WldOdmJtOXRhV010Wm05eVpXTmhjM1J6WEM5cGJuUmxjbVZ6ZEMxeVlYUmxjeUlzSW1oaGMyZ2lPaUpzYmtJMWFUSjJkbmRvU21GQ1RuZ2lMQ0pqYjI1MFlXTjBYMlZ0WVdsc0lqb2liV052ZUVCdGIzSnlhWE56WlhsbGJtZHBibVZsY21sdVp5NWpiMjBpZlE9IiwicmVxdWVzdF9kYXRhIjp7ImRqSjdJblZ5YkNJNkltaDBkSEJ6T2x3dlhDOTNkM2N1YTJsd2JHbHVaMlZ5TG1OdmJWd3ZaV052Ym05dGFXTXRabTl5WldOaGMzUnpYQzlwYm5SbGNtVnpkQzF5",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Ryuk: http://kramtechnology.com/",
        "Pool Closed",
        "Redirect Chain: https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/ K9p1aHVpkkzIn1S7Dakqexnw4nP6ZmG7kNifaOtuay4%3Ahttp%3A%2F%2Fjaegertracing.match-growth.alicloud-production.glintsintern.com%2F https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/",
        "Redirection chain: https://coloradopeak.secure.force.com/ https://colorado.gov:443/peak | coloradopeak.secure.force.com | dns01.salesforce.com",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "IDS Detections: Observed Suspicious UA (NSISDL/1.2 (Mozilla))",
        "https://www.hybrid-analysis.com/sample/dc5ce323e37bebef2abbd0374249e12355c84dba32f40511eceafa29b57e3872/65b5134ce0242fd6e30b7259",
        "GET /lenovo HTTP/1.1 Host: www.tabxexplorer.com Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0",
        "https://www.pay-share.com/",
        "0-w5-cms.ultimate-guitar.com",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Redirection chain: dns1.p06.nsone.net l ns1-204.azure-dns.com | ns1.google.com |  ns1.msedge.net | peak.my.salesforce-sites.com |",
        "www.moxa.com",
        "https://hybrid-analysis.com/sample/3fb8f0af07a9e94045be0f592c675e4f6146c95523f1774bc03f8eb5cf8c7d4e/65951c3d58467c9eb00f69dc",
        "AIG: Malicious CMS prefix -cmsportal.app.hurdman.org (key identifier/decoder)",
        "c-67-181-73-197.hsd1.ca.comcast.net",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: SSL excessive fatal alerts (possible POODLE attack against server)",
        "http://www.enable-javascript.com/",
        "Ransom: message.htm.com",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "http://www.tabxexplorer.com [phishing]",
        "Yara Detection: Nullsoft_NSIS",
        "IDS Detections: Nullsoft Mozilla UA (NSISDL)",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "cdn.easykeys.com",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "IDS Detections: Cobalt Strike Malleable C2 JQuery",
        "AS36081 State of Colorado General Government Computer: 165.127.10.10 | Location - LakeWood - CO - United States | Emails: isoc@state.co.us",
        "msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Targeted espionage: cms.wavebrowser.co | https://cms.wavebrowser.co/ | http://t4tonly.com/cms/web-services/get-all-city.php",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "ns3.hallgrandsale.ru",
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "nr-data.net [Apple Private Data Collection]",
        "Emails: aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Out For Blood"
          ],
          "malware_families": [
            "Hacktool",
            "Cl0p",
            "Quasar rat",
            "Unix.trojan.darknexus-7679166-0",
            "Worm:logo/logic",
            "Trojandownloader:win32/cutwail",
            "Backdoor:win32/simda",
            "Win.trojan.zbot-9880005-0",
            "Elf:mirai-gh\\ [trj]",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Win.packed.zusy-7170176-0",
            "Tel:trojandownloader:o97m/msiexecabuse",
            "#lowfi:scpt:kiraasciiobfuscator",
            "Ransomware",
            "Alf:trojan:msil/agenttesla.km",
            "Trojanspy",
            "Trojan:win32/comspec",
            "Alf:win32/gbdinf_305b1c9a.j!ibt",
            "Trojan:win32/zombie.a",
            "Emotet",
            "Trojanspy:win32/swisyn",
            "Etpro trojan",
            "Lolkek",
            "Sabey",
            "Pegasus",
            "Hacktool:win32/atosev.a",
            "Tulach",
            "Mirai",
            "Worm:win32/mofksys.rnd!mtb",
            "Worm:win32/mofksys.b",
            "Cobalt strike",
            "Hallrender",
            "Androidoverlaymalware - mob-s0012",
            "Hacktool:win32/cobaltstrike.a",
            "Artro",
            "Trojan:msil/clipbanker.gb!mtb",
            "Virus:win32/floxif.h",
            "Win.malware.generickdz-9938530-0",
            "Ransom",
            "Generic",
            "'win32:trojan-gen",
            "Pws:win32/vb.cu",
            "Maltiverse",
            "Crypt3.blxp",
            "Dark power"
          ],
          "industries": [
            "Technology",
            "Telecommunications",
            "Healthcare",
            "Civil society",
            "Private sector",
            "Media",
            "Ad fraud"
          ],
          "unique_indicators": 177569
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/imoneso.cn",
    "whois": "http://whois.domaintools.com/imoneso.cn",
    "domain": "imoneso.cn",
    "hostname": "safe.imoneso.cn"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 32,
  "pulses": [
    {
      "id": "69a9cd444aa144401d0c4988",
      "name": "Pools Open",
      "description": "",
      "modified": "2026-04-15T19:21:28.851000",
      "created": "2026-03-05T18:36:52.014000",
      "tags": [
        "Timothy Pool",
        "Christopher Pool",
        "Pool's Closed"
      ],
      "references": [
        "Pool Closed",
        "Pool's Closed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Media",
        "ad fraud"
      ],
      "TLP": "white",
      "cloned_from": "5fa57698ac0f6638b7b9a8ba",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 8098,
        "URL": 23428,
        "hostname": 9592,
        "domain": 4727,
        "SSLCertFingerprint": 22,
        "FileHash-MD5": 696,
        "FileHash-SHA1": 457,
        "CIDR": 78,
        "email": 3,
        "CVE": 2
      },
      "indicator_count": 47103,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "3 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "5fa57698ac0f6638b7b9a8ba",
      "name": "Pool's Closed",
      "description": "Two paupers from the meadow spring forth an upheaval of nasty sites on the world wide web.",
      "modified": "2025-12-27T05:02:34.910000",
      "created": "2020-11-06T16:15:20.139000",
      "tags": [
        "Timothy Pool",
        "Christopher Pool",
        "Pool's Closed"
      ],
      "references": [
        "Pool Closed",
        "Pool's Closed"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [
        "Media",
        "ad fraud"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 61,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 4,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scnrscnr",
        "id": "126475",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 8098,
        "URL": 23426,
        "hostname": 9590,
        "domain": 4727,
        "SSLCertFingerprint": 22,
        "FileHash-MD5": 696,
        "FileHash-SHA1": 457,
        "CIDR": 78,
        "email": 3,
        "CVE": 2
      },
      "indicator_count": 47099,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 133,
      "modified_text": "113 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65f27f90cb56df78929c01d4",
      "name": "CO.gov/PEAK - Post Mail Social Engineering | M Brian Sabey and CBI",
      "description": "",
      "modified": "2024-09-24T14:02:17.711000",
      "created": "2024-03-14T04:39:44.522000",
      "tags": [
        "united",
        "command decode",
        "suricata ipv4",
        "mitre att",
        "suricata udpv4",
        "programfiles",
        "ck id",
        "show technique",
        "ck matrix",
        "windir",
        "date",
        "win64",
        "hybrid",
        "general",
        "model",
        "comspec",
        "click",
        "strings",
        "contact",
        "hostnames",
        "urls http",
        "samples",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "referrer",
        "siblings",
        "contacted",
        "pe resource",
        "communicating",
        "subdomains",
        "whois whois",
        "copy",
        "ursnif",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "quasar",
        "ramnit",
        "lskeyc",
        "maxage31536000",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers",
        "detection list",
        "blacklist",
        "cisco umbrella",
        "site",
        "safe site",
        "alexa top",
        "million",
        "team top",
        "site top",
        "site safe",
        "heur",
        "ccleaner",
        "adware",
        "downldr",
        "union",
        "bank",
        "cve201711882",
        "xrat",
        "phishing",
        "team",
        "alexa",
        "static engine",
        "passive dns",
        "unknown",
        "title error",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse submit",
        "url analysis",
        "urls",
        "thu jul",
        "fri dec",
        "hybridanalysis",
        "generic malware",
        "malware",
        "wed dec",
        "free automated",
        "service",
        "thu dec",
        "cidr",
        "sun aug",
        "ip sun",
        "country code",
        "system as",
        "as16509",
        "mon sep",
        "registrant name",
        "amazon",
        "terry ave",
        "code",
        "as36081 state",
        "pulse pulses",
        "files",
        "reverse dns",
        "asnone united",
        "moved",
        "body",
        "certificate",
        "g2 tls",
        "rsa sha256",
        "search",
        "showing",
        "online sun",
        "online sat",
        "online",
        "12345",
        "as44273 host",
        "status",
        "for privacy",
        "redacted for",
        "cname",
        "domain",
        "nxdomain",
        "ip related",
        "creation date",
        "servers",
        "name servers",
        "next",
        "cloudfront x",
        "sfo5 c1",
        "a domains",
        "nice botet",
        "srellik",
        "sreredrem",
        "hit",
        "men",
        "man",
        "women",
        "spider",
        "mail spammer",
        "gov"
      ],
      "references": [
        "CO.gov/PEAK -Postal mail Spam. Urgent demand to login.",
        "https://hybrid-analysis.com/sample/23e867fef441df664d0122961782722157df2bfb0d468c8804ffc850c0b6c875",
        "Redirection chain: http://co.gov/peak | https://co.gov/peak | http://colorado.gov/peak | https://colorado.gov/peak | https://www.colorado.gov/peak",
        "Redirection chain: https://coloradopeak.secure.force.com/ https://colorado.gov:443/peak | coloradopeak.secure.force.com | dns01.salesforce.com",
        "Redirection chain: dns1.p06.nsone.net l ns1-204.azure-dns.com | ns1.google.com |  ns1.msedge.net | peak.my.salesforce-sites.com |",
        "Redirection chain: www.colorado.gov | salesforce-sites.com | peak.my.si (Malformed domain) www.bing.com",
        "AS36081 State of Colorado General Government Computer: 165.127.10.10 | Location - LakeWood - CO - United States | Emails: isoc@state.co.us",
        "AS Name: AS36081 State of Colorado General Government Computer AS Country Code: US AS Registry: arin AS : AS CIDR: 165.127.0.0/16",
        "Registrant: State of Colorado General Government Computer Address: 690 Kipling St. Postal Code: 80215 Country Code: USA City: LakeWood State: CO",
        "http://bundled.toolbar.google http://bundled.toolbar.google/http://toolbar.google. https://bundled.toolbar.google. https://bundled.toolbar.google/",
        "Remotely accessing to targets devices: http://maps.co.gov/ | Maps & Calendar pop ups obfuscate targets screens. Pinging",
        "http://6.no.me.malware.com | http://6.no.me.malware.com/download",
        "Sexual Content Titles: http://analyticschecker.com/survey/sexynews24.js | http://sex.utub.com/ | http://wap.18.orgsex.utub.com/",
        "https://ak.deephicy.net/?z=6118780&syncedCookie=true&rhd=false&rb=4Qar0ipdalmNR5Sicj8o7oK9WuZVXLChC0EcEUDBDY4n5ISECZrApfC-gjpDjsMLofKZlJaeh_gobm2lTLNRbwBynCFo6CRsgTd-gbOZKn6hkTMO15e_qN9jmE8T9QytmggiZaSD7Ys_RCMg-fY8kjd5ELPE8MLrz-t9Dm7bxqLgQ8U1SWuTcrT09Npw1M6dvd7WA_91bWtr2m-EiV0umKwr5ZDSUqAYTPVfrEmvFKmZ32EfwaKGnKgKEGYaQGvQe1ga-4TccFs5A6Kh-HLSeXuKYMPVlODFrOgLcCUQi81bKgkG7ceuo8sG_5o6_ilHG6krYsCSk8Qwzdpn5AnwWweNPG9uC3hYGroh8tnINyQkdEnWp7O38iOgkAxqQoYhttqKqq7Cf6P8l9y-w4NtLBEm6c_ASSKggtwrI11Jvee9YxytSZBVlA==&sfr=n",
        "Co.gov: Autonomous System: AS16509 - Amazon.com, Inc. AS Country Code: US AS AS CIDR: 13.225.192.0/21 CIDR: 13.200.0.0/13 13.224.0.0/12 13.208.0.0/12",
        "Registrant Information: Amazon Technologies Inc. Address: 410 Terry Ave N. Postal Code: H3A 2A6 Country Code: CA (Canada)  City: Montreal State: WA",
        "AS Registry: arin:aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
        "Emails: aws-routing-poc@amazon.com amzn-noc-contact@amazon.com abuse@amazonaws.com aws-dogfish-routing-poc@amazon.com",
        "AIG: Malicious CMS prefix -cmsportal.app.hurdman.org (key identifier/decoder)",
        "Targeted espionage: cms.wavebrowser.co | https://cms.wavebrowser.co/ | http://t4tonly.com/cms/web-services/get-all-city.php",
        "0-w5-cms.ultimate-guitar.com",
        "Redirect Chain: https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/ K9p1aHVpkkzIn1S7Dakqexnw4nP6ZmG7kNifaOtuay4%3Ahttp%3A%2F%2Fjaegertracing.match-growth.alicloud-production.glintsintern.com%2F https://oauth2-proxy.glintsintern.com/oauth2/start?rd=http://jaegertracing.match-growth.alicloud-production.glintsintern.com/",
        "Redirect Chain: https://accounts.google.com/o/oauth2/auth?access_type=offline&approval_prompt=force&client_id=795490584532-smtoie0juhaj5tq9h07si1ekd4m6pvlr.apps.googleusercontent.com&redirect_uri=https%3A%2F%2Foauth2-proxy.glintsintern.com%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=",
        "If you knew how you're wasting time and resources hacking a front facing archive with a 443:"
      ],
      "public": 1,
      "adversary": "Out For Blood",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1534",
          "name": "Internal Spearphishing",
          "display_name": "T1534 - Internal Spearphishing"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1107",
          "name": "File Deletion",
          "display_name": "T1107 - File Deletion"
        },
        {
          "id": "T1578.003",
          "name": "Delete Cloud Instance",
          "display_name": "T1578.003 - Delete Cloud Instance"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1003.008",
          "name": "/etc/passwd and /etc/shadow",
          "display_name": "T1003.008 - /etc/passwd and /etc/shadow"
        },
        {
          "id": "T1088",
          "name": "Bypass User Account Control",
          "display_name": "T1088 - Bypass User Account Control"
        }
      ],
      "industries": [
        "Private Sector",
        "Healthcare",
        "Civil Society"
      ],
      "TLP": "white",
      "cloned_from": "65f2691bb1405f9a30cf46b6",
      "export_count": 76,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6664,
        "FileHash-MD5": 89,
        "FileHash-SHA1": 82,
        "FileHash-SHA256": 2523,
        "domain": 1792,
        "hostname": 1889,
        "CVE": 2,
        "CIDR": 19,
        "email": 22
      },
      "indicator_count": 13082,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "572 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6692cf0e2273bb06aa43e43c",
      "name": "Banker: Through The Nights - YouTube | Errors |",
      "description": "YouTube creator issue. Hijacked channel. Won't open in  VT, 303 error, ransomware files. Ransomware confirmed, limited access/research for today's pulse.",
      "modified": "2024-08-12T18:02:56.458000",
      "created": "2024-07-13T19:01:34.484000",
      "tags": [
        "united",
        "command decode",
        "suricata ipv4",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "name server",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "low risk",
        "domain",
        "no malware",
        "found",
        "site",
        "ip address",
        "google network",
        "unknown",
        "low security",
        "risk",
        "hacked",
        "protect",
        "path",
        "secure",
        "httponly",
        "secchuabitness",
        "secchuamodel",
        "secchuawow64",
        "secchuaplatform",
        "samesitenone",
        "http response",
        "final url",
        "status code",
        "body length",
        "kb body",
        "pragma",
        "song culture",
        "tsara lynn",
        "culture",
        "chime sa",
        "mediawarning",
        "youtube twitter",
        "jess",
        "tsara brashears",
        "zafira songs",
        "youtube og",
        "hope",
        "html info",
        "meta tags",
        "data",
        "v3 serial",
        "number",
        "cus ogoogle",
        "trust",
        "llc cngts",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "name",
        "whois lookup",
        "create date",
        "expiry date",
        "query time",
        "update date",
        "update",
        "passive dns",
        "gmt content",
        "scan endpoints",
        "all scoreblue",
        "hostname",
        "pulse pulses",
        "urls",
        "files",
        "related pulses",
        "error",
        "code",
        "algorithm",
        "first"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1125",
          "name": "Video Capture",
          "display_name": "T1125 - Video Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 3,
        "FileHash-SHA1": 3,
        "FileHash-SHA256": 343,
        "SSLCertFingerprint": 8,
        "URL": 333,
        "domain": 69,
        "hostname": 165
      },
      "indicator_count": 924,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "615 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6603369ad0e38e313883c4fa",
      "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root HELP! RETALIATION HAS OCCURRED ",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-26T20:56:58.037000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 4468,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6603360b48908ae9b9835563",
      "name": "IoT Dark Nexus + Mirai BotNet HELP HER PLEASE!!- Enom | TELNET Root |",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-26T20:54:35.118000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 38,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66015553ad4633eb85c66817",
      "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-25T10:43:31.072000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66015551faca20cb510f9121",
      "name": "IoT Dark Nexus + Mirai BotNet - Enom | TELNET Root | Modified Browser and Service ",
      "description": "",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-25T10:43:29.149000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "660021cdfd20f6237e3892c0",
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "660021cdfd20f6237e3892c0",
      "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
      "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-24T12:51:25.910000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 41,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "660021cc958e062575a9a160",
      "name": "IoT Dark Nexus + Mirai BotNet  - Enom | TELNET Root | Modified Browser and Services",
      "description": "Found in web app of a targets device. Mirai, spyware, hidden user sandbox, information collection, modified services. CnC. | Redirects client from secure to insecure headers. | Downloaded 'suss' Bitdefender - White Paper report. | Apple phone along other devices making commands and requests via app.",
      "modified": "2024-04-23T11:04:58.191000",
      "created": "2024-03-24T12:51:24.154000",
      "tags": [
        "referrer",
        "communicating",
        "contacted",
        "siblings domain",
        "parent domain",
        "subdomains",
        "execution",
        "bundled",
        "threat",
        "paste",
        "iocs",
        "e4609l",
        "urls http",
        "blacklist http",
        "cisco umbrella",
        "heur",
        "site",
        "html",
        "million",
        "team",
        "alexa top",
        "script",
        "malicious url",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "swrort",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "riskware",
        "unsafe",
        "webshell",
        "exploit",
        "crack",
        "malware",
        "phishing",
        "union",
        "bank",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "detection list",
        "blacklist",
        "site top",
        "malware site",
        "site safe",
        "deepscan",
        "genpack",
        "zbot",
        "united",
        "proxy",
        "firehol mail",
        "spammer",
        "anonymizer",
        "team proxy",
        "firehol",
        "noname057",
        "alexa safe",
        "maltiverse safe",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "orgabusehandle",
        "route",
        "appli22",
        "address",
        "orgtechhandle",
        "appliedi abuse",
        "orgnochandle",
        "peter heather",
        "appliedi",
        "general info",
        "geo united",
        "as14519",
        "us note",
        "registrar arin",
        "ptr record",
        "command decode",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "traffic et",
        "policy windows",
        "update p2p",
        "activity",
        "date",
        "hybrid",
        "general",
        "click",
        "strings",
        "contact",
        "contacted urls",
        "cert valid",
        "malicious",
        "phone",
        "text",
        "microsoft",
        "uk telco",
        "js tel",
        "metro",
        "redacted for",
        "record value",
        "emails abuse",
        "name redacted",
        "for privacy",
        "name servers",
        "privacy address",
        "privacy city",
        "privacy country",
        "resolutions",
        "a domains",
        "canada unknown",
        "div div",
        "format a",
        "a ul",
        "models a",
        "gmt path",
        "search",
        "unknown",
        "passive dns",
        "title",
        "all scoreblue",
        "ipv4",
        "url analysis",
        "body",
        "next",
        "port",
        "destination",
        "forbidden",
        "high",
        "tcp syn",
        "telnet root",
        "suspicious path",
        "busybox",
        "bad login",
        "telnet login",
        "copy",
        "mirai",
        "domain",
        "hostname",
        "script script",
        "link",
        "app themesskin",
        "status",
        "content type",
        "lakeside tool",
        "meta",
        "find",
        "tools",
        "cookie",
        "front",
        "li ul",
        "mower shop",
        "creation date",
        "showing",
        "pragma",
        "this",
        "span",
        "open ports",
        "body doctype",
        "privacy admin",
        "privacy tech",
        "server",
        "country",
        "organization",
        "postal code",
        "stateprovince",
        "code",
        "script urls",
        "aaaa",
        "as8068",
        "cname",
        "as20446",
        "encrypt",
        "falcon",
        "name verdict",
        "abuse",
        "as55081",
        "dnssec",
        "dynamicloader",
        "alerts",
        "pulses",
        "java",
        "windows",
        "guard",
        "medium",
        "dynamic",
        "servers",
        "certificate",
        "as54113",
        "trojan",
        "neue",
        "trojanspy",
        "alexa",
        "team google",
        "maltiverse top",
        "ccleaner",
        "xrat",
        "downldr",
        "tsara brashears",
        "entries",
        "transactional"
      ],
      "references": [
        "174.136.94.17 AS 14519 (APPLIEDI) US | 174.231.94.17 AS 6167 (CELLCO-PART) US",
        "HOSTEDBYAPPLIEDI.NET - Enom",
        "www.poserworld.com | A 174.136.76.202 | AS14519 Applied Innovations Corporation | United States",
        "https://www.trendmicro.com/en_us/research/21/l/the-evolution-of-iot-linux-malware-based-on-mitre-att&ck-ttps.html",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "https://otx.alienvault.com/indicator/file/0cbc40baea499758a01ad897cfc6beb54dc1cbbad56eedcf5197f42a141c0188",
        "Mirai: feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Trojanspy: FileHash-SHA256\tfa69e5f4c2abb3900e7861463e28eaab5233bd2a7521bf0679c00588513bfe8e",
        "Trojanspy: FileHash-MD5 b98fd97821e9b814b75124ccbdfa7664",
        "Trojanspy: FileHash-SHA1 f57d93f3583a4b7e5c6e6a35665853d6bdefddd7",
        "Dark Nexus: FileHash-SHA256 | feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb",
        "Dark Nexus: FileHash-MD5 869aeef284f70c36bb66e74e5c38539c",
        "Dark Nexus: FileHash-SHA1 bcb96edc67b28e4f26e598",
        "[Last seen Sun 24 Mar 2024 08:49:16 - feea61351ca61957888538a9249fd6687a05e74591df31bc4ac6905dfd70b1eb] Detections below",
        "Yara Detections: is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "IDS Detections: HiSilicon DVR - Default Telnet Root Password Inbound SUSPICIOUS Path to BusyBox 403 Forbidden root login Bad Login TELNET login failed",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: dead_host - Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usual)",
        "Dropped Files: #266028 (deleted) empty MF5 d41d8cd98f00b204e9800998ecf8427e",
        "Interesting: HYPV8505-WEB.hostedbyappliedi.net Domain: appliedi.net | Title: Best Managed Cloud IT Cybersecurity Provider in Boca Raton Florida",
        "Phishing: https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Phishing: wallpapers-nature.com | https://www.pornhub.com/video/search?search=tsara+brashears | https://wallpapers-nature.com/ tsara-brashears/urlscan-io |",
        "Phishing: https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "nr-data.net [Apple Private Data Collection]",
        "Heavy tracking: otc.greatcall.com, tracking.resaas.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT\t URL\thttp://www.tcscouriers.com/ae/tracking/Default.aspx?TrackBy=ReferenceNumberHome\t URL\thttp://www.on2url.com/a",
        "Heavy tracking: clickonurl.com, https://hub.sociabble.com/CommunicationReadMail?mailid=aff338e6-9720-4643-aae6-14374a42c75f&userlang=fr&ebTrackType=Newsletter&ebTrackId=aff338e6-9720-4643-aae6-14374a42c75f&ebTrackAction=OPEN&deliveryId=5cfea157-54e0-414a-a669-0c38fbc7aad7&c=bc8ef734-589b-4bf0-b31b-456e540f0b32&ebv=129c1fd618ab6e249b9b6e087db95209&ebTrackOrigin=EMAILCLIENT",
        "smartertrack.appliedi.net, http://analytics.com/track?id=55",
        "Heavy tracking: maps.appliedi.net, googlesitmap.com, digitalattackmap.com, imap.cadna.com , https://www.rvar.com/images/pdfs/ext_linked/drc_map.pdf",
        "Heavy tracking: mamapajamajan2.com (looks creepy as if there is footage), location.search |"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1504",
          "name": "PowerShell Profile",
          "display_name": "T1504 - PowerShell Profile"
        },
        {
          "id": "T1503",
          "name": "Credentials from Web Browsers",
          "display_name": "T1503 - Credentials from Web Browsers"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 35,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2979,
        "FileHash-SHA1": 406,
        "FileHash-SHA256": 2293,
        "URL": 1804,
        "domain": 814,
        "hostname": 1025,
        "email": 9,
        "CVE": 12,
        "CIDR": 2
      },
      "indicator_count": 9344,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "726 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://safe.imoneso.cn",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://safe.imoneso.cn",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622432.2321763
}