{
  "type": "URL",
  "indicator": "https://schema.rdfs.org",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://schema.rdfs.org",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 2603744849,
      "indicator": "https://schema.rdfs.org",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "6709ad372568d7810af2e480",
          "name": "https://rcmp[.]ca/en/alberta // rcmp[.]ca // rcmp-grc[.]gc[.]ca - 12.06.25",
          "description": "Alberta RCMP\nhttps://rcmp[.]ca/en/alberta // rcmp[.]ca // rcmp-grc[.]gc[.]ca",
          "modified": "2026-01-05T22:04:46.025000",
          "created": "2024-10-11T22:56:55.968000",
          "tags": [
            "entity",
            "RCMP",
            "Alberta",
            "EPS",
            "Edmonton Police Services",
            "RCMP AB",
            "CrimeStoppers AB"
          ],
          "references": [
            "https://www.virustotal.com/graph/embed/g69422d071856425cb7ef01a90232cae9aef9af2362ad45db8fc83caabe618606?theme=dark",
            "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13/iocs",
            "https://urlquery.net/report/54993e5a-9b3f-4eef-a219-6ed529b4ea66",
            "https://www.filescan.io/uploads/6775f8d1108e6fdea94ba637/reports/ba88f2c2-96e9-4106-9b93-4f7fa7f1519a/overview",
            "https://malpedia.caad.fkie.fraunhofer.de/details/win.tofsee",
            "https://www.virustotal.com/gui/collection/malpedia_win_tofsee/summary",
            "https://viz.greynoise.io/analysis/ade7d4f8-0bf7-4582-9a91-f7b26c0bb9f7",
            "",
            "https://rcmp[.]ca/en/alberta",
            "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13",
            "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a/67e0baae85aff10b880edd20",
            "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "",
            "Government",
            "Telecommunications",
            "Education",
            "Technology",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 4,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 764,
            "FileHash-SHA1": 760,
            "FileHash-SHA256": 4062,
            "domain": 378,
            "hostname": 1808,
            "URL": 886,
            "SSLCertFingerprint": 18,
            "email": 10,
            "CVE": 1
          },
          "indicator_count": 8687,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 135,
          "modified_text": "103 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68bbf3e40e3ce8a74aa89545",
          "name": "HCPF \u2022 The intricate relationships between the FIN7 group and members of the Conti gang",
          "description": "",
          "modified": "2025-10-06T08:03:23.285000",
          "created": "2025-09-06T08:42:12.787000",
          "tags": [
            "present feb",
            "united",
            "a domains",
            "present dec",
            "passive dns",
            "moved",
            "script domains",
            "script urls",
            "search",
            "title",
            "date",
            "http traffic",
            "http get",
            "match info",
            "downloads",
            "info",
            "https http",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "get http",
            "dns resolutions",
            "number",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "corporation cus",
            "algorithm",
            "cnamazon rsa",
            "m03 oamazon",
            "thumbprint",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "ascii text",
            "ogoogle trust",
            "cngts ca",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "malware",
            "roboto",
            "android",
            "known exploited",
            "google",
            "salesloft drift",
            "sap s4hana",
            "cve202542957",
            "cisa",
            "sitecore",
            "linux",
            "france",
            "meta",
            "rokrat",
            "lizar",
            "project nemesis",
            "carbanak",
            "cobalt strike",
            "domino",
            "yara detections",
            "contacted",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious ids",
            "detections tls",
            "indicator role",
            "title added",
            "active related",
            "entries",
            "role title",
            "added active",
            "filehashmd5",
            "ipv4"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lizar",
              "display_name": "Lizar",
              "target": null
            },
            {
              "id": "Project Nemesis",
              "display_name": "Project Nemesis",
              "target": null
            },
            {
              "id": "Carbanak",
              "display_name": "Carbanak",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Domino",
              "display_name": "Domino",
              "target": null
            },
            {
              "id": "RokRAT",
              "display_name": "RokRAT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [
            "Hospitality",
            "Financial"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 539,
            "FileHash-SHA1": 389,
            "FileHash-SHA256": 3386,
            "domain": 862,
            "hostname": 1155,
            "URL": 4091,
            "CVE": 3,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 10430,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "195 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68bbdb22e3d606ae8fb5cda8",
          "name": "HCPF | Department of Health Care Policy and Financing",
          "description": "Project Nemesis - Affects Department of Health Care Policy and Financing | Family representative  repeatedly told past bills aren\u2019t being paid by United Healthcare. Argus Insurance (unknown entity) was Policy on record target never had. FR was given information regarding HCPF which was being viewed by past vendor seen in (https://otx.alienvault.com/pulse/68bbb31f6d91989d7fcd9592) |  Issues with HCPF have been an issue for some time in isolated scenarios. It\u2019s unclear how at least one person keeps getting their name, bills and life pulled into this. Target PURCHASED a Healthcare policy via agent before major social engineering attacks. Same entity literally robs targets. Gift cards, phone services, cloud storage, account, insurance policies, bank account access, tax refunds, paid claims reversed & taken from target\u2019s account.\nMore research needed. Flaws  in new system could jeopardize many. \n#trulymissed #rip #techbrohell #palantir",
          "modified": "2025-10-06T05:01:18.794000",
          "created": "2025-09-06T06:56:34.649000",
          "tags": [
            "federal changes",
            "health first",
            "colorado",
            "child health",
            "plan plus",
            "newimpact",
            "medicaidour",
            "impact",
            "medicaid page",
            "medicaid",
            "beware",
            "text/html",
            "trackers",
            "iframes",
            "external-resources",
            "new relic",
            "g1gv3h3sxc0",
            "utc gcw970gh4gg",
            "android",
            "known exploited",
            "google",
            "salesloft drift",
            "sap s4hana",
            "cve202542957",
            "cisa",
            "sitecore",
            "linux",
            "france",
            "meta",
            "rokrat",
            "lizar",
            "project nemesis",
            "carbanak",
            "cobalt strike",
            "domino",
            "no expiration",
            "url https",
            "type indicator",
            "role title",
            "related pulses",
            "hostname https",
            "m4e5930",
            "hostname",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "ascii text",
            "search",
            "ogoogle trust",
            "cngts ca",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "malware",
            "roboto",
            "present feb",
            "united",
            "a domains",
            "present dec",
            "passive dns",
            "moved",
            "script domains",
            "script urls",
            "urls",
            "title",
            "date",
            "resolved ips",
            "http traffic",
            "http get",
            "match info",
            "downloads",
            "info",
            "https http",
            "mitre att",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "endgame systems"
          ],
          "references": [
            "Researched: https://hcpf.colorado.gov/",
            "www.onyx-ware.com \u2022 https://www.endgamesystems.com/",
            "millet-usgc-1.palantirfedstart.com",
            "https://securityaffairs.com/109671/hacking/50000-home-cameras-hacked.html",
            "https://passwords.google/?utm_medium=hpp&utm_source=google&utm_campaign=sid2023aunonenms",
            "https://passwords.google/?utm_medium=hpp&utm",
            "https://securityaffairs.com/181338/security/google-fixed-chrome-flaw-found-by-big-sleep-ai.html",
            "Researched publicly available information provided by representative of a target\u2019s estate",
            "System has placed affected on multiple policies cancelling private policy without notice.",
            "Paid for plan long after entity put target on a state plan. Target audited for making too much money (framed)",
            "Provided documented evidence of appealed state issued plan and disclosed financials.",
            "Won appeal. Denied stimulus until passing another audit showing taxable income and filed taxes",
            "I hope this goes smoothly. I believe will be a nightmare as witnessed. I hope I\u2019m wrong.",
            "State (or random \u2022_- hackers) erased evidence of targets insurance all paid for by target.",
            "Target also owned an online brokerage & lead company, was agent & insurance marketer for years.",
            "September began with false information, defaulted claims , denials from authorized  services rendered years prior.",
            "If someone has Medicare it\u2019s wise to check with carrier & providers to see policies generated by AI"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lizar",
              "display_name": "Lizar",
              "target": null
            },
            {
              "id": "Project Nemesis",
              "display_name": "Project Nemesis",
              "target": null
            },
            {
              "id": "Carbanak",
              "display_name": "Carbanak",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "Domino",
              "display_name": "Domino",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [
            "Hospitality",
            "Financial",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1395,
            "URL": 4304,
            "CVE": 1,
            "domain": 694,
            "FileHash-SHA256": 1790,
            "FileHash-MD5": 183,
            "FileHash-SHA1": 103,
            "SSLCertFingerprint": 5
          },
          "indicator_count": 8475,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "195 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e94760a415fb970ab2dfdd",
          "name": "Pornhub Api connected to Targets phone via Remote Telegram  install",
          "description": "Cyber attack named 'Project Endgame' by threat actors ||  Cyber criminal IMMEDIATELY remotely accessed targets device when it was new from manufacturer. Remote installation of telegram app, installed pornhub. Dumping, making all types of pornography appear to come from targets and associated persons devices. It's never ending. || Win32:PWSX-gen\\ [Trj]\n#Lowfi:HSTR:Win32/Exprio\nALF:Trojan:BAT/EnvVarCharReplacement\nBackdoor:Win32/Tofsee\nTrojan:Win32/Azorult\nTrojan:Win32/Danabot\nTrojan:Win32/Eqtonex\nTrojan:Win32/Meredrop\nTrojanDownloader:Win32/Tofsee\nVirTool:Win32/Obfuscator\nWin.Dropper.Tofsee-10023347-0",
          "modified": "2024-10-17T08:04:26.924000",
          "created": "2024-09-17T09:09:52.842000",
          "tags": [
            "all scoreblue",
            "contacted",
            "telegram",
            "pornhub",
            "hostname",
            "domain",
            "iocs",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ck t1003",
            "os credential",
            "dumping t1005",
            "local system",
            "t1012",
            "registry t1018",
            "remote system",
            "discovery t1027",
            "files",
            "t1053",
            "whitelisted",
            "agent",
            "as13414 twitter",
            "as14061",
            "as15169 google",
            "as16552",
            "as16276",
            "as19679 dropbox",
            "as22612",
            "as25019",
            "as32934",
            "as35680",
            "as62597",
            "as54113",
            "as397241",
            "as397240",
            "nsone as63949",
            "as35819",
            "china unknown",
            "chrome",
            "code",
            "as16552 tiggee",
            "as2914 ntt",
            "as25019 saudi",
            "asnone hong",
            "as63949 linode",
            "as7303 telecom",
            "as8151",
            "as9318 sk",
            "asn as13414",
            "asn as48684",
            "cookie",
            "encrypt",
            "endgame",
            "emails",
            "cryp",
            "delphi",
            "dynamicloader",
            "dns",
            "grum",
            "germany unknown",
            "gmt max",
            "connection",
            "dns resolutions",
            "porn",
            "regsz",
            "langgeorgian",
            "sublangdefault",
            "rticon",
            "english",
            "regsetvalueexa",
            "regdword",
            "medium",
            "t1055",
            "win32",
            "malware",
            "copy",
            "updater",
            "generic",
            "delete c",
            "yara rule",
            "high",
            "search",
            "ms windows",
            "tofsee",
            "show",
            "windows",
            "russia as49505",
            "united",
            "grum",
            "write",
            "query",
            "contacted",
            "installs",
            "stream",
            "unknown",
            "as46606",
            "passive dns",
            "date",
            "scan endpoints",
            "pulse pulses",
            "urls",
            "as8151",
            "mexico unknown",
            "saudi arabia",
            "as25019 saudi",
            "china unknown",
            "as7303 telecom",
            "hungary unknown",
            "trojan",
            "msie",
            "body",
            "ransom",
            "icmp traffic",
            "pdb path",
            "filehash",
            "url http",
            "http",
            "address",
            "russia unknown",
            "privacy tools",
            "as396982 google",
            "as57416 llc",
            "div div",
            "span h3",
            "span div",
            "h3 p",
            "as24940 hetzner",
            "face",
            "delete",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "suspicious",
            "possible",
            "as56864 xeon",
            "ipv4",
            "pulse submit",
            "url analysis",
            "ip address",
            "location united",
            "next",
            "germany unknown",
            "method",
            "allowed server",
            "content length",
            "content type",
            "cookie",
            "registrar abuse",
            "explorer",
            "files matching",
            "homepage",
            "hungary unknown",
            "installs ip",
            "installs",
            "ip",
            "link",
            "mexico unknown",
            "pegasus",
            "operation endgame",
            "public key",
            "ransom",
            "twitter redirect",
            "Kong unknown",
            "script urls",
            "servers",
            "updater",
            "united kingdom unknown",
            "unique",
            "ukraine unknown",
            "trojan features",
            "trojan",
            "tofsee",
            "title telegram",
            "tags twitter",
            "twitter",
            "tags",
            "sublangdefault"
          ],
          "references": [
            "Pornhub.com | Telegram https://t.me/login/36861 | loopprojects.t.me",
            "Cookie : stel_ssid b86d14460f22d8fea8_13386273115952986987",
            "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "https://www.pornhub.com/video/search?search=tsara+brashears",
            "ads.pornhub.com | ams-v61.pornhub.com | api-stage.pornhub.com",
            "api-stage.pornhub.com | abtesting.pornhub.com | pornhub.com | cms-stage20.pornhub.com | imgs.pornhub.com | http://tourcdn.girlsdoporn.com",
            "girlsdoporn.com | bar.pornhub.com | bar.pornhub.com | cdn-d-vid-embed.pornhub.com | http://pornhub.tv/Jena6599 | whatsapp.pornhub.com",
            "https://sslproxy.gatewayclient3.v.hikops.com",
            "api2ip.ua \u00bb External IP Lookup Service Domain",
            "83610e8d2924c9886b25ad530e8ad971.pornhub.com",
            "Win32:PWSX-gen\\ [Trj] IDS Detections Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua) Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 HTTP Request to a *.top domain Dotted Quad Host ZIP Request Possible EXE Download From Suspicious TLD TLS Handshake Failure ... Less",
            "IDS Detections: Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua)",
            "IDS Detections: Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile",
            "IDS Detections: Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016",
            "Win32:RansomX-gen\\ [Ransom] Trojan:Win32/Neconyd.A"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Australia",
            "Brazil",
            "Singapore",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Malaysia",
            "Hong Kong",
            "Ireland",
            "Korea, Republic of",
            "France",
            "United Kingdom of Great Britain and Northern Ireland",
            "Argentina",
            "Austria",
            "China",
            "Canada",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "TrojanDownloader:Win32/Tofsee",
              "display_name": "TrojanDownloader:Win32/Tofsee",
              "target": "/malware/TrojanDownloader:Win32/Tofsee"
            },
            {
              "id": "Win32:PWSX-gen\\ [Trj]",
              "display_name": "Win32:PWSX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Dropper.Tofsee-10023347-0",
              "display_name": "Win.Dropper.Tofsee-10023347-0",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:Win32/Exprio",
              "display_name": "#Lowfi:HSTR:Win32/Exprio",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "Trojan:Win32/Meredrop",
              "display_name": "Trojan:Win32/Meredrop",
              "target": "/malware/Trojan:Win32/Meredrop"
            },
            {
              "id": "Trojan:Win32/Eqtonex",
              "display_name": "Trojan:Win32/Eqtonex",
              "target": "/malware/Trojan:Win32/Eqtonex"
            },
            {
              "id": "Trojan:Win32/Danabot",
              "display_name": "Trojan:Win32/Danabot",
              "target": "/malware/Trojan:Win32/Danabot"
            },
            {
              "id": "Trojan:Win32/Azorult",
              "display_name": "Trojan:Win32/Azorult",
              "target": "/malware/Trojan:Win32/Azorult"
            },
            {
              "id": "ALF:Trojan:BAT/EnvVarCharReplacement",
              "display_name": "ALF:Trojan:BAT/EnvVarCharReplacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1443",
              "name": "Remotely Install Application",
              "display_name": "T1443 - Remotely Install Application"
            },
            {
              "id": "T1478",
              "name": "Install Insecure or Malicious Configuration",
              "display_name": "T1478 - Install Insecure or Malicious Configuration"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1570,
            "FileHash-SHA1": 1301,
            "FileHash-SHA256": 3497,
            "URL": 3835,
            "domain": 1475,
            "hostname": 2405,
            "CIDR": 1,
            "email": 23
          },
          "indicator_count": 14107,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "549 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6656e6dbbe018a2dcb28a8e0",
          "name": "advancedstream.net - Acquired Apple iOS infrastructure, DNS,",
          "description": "Apple iOS service modifier.",
          "modified": "2024-06-28T08:01:11.978000",
          "created": "2024-05-29T08:27:07.009000",
          "tags": [
            "reverse dns",
            "location united",
            "america flag",
            "lakewood",
            "united",
            "america asn",
            "dns resolutions",
            "domain",
            "domain status",
            "server",
            "algorithm",
            "key usage",
            "xcitium verdict",
            "cloud",
            "popularity",
            "rank position",
            "info",
            "date",
            "registrar abuse",
            "iana id",
            "contact phone",
            "dnssec",
            "registrar url",
            "registrar whois",
            "llc registry",
            "expiry date",
            "first",
            "law firm",
            "fort wayne",
            "co",
            "referrer",
            "historical ssl",
            "name verdict",
            "falcon sandbox",
            "sha256",
            "ascii text",
            "sha1",
            "size",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "span",
            "hybrid",
            "body",
            "footer",
            "contact",
            "local",
            "encrypt",
            "click",
            "facebook",
            "strings",
            "meta",
            "district",
            "generator",
            "code",
            "service",
            "bill",
            "nemtih",
            "sredrum",
            "co lp",
            "dynamicloader",
            "default",
            "medium",
            "show",
            "http request",
            "http",
            "delete",
            "ids detections",
            "yara detections",
            "copy",
            "powershell",
            "win64",
            "write",
            "malware",
            "download",
            "malware",
            "trojan",
            "windows",
            "shellexecuteexw",
            "search",
            "entries",
            "writeconsolew",
            "registry",
            "t1031",
            "modify existing",
            "dock",
            "win32"
          ],
          "references": [
            "Reverse DNS: advancedstream.net Location: United States of America - Lakewood, Colorado United States of America",
            "ASN AS30170 isomedia inc. DNS Resolutions 1 Domain",
            "spamgateway.advancedstream.net",
            "smtpha.momentumtelecom.com",
            "cityoffortwayne.org | detect.cityoffortwayne.org | https://engage.cityoffortwayne.org/",
            "https://utilities.cityoffortwayne.org/wp-content/uploads/2023/05/2023-Biosolids-Info-Sheet.pdf",
            "podcast.hallco.org hmmm? Who could it be.",
            "IDS Detections: PE EXE or DLL Windows file download HTTP | SUSPICIOUS Dotted Quad Host MZ Response | Packed Executable Download",
            "IDS Detectionsa: Executable Download from dotted-quad Host | Terse alphanumeric executable downloader high likelihood of being hostile",
            "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users",
            "Alerts: network_ip_exe network_questionable_http_path suricata_alert",
            "Alerts: dynamic_function_loading powershell_download powershell_request network_cnc_http network_http",
            "Alerts: dead_connect antivm_network_adapters",
            "https://otx.alienvault.com/indicator/file/a909dd4960d4da51de82e4dfff0a5aa60e35da6b2845680716ad832dc1d8b010",
            "http://www.leechburg.k12.pa.us/cms/lib09/PA01916522/Centricity/Domain/4/Mr.%20Ritzel%20obituary.pdf",
            "https://ato.gov.au.69741db048f4bdd03a6dad409e702ab4.grantelgin.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!atmn",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:CoinminerX-gen\\ [Trj]",
              "display_name": "Win32:CoinminerX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Malware.Tofsee-6958935-0",
              "display_name": "Win.Malware.Tofsee-6958935-0",
              "target": null
            },
            {
              "id": "Trojan:Win32/SmokeLoader.YL",
              "display_name": "Trojan:Win32/SmokeLoader.YL",
              "target": "/malware/Trojan:Win32/SmokeLoader.YL"
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [
            "Civil Society",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 338,
            "FileHash-SHA1": 77,
            "email": 2,
            "hostname": 497,
            "URL": 928,
            "FileHash-SHA256": 572,
            "FileHash-MD5": 76,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 2496,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "660 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2f9169d6996c1c928ac0b",
          "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
          "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
          "modified": "2024-02-12T20:02:49.516000",
          "created": "2024-01-13T20:56:54.333000",
          "tags": [
            "default",
            "show",
            "regsetvalueexa",
            "search",
            "regdword",
            "medium",
            "settingswpad",
            "delete",
            "ids detections",
            "yara detections",
            "worm",
            "malware",
            "copy",
            "write",
            "win32",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "graph community",
            "productidis",
            "urls",
            "mb iesettings",
            "related file",
            "cybersecurity",
            "agency",
            "csc corporate",
            "domains",
            "tucows domains",
            "nameweb bvba",
            "tucows",
            "google",
            "amazon02",
            "twitter",
            "ovh sas",
            "facebook",
            "incapsula",
            "optimizer",
            "activator",
            "kb program",
            "mb super",
            "kb acrotray",
            "1tzv",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "checks_debugger",
            "network_icmp",
            "network_smtp",
            "persistence_autorun",
            "modifies_proxy_wpad",
            "antivm_queries_computername",
            "dumped_buffer",
            "network_http",
            "antivm_network_adapters",
            "smtp_gmail",
            "attacking",
            "browser",
            "object",
            "deleted",
            "deleting",
            "deleted virustotal graphs",
            "corruption",
            "legal",
            "gvt",
            "adams co",
            "colorado",
            "law",
            "illegal practices",
            "hacking",
            "enter rexxfield",
            "roberts",
            "smith",
            "script urls",
            "as20940",
            "united",
            "a domains",
            "certificate",
            "showing",
            "entries",
            "entrust",
            "scan endpoints",
            "district",
            "as16625 akamai",
            "aaaa",
            "passive dns",
            "united kingdom",
            "whitelisted",
            "modification",
            "silence",
            "state",
            "hostname",
            "samples",
            "cover up",
            "silencing",
            "Iowa.gov",
            "dga",
            "fcc",
            "unsigned",
            "remote",
            "wiper",
            "nosy pega",
            "trojan",
            "unknown",
            "access denied",
            "servers",
            "creation date",
            "date",
            "next",
            "apple",
            "ssl certificate",
            "threat roundup",
            "march",
            "october",
            "july",
            "april",
            "whois record",
            "june",
            "roundup",
            "september",
            "august",
            "plugx",
            "goldfinder",
            "sibot",
            "hacktool",
            "february",
            "regsz",
            "english",
            "nsisinetc",
            "mozilla",
            "adobe air",
            "java",
            "http",
            "post http",
            "updater",
            "meta",
            "suspicious",
            "persistence",
            "execution",
            "referrer",
            "communicating",
            "skynet",
            "malicious",
            "gen.o",
            "dynamicloader",
            "cape",
            "enosch malware",
            "enosch",
            "music",
            "contacted",
            "pe resource",
            "resolutions",
            "siblings",
            "urls http"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
            "https://www.google.com/?authuser=0",
            "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
            "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
            "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
            "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
            "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
            "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
            "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
            "Domains Contacted: smtp.gmail.com www.google.com",
            "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
            "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
            "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
            "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Netherlands",
            "Spain",
            "Australia",
            "Korea, Republic of",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Nullsoft_NSIS",
              "display_name": "Nullsoft_NSIS",
              "target": null
            },
            {
              "id": "Win32:Agent-ASTI\\ [Trj]",
              "display_name": "Win32:Agent-ASTI\\ [Trj]",
              "target": null
            },
            {
              "id": "Worm:Win32/Enosch!atmn",
              "display_name": "Worm:Win32/Enosch!atmn",
              "target": "/malware/Worm:Win32/Enosch!atmn"
            },
            {
              "id": "Win.Trojan.Agent-357800",
              "display_name": "Win.Trojan.Agent-357800",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 1512,
            "FileHash-SHA256": 5351,
            "SSLCertFingerprint": 1,
            "URL": 1774,
            "email": 7,
            "hostname": 1170,
            "domain": 1209
          },
          "indicator_count": 13725,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a2f9200337f0d1fa195ada",
          "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
          "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
          "modified": "2024-02-12T20:02:49.516000",
          "created": "2024-01-13T20:57:04.197000",
          "tags": [
            "default",
            "show",
            "regsetvalueexa",
            "search",
            "regdword",
            "medium",
            "settingswpad",
            "delete",
            "ids detections",
            "yara detections",
            "worm",
            "malware",
            "copy",
            "write",
            "win32",
            "first",
            "utc submissions",
            "submitters",
            "cloudflarenet",
            "summary iocs",
            "graph community",
            "productidis",
            "urls",
            "mb iesettings",
            "related file",
            "cybersecurity",
            "agency",
            "csc corporate",
            "domains",
            "tucows domains",
            "nameweb bvba",
            "tucows",
            "google",
            "amazon02",
            "twitter",
            "ovh sas",
            "facebook",
            "incapsula",
            "optimizer",
            "activator",
            "kb program",
            "mb super",
            "kb acrotray",
            "1tzv",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "checks_debugger",
            "network_icmp",
            "network_smtp",
            "persistence_autorun",
            "modifies_proxy_wpad",
            "antivm_queries_computername",
            "dumped_buffer",
            "network_http",
            "antivm_network_adapters",
            "smtp_gmail",
            "attacking",
            "browser",
            "object",
            "deleted",
            "deleting",
            "deleted virustotal graphs",
            "corruption",
            "legal",
            "gvt",
            "adams co",
            "colorado",
            "law",
            "illegal practices",
            "hacking",
            "enter rexxfield",
            "roberts",
            "smith",
            "script urls",
            "as20940",
            "united",
            "a domains",
            "certificate",
            "showing",
            "entries",
            "entrust",
            "scan endpoints",
            "district",
            "as16625 akamai",
            "aaaa",
            "passive dns",
            "united kingdom",
            "whitelisted",
            "modification",
            "silence",
            "state",
            "hostname",
            "samples",
            "cover up",
            "silencing",
            "Iowa.gov",
            "dga",
            "fcc",
            "unsigned",
            "remote",
            "wiper",
            "nosy pega",
            "trojan",
            "unknown",
            "access denied",
            "servers",
            "creation date",
            "date",
            "next",
            "apple",
            "ssl certificate",
            "threat roundup",
            "march",
            "october",
            "july",
            "april",
            "whois record",
            "june",
            "roundup",
            "september",
            "august",
            "plugx",
            "goldfinder",
            "sibot",
            "hacktool",
            "february",
            "regsz",
            "english",
            "nsisinetc",
            "mozilla",
            "adobe air",
            "java",
            "http",
            "post http",
            "updater",
            "meta",
            "suspicious",
            "persistence",
            "execution",
            "referrer",
            "communicating",
            "skynet",
            "malicious",
            "gen.o",
            "dynamicloader",
            "cape",
            "enosch malware",
            "enosch",
            "music",
            "contacted",
            "pe resource",
            "resolutions",
            "siblings",
            "urls http"
          ],
          "references": [
            "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
            "https://www.google.com/?authuser=0",
            "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
            "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
            "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
            "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
            "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
            "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
            "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
            "Domains Contacted: smtp.gmail.com www.google.com",
            "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
            "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
            "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
            "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Belgium",
            "Netherlands",
            "Spain",
            "Australia",
            "Korea, Republic of",
            "Hong Kong"
          ],
          "malware_families": [
            {
              "id": "Nullsoft_NSIS",
              "display_name": "Nullsoft_NSIS",
              "target": null
            },
            {
              "id": "Win32:Agent-ASTI\\ [Trj]",
              "display_name": "Win32:Agent-ASTI\\ [Trj]",
              "target": null
            },
            {
              "id": "Worm:Win32/Enosch!atmn",
              "display_name": "Worm:Win32/Enosch!atmn",
              "target": "/malware/Worm:Win32/Enosch!atmn"
            },
            {
              "id": "Win.Trojan.Agent-357800",
              "display_name": "Win.Trojan.Agent-357800",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2701,
            "FileHash-SHA1": 1512,
            "FileHash-SHA256": 5351,
            "SSLCertFingerprint": 1,
            "URL": 1774,
            "email": 7,
            "hostname": 1170,
            "domain": 1209
          },
          "indicator_count": 13725,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "797 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "Researched: https://hcpf.colorado.gov/",
        "September began with false information, defaulted claims , denials from authorized  services rendered years prior.",
        "cityoffortwayne.org | detect.cityoffortwayne.org | https://engage.cityoffortwayne.org/",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "83610e8d2924c9886b25ad530e8ad971.pornhub.com",
        "IDS Detections: PE EXE or DLL Windows file download HTTP | SUSPICIOUS Dotted Quad Host MZ Response | Packed Executable Download",
        "https://securityaffairs.com/181338/security/google-fixed-chrome-flaw-found-by-big-sleep-ai.html",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "Target also owned an online brokerage & lead company, was agent & insurance marketer for years.",
        "https://ato.gov.au.69741db048f4bdd03a6dad409e702ab4.grantelgin.com/",
        "State (or random \u2022_- hackers) erased evidence of targets insurance all paid for by target.",
        "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a",
        "Provided documented evidence of appealed state issued plan and disclosed financials.",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "api-stage.pornhub.com | abtesting.pornhub.com | pornhub.com | cms-stage20.pornhub.com | imgs.pornhub.com | http://tourcdn.girlsdoporn.com",
        "https://www.google.com/?authuser=0",
        "spamgateway.advancedstream.net",
        "millet-usgc-1.palantirfedstart.com",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "IDS Detections: Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua)",
        "https://www.filescan.io/uploads/6775f8d1108e6fdea94ba637/reports/ba88f2c2-96e9-4106-9b93-4f7fa7f1519a/overview",
        "api2ip.ua \u00bb External IP Lookup Service Domain",
        "IDS Detections: Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "Alerts: dynamic_function_loading powershell_download powershell_request network_cnc_http network_http",
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "ASN AS30170 isomedia inc. DNS Resolutions 1 Domain",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "Alerts: network_ip_exe network_questionable_http_path suricata_alert",
        "IDS Detectionsa: Executable Download from dotted-quad Host | Terse alphanumeric executable downloader high likelihood of being hostile",
        "https://urlquery.net/report/54993e5a-9b3f-4eef-a219-6ed529b4ea66",
        "https://passwords.google/?utm_medium=hpp&utm_source=google&utm_campaign=sid2023aunonenms",
        "ads.pornhub.com | ams-v61.pornhub.com | api-stage.pornhub.com",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "https://www.virustotal.com/graph/embed/g69422d071856425cb7ef01a90232cae9aef9af2362ad45db8fc83caabe618606?theme=dark",
        "Won appeal. Denied stimulus until passing another audit showing taxable income and filed taxes",
        "www.onyx-ware.com \u2022 https://www.endgamesystems.com/",
        "Reverse DNS: advancedstream.net Location: United States of America - Lakewood, Colorado United States of America",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "https://otx.alienvault.com/indicator/file/a909dd4960d4da51de82e4dfff0a5aa60e35da6b2845680716ad832dc1d8b010",
        "System has placed affected on multiple policies cancelling private policy without notice.",
        "IDS Detections: Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016",
        "https://malpedia.caad.fkie.fraunhofer.de/details/win.tofsee",
        "smtpha.momentumtelecom.com",
        "I hope this goes smoothly. I believe will be a nightmare as witnessed. I hope I\u2019m wrong.",
        "https://sslproxy.gatewayclient3.v.hikops.com",
        "Win32:PWSX-gen\\ [Trj] IDS Detections Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua) Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 HTTP Request to a *.top domain Dotted Quad Host ZIP Request Possible EXE Download From Suspicious TLD TLS Handshake Failure ... Less",
        "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13",
        "https://viz.greynoise.io/analysis/ade7d4f8-0bf7-4582-9a91-f7b26c0bb9f7",
        "Win32:RansomX-gen\\ [Ransom] Trojan:Win32/Neconyd.A",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "girlsdoporn.com | bar.pornhub.com | bar.pornhub.com | cdn-d-vid-embed.pornhub.com | http://pornhub.tv/Jena6599 | whatsapp.pornhub.com",
        "Cookie : stel_ssid b86d14460f22d8fea8_13386273115952986987",
        "podcast.hallco.org hmmm? Who could it be.",
        "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a/67e0baae85aff10b880edd20",
        "Researched publicly available information provided by representative of a target\u2019s estate",
        "https://securityaffairs.com/109671/hacking/50000-home-cameras-hacked.html",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "https://www.virustotal.com/gui/collection/malpedia_win_tofsee/summary",
        "Pornhub.com | Telegram https://t.me/login/36861 | loopprojects.t.me",
        "https://utilities.cityoffortwayne.org/wp-content/uploads/2023/05/2023-Biosolids-Info-Sheet.pdf",
        "Alerts: dead_connect antivm_network_adapters",
        "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13/iocs",
        "http://www.leechburg.k12.pa.us/cms/lib09/PA01916522/Centricity/Domain/4/Mr.%20Ritzel%20obituary.pdf",
        "If someone has Medicare it\u2019s wise to check with carrier & providers to see policies generated by AI",
        "https://passwords.google/?utm_medium=hpp&utm",
        "Paid for plan long after entity put target on a state plan. Target audited for making too much money (framed)",
        "https://rcmp[.]ca/en/alberta"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojan:win32/azorult",
            "Project nemesis",
            "Win32:agent-asti\\ [trj]",
            "Backdoor:win32/tofsee",
            "Virtool:win32/obfuscator",
            "Trojandownloader:win32/tofsee",
            "Alf:trojan:bat/envvarcharreplacement",
            "Win32:coinminerx-gen\\ [trj]",
            "Win.malware.tofsee-6958935-0",
            "Worm:win32/enosch!atmn",
            "Nullsoft_nsis",
            "Lizar",
            "Win.dropper.tofsee-10023347-0",
            "Trojan:win32/meredrop",
            "Win.trojan.agent-357800",
            "Win32:pwsx-gen\\ [trj]",
            "#lowfi:hstr:win32/exprio",
            "Domino",
            "Trojan:win32/smokeloader.yl",
            "Trojan:win32/eqtonex",
            "Win32:malware-gen",
            "Carbanak",
            "Alf:jasyp:trojandownloader:win32/smallagent!atmn",
            "Trojan:win32/danabot",
            "Rokrat",
            "Cobalt strike"
          ],
          "industries": [
            "",
            "Education",
            "Telecommunications",
            "Healthcare",
            "Financial",
            "Government",
            "Hospitality",
            "Civil society",
            "Technology"
          ],
          "unique_indicators": 48937
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/rdfs.org",
    "whois": "http://whois.domaintools.com/rdfs.org",
    "domain": "rdfs.org",
    "hostname": "schema.rdfs.org"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "6709ad372568d7810af2e480",
      "name": "https://rcmp[.]ca/en/alberta // rcmp[.]ca // rcmp-grc[.]gc[.]ca - 12.06.25",
      "description": "Alberta RCMP\nhttps://rcmp[.]ca/en/alberta // rcmp[.]ca // rcmp-grc[.]gc[.]ca",
      "modified": "2026-01-05T22:04:46.025000",
      "created": "2024-10-11T22:56:55.968000",
      "tags": [
        "entity",
        "RCMP",
        "Alberta",
        "EPS",
        "Edmonton Police Services",
        "RCMP AB",
        "CrimeStoppers AB"
      ],
      "references": [
        "https://www.virustotal.com/graph/embed/g69422d071856425cb7ef01a90232cae9aef9af2362ad45db8fc83caabe618606?theme=dark",
        "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13/iocs",
        "https://urlquery.net/report/54993e5a-9b3f-4eef-a219-6ed529b4ea66",
        "https://www.filescan.io/uploads/6775f8d1108e6fdea94ba637/reports/ba88f2c2-96e9-4106-9b93-4f7fa7f1519a/overview",
        "https://malpedia.caad.fkie.fraunhofer.de/details/win.tofsee",
        "https://www.virustotal.com/gui/collection/malpedia_win_tofsee/summary",
        "https://viz.greynoise.io/analysis/ade7d4f8-0bf7-4582-9a91-f7b26c0bb9f7",
        "",
        "https://rcmp[.]ca/en/alberta",
        "https://www.virustotal.com/gui/collection/22cbfd4f1a868301f4f66c5914ab66d63695118f829e90ede0c8450876d4dd13",
        "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a/67e0baae85aff10b880edd20",
        "https://www.hybrid-analysis.com/sample/32fee8f77b43f62e89c2156fd15a6fa350beff81429a6bc7984c0e54fe608f2a"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "",
        "Government",
        "Telecommunications",
        "Education",
        "Technology",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 21,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 4,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 764,
        "FileHash-SHA1": 760,
        "FileHash-SHA256": 4062,
        "domain": 378,
        "hostname": 1808,
        "URL": 886,
        "SSLCertFingerprint": 18,
        "email": 10,
        "CVE": 1
      },
      "indicator_count": 8687,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 135,
      "modified_text": "103 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68bbf3e40e3ce8a74aa89545",
      "name": "HCPF \u2022 The intricate relationships between the FIN7 group and members of the Conti gang",
      "description": "",
      "modified": "2025-10-06T08:03:23.285000",
      "created": "2025-09-06T08:42:12.787000",
      "tags": [
        "present feb",
        "united",
        "a domains",
        "present dec",
        "passive dns",
        "moved",
        "script domains",
        "script urls",
        "search",
        "title",
        "date",
        "http traffic",
        "http get",
        "match info",
        "downloads",
        "info",
        "https http",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "get http",
        "dns resolutions",
        "number",
        "azure rsa",
        "tls issuing",
        "cus subject",
        "stwa lredmond",
        "corporation cus",
        "algorithm",
        "cnamazon rsa",
        "m03 oamazon",
        "thumbprint",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "ascii text",
        "ogoogle trust",
        "cngts ca",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "malware",
        "roboto",
        "android",
        "known exploited",
        "google",
        "salesloft drift",
        "sap s4hana",
        "cve202542957",
        "cisa",
        "sitecore",
        "linux",
        "france",
        "meta",
        "rokrat",
        "lizar",
        "project nemesis",
        "carbanak",
        "cobalt strike",
        "domino",
        "yara detections",
        "contacted",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious ids",
        "detections tls",
        "indicator role",
        "title added",
        "active related",
        "entries",
        "role title",
        "added active",
        "filehashmd5",
        "ipv4"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lizar",
          "display_name": "Lizar",
          "target": null
        },
        {
          "id": "Project Nemesis",
          "display_name": "Project Nemesis",
          "target": null
        },
        {
          "id": "Carbanak",
          "display_name": "Carbanak",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Domino",
          "display_name": "Domino",
          "target": null
        },
        {
          "id": "RokRAT",
          "display_name": "RokRAT",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [
        "Hospitality",
        "Financial"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 539,
        "FileHash-SHA1": 389,
        "FileHash-SHA256": 3386,
        "domain": 862,
        "hostname": 1155,
        "URL": 4091,
        "CVE": 3,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 10430,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "195 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68bbdb22e3d606ae8fb5cda8",
      "name": "HCPF | Department of Health Care Policy and Financing",
      "description": "Project Nemesis - Affects Department of Health Care Policy and Financing | Family representative  repeatedly told past bills aren\u2019t being paid by United Healthcare. Argus Insurance (unknown entity) was Policy on record target never had. FR was given information regarding HCPF which was being viewed by past vendor seen in (https://otx.alienvault.com/pulse/68bbb31f6d91989d7fcd9592) |  Issues with HCPF have been an issue for some time in isolated scenarios. It\u2019s unclear how at least one person keeps getting their name, bills and life pulled into this. Target PURCHASED a Healthcare policy via agent before major social engineering attacks. Same entity literally robs targets. Gift cards, phone services, cloud storage, account, insurance policies, bank account access, tax refunds, paid claims reversed & taken from target\u2019s account.\nMore research needed. Flaws  in new system could jeopardize many. \n#trulymissed #rip #techbrohell #palantir",
      "modified": "2025-10-06T05:01:18.794000",
      "created": "2025-09-06T06:56:34.649000",
      "tags": [
        "federal changes",
        "health first",
        "colorado",
        "child health",
        "plan plus",
        "newimpact",
        "medicaidour",
        "impact",
        "medicaid page",
        "medicaid",
        "beware",
        "text/html",
        "trackers",
        "iframes",
        "external-resources",
        "new relic",
        "g1gv3h3sxc0",
        "utc gcw970gh4gg",
        "android",
        "known exploited",
        "google",
        "salesloft drift",
        "sap s4hana",
        "cve202542957",
        "cisa",
        "sitecore",
        "linux",
        "france",
        "meta",
        "rokrat",
        "lizar",
        "project nemesis",
        "carbanak",
        "cobalt strike",
        "domino",
        "no expiration",
        "url https",
        "type indicator",
        "role title",
        "related pulses",
        "hostname https",
        "m4e5930",
        "hostname",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "ascii text",
        "search",
        "ogoogle trust",
        "cngts ca",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "malware",
        "roboto",
        "present feb",
        "united",
        "a domains",
        "present dec",
        "passive dns",
        "moved",
        "script domains",
        "script urls",
        "urls",
        "title",
        "date",
        "resolved ips",
        "http traffic",
        "http get",
        "match info",
        "downloads",
        "info",
        "https http",
        "mitre att",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "endgame systems"
      ],
      "references": [
        "Researched: https://hcpf.colorado.gov/",
        "www.onyx-ware.com \u2022 https://www.endgamesystems.com/",
        "millet-usgc-1.palantirfedstart.com",
        "https://securityaffairs.com/109671/hacking/50000-home-cameras-hacked.html",
        "https://passwords.google/?utm_medium=hpp&utm_source=google&utm_campaign=sid2023aunonenms",
        "https://passwords.google/?utm_medium=hpp&utm",
        "https://securityaffairs.com/181338/security/google-fixed-chrome-flaw-found-by-big-sleep-ai.html",
        "Researched publicly available information provided by representative of a target\u2019s estate",
        "System has placed affected on multiple policies cancelling private policy without notice.",
        "Paid for plan long after entity put target on a state plan. Target audited for making too much money (framed)",
        "Provided documented evidence of appealed state issued plan and disclosed financials.",
        "Won appeal. Denied stimulus until passing another audit showing taxable income and filed taxes",
        "I hope this goes smoothly. I believe will be a nightmare as witnessed. I hope I\u2019m wrong.",
        "State (or random \u2022_- hackers) erased evidence of targets insurance all paid for by target.",
        "Target also owned an online brokerage & lead company, was agent & insurance marketer for years.",
        "September began with false information, defaulted claims , denials from authorized  services rendered years prior.",
        "If someone has Medicare it\u2019s wise to check with carrier & providers to see policies generated by AI"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lizar",
          "display_name": "Lizar",
          "target": null
        },
        {
          "id": "Project Nemesis",
          "display_name": "Project Nemesis",
          "target": null
        },
        {
          "id": "Carbanak",
          "display_name": "Carbanak",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "Domino",
          "display_name": "Domino",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        }
      ],
      "industries": [
        "Hospitality",
        "Financial",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 26,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1395,
        "URL": 4304,
        "CVE": 1,
        "domain": 694,
        "FileHash-SHA256": 1790,
        "FileHash-MD5": 183,
        "FileHash-SHA1": 103,
        "SSLCertFingerprint": 5
      },
      "indicator_count": 8475,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "195 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66e94760a415fb970ab2dfdd",
      "name": "Pornhub Api connected to Targets phone via Remote Telegram  install",
      "description": "Cyber attack named 'Project Endgame' by threat actors ||  Cyber criminal IMMEDIATELY remotely accessed targets device when it was new from manufacturer. Remote installation of telegram app, installed pornhub. Dumping, making all types of pornography appear to come from targets and associated persons devices. It's never ending. || Win32:PWSX-gen\\ [Trj]\n#Lowfi:HSTR:Win32/Exprio\nALF:Trojan:BAT/EnvVarCharReplacement\nBackdoor:Win32/Tofsee\nTrojan:Win32/Azorult\nTrojan:Win32/Danabot\nTrojan:Win32/Eqtonex\nTrojan:Win32/Meredrop\nTrojanDownloader:Win32/Tofsee\nVirTool:Win32/Obfuscator\nWin.Dropper.Tofsee-10023347-0",
      "modified": "2024-10-17T08:04:26.924000",
      "created": "2024-09-17T09:09:52.842000",
      "tags": [
        "all scoreblue",
        "contacted",
        "telegram",
        "pornhub",
        "hostname",
        "domain",
        "iocs",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ck t1003",
        "os credential",
        "dumping t1005",
        "local system",
        "t1012",
        "registry t1018",
        "remote system",
        "discovery t1027",
        "files",
        "t1053",
        "whitelisted",
        "agent",
        "as13414 twitter",
        "as14061",
        "as15169 google",
        "as16552",
        "as16276",
        "as19679 dropbox",
        "as22612",
        "as25019",
        "as32934",
        "as35680",
        "as62597",
        "as54113",
        "as397241",
        "as397240",
        "nsone as63949",
        "as35819",
        "china unknown",
        "chrome",
        "code",
        "as16552 tiggee",
        "as2914 ntt",
        "as25019 saudi",
        "asnone hong",
        "as63949 linode",
        "as7303 telecom",
        "as8151",
        "as9318 sk",
        "asn as13414",
        "asn as48684",
        "cookie",
        "encrypt",
        "endgame",
        "emails",
        "cryp",
        "delphi",
        "dynamicloader",
        "dns",
        "grum",
        "germany unknown",
        "gmt max",
        "connection",
        "dns resolutions",
        "porn",
        "regsz",
        "langgeorgian",
        "sublangdefault",
        "rticon",
        "english",
        "regsetvalueexa",
        "regdword",
        "medium",
        "t1055",
        "win32",
        "malware",
        "copy",
        "updater",
        "generic",
        "delete c",
        "yara rule",
        "high",
        "search",
        "ms windows",
        "tofsee",
        "show",
        "windows",
        "russia as49505",
        "united",
        "grum",
        "write",
        "query",
        "contacted",
        "installs",
        "stream",
        "unknown",
        "as46606",
        "passive dns",
        "date",
        "scan endpoints",
        "pulse pulses",
        "urls",
        "as8151",
        "mexico unknown",
        "saudi arabia",
        "as25019 saudi",
        "china unknown",
        "as7303 telecom",
        "hungary unknown",
        "trojan",
        "msie",
        "body",
        "ransom",
        "icmp traffic",
        "pdb path",
        "filehash",
        "url http",
        "http",
        "address",
        "russia unknown",
        "privacy tools",
        "as396982 google",
        "as57416 llc",
        "div div",
        "span h3",
        "span div",
        "h3 p",
        "as24940 hetzner",
        "face",
        "delete",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "pe32",
        "suspicious",
        "possible",
        "as56864 xeon",
        "ipv4",
        "pulse submit",
        "url analysis",
        "ip address",
        "location united",
        "next",
        "germany unknown",
        "method",
        "allowed server",
        "content length",
        "content type",
        "cookie",
        "registrar abuse",
        "explorer",
        "files matching",
        "homepage",
        "hungary unknown",
        "installs ip",
        "installs",
        "ip",
        "link",
        "mexico unknown",
        "pegasus",
        "operation endgame",
        "public key",
        "ransom",
        "twitter redirect",
        "Kong unknown",
        "script urls",
        "servers",
        "updater",
        "united kingdom unknown",
        "unique",
        "ukraine unknown",
        "trojan features",
        "trojan",
        "tofsee",
        "title telegram",
        "tags twitter",
        "twitter",
        "tags",
        "sublangdefault"
      ],
      "references": [
        "Pornhub.com | Telegram https://t.me/login/36861 | loopprojects.t.me",
        "Cookie : stel_ssid b86d14460f22d8fea8_13386273115952986987",
        "www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "https://www.pornhub.com/video/search?search=tsara+brashears",
        "ads.pornhub.com | ams-v61.pornhub.com | api-stage.pornhub.com",
        "api-stage.pornhub.com | abtesting.pornhub.com | pornhub.com | cms-stage20.pornhub.com | imgs.pornhub.com | http://tourcdn.girlsdoporn.com",
        "girlsdoporn.com | bar.pornhub.com | bar.pornhub.com | cdn-d-vid-embed.pornhub.com | http://pornhub.tv/Jena6599 | whatsapp.pornhub.com",
        "https://sslproxy.gatewayclient3.v.hikops.com",
        "api2ip.ua \u00bb External IP Lookup Service Domain",
        "83610e8d2924c9886b25ad530e8ad971.pornhub.com",
        "Win32:PWSX-gen\\ [Trj] IDS Detections Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua) Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 HTTP Request to a *.top domain Dotted Quad Host ZIP Request Possible EXE Download From Suspicious TLD TLS Handshake Failure ... Less",
        "IDS Detections: Potential Dridex.Maldoc Minimal Executable Request External IP Address Lookup DNS Query (2ip .ua)",
        "IDS Detections: Observed External IP Lookup Domain (api .2ip .ua in TLS SNI) Query to a *.top domain - Likely Hostile",
        "IDS Detections: Suspicious User Agent (Microsoft Internet Explorer) SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016",
        "Win32:RansomX-gen\\ [Ransom] Trojan:Win32/Neconyd.A"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Australia",
        "Brazil",
        "Singapore",
        "Netherlands",
        "Russian Federation",
        "Japan",
        "Malaysia",
        "Hong Kong",
        "Ireland",
        "Korea, Republic of",
        "France",
        "United Kingdom of Great Britain and Northern Ireland",
        "Argentina",
        "Austria",
        "China",
        "Canada",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Tofsee",
          "display_name": "Backdoor:Win32/Tofsee",
          "target": "/malware/Backdoor:Win32/Tofsee"
        },
        {
          "id": "TrojanDownloader:Win32/Tofsee",
          "display_name": "TrojanDownloader:Win32/Tofsee",
          "target": "/malware/TrojanDownloader:Win32/Tofsee"
        },
        {
          "id": "Win32:PWSX-gen\\ [Trj]",
          "display_name": "Win32:PWSX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Dropper.Tofsee-10023347-0",
          "display_name": "Win.Dropper.Tofsee-10023347-0",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:Win32/Exprio",
          "display_name": "#Lowfi:HSTR:Win32/Exprio",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "Trojan:Win32/Meredrop",
          "display_name": "Trojan:Win32/Meredrop",
          "target": "/malware/Trojan:Win32/Meredrop"
        },
        {
          "id": "Trojan:Win32/Eqtonex",
          "display_name": "Trojan:Win32/Eqtonex",
          "target": "/malware/Trojan:Win32/Eqtonex"
        },
        {
          "id": "Trojan:Win32/Danabot",
          "display_name": "Trojan:Win32/Danabot",
          "target": "/malware/Trojan:Win32/Danabot"
        },
        {
          "id": "Trojan:Win32/Azorult",
          "display_name": "Trojan:Win32/Azorult",
          "target": "/malware/Trojan:Win32/Azorult"
        },
        {
          "id": "ALF:Trojan:BAT/EnvVarCharReplacement",
          "display_name": "ALF:Trojan:BAT/EnvVarCharReplacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1443",
          "name": "Remotely Install Application",
          "display_name": "T1443 - Remotely Install Application"
        },
        {
          "id": "T1478",
          "name": "Install Insecure or Malicious Configuration",
          "display_name": "T1478 - Install Insecure or Malicious Configuration"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1570,
        "FileHash-SHA1": 1301,
        "FileHash-SHA256": 3497,
        "URL": 3835,
        "domain": 1475,
        "hostname": 2405,
        "CIDR": 1,
        "email": 23
      },
      "indicator_count": 14107,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "549 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6656e6dbbe018a2dcb28a8e0",
      "name": "advancedstream.net - Acquired Apple iOS infrastructure, DNS,",
      "description": "Apple iOS service modifier.",
      "modified": "2024-06-28T08:01:11.978000",
      "created": "2024-05-29T08:27:07.009000",
      "tags": [
        "reverse dns",
        "location united",
        "america flag",
        "lakewood",
        "united",
        "america asn",
        "dns resolutions",
        "domain",
        "domain status",
        "server",
        "algorithm",
        "key usage",
        "xcitium verdict",
        "cloud",
        "popularity",
        "rank position",
        "info",
        "date",
        "registrar abuse",
        "iana id",
        "contact phone",
        "dnssec",
        "registrar url",
        "registrar whois",
        "llc registry",
        "expiry date",
        "first",
        "law firm",
        "fort wayne",
        "co",
        "referrer",
        "historical ssl",
        "name verdict",
        "falcon sandbox",
        "sha256",
        "ascii text",
        "sha1",
        "size",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "span",
        "hybrid",
        "body",
        "footer",
        "contact",
        "local",
        "encrypt",
        "click",
        "facebook",
        "strings",
        "meta",
        "district",
        "generator",
        "code",
        "service",
        "bill",
        "nemtih",
        "sredrum",
        "co lp",
        "dynamicloader",
        "default",
        "medium",
        "show",
        "http request",
        "http",
        "delete",
        "ids detections",
        "yara detections",
        "copy",
        "powershell",
        "win64",
        "write",
        "malware",
        "download",
        "malware",
        "trojan",
        "windows",
        "shellexecuteexw",
        "search",
        "entries",
        "writeconsolew",
        "registry",
        "t1031",
        "modify existing",
        "dock",
        "win32"
      ],
      "references": [
        "Reverse DNS: advancedstream.net Location: United States of America - Lakewood, Colorado United States of America",
        "ASN AS30170 isomedia inc. DNS Resolutions 1 Domain",
        "spamgateway.advancedstream.net",
        "smtpha.momentumtelecom.com",
        "cityoffortwayne.org | detect.cityoffortwayne.org | https://engage.cityoffortwayne.org/",
        "https://utilities.cityoffortwayne.org/wp-content/uploads/2023/05/2023-Biosolids-Info-Sheet.pdf",
        "podcast.hallco.org hmmm? Who could it be.",
        "IDS Detections: PE EXE or DLL Windows file download HTTP | SUSPICIOUS Dotted Quad Host MZ Response | Packed Executable Download",
        "IDS Detectionsa: Executable Download from dotted-quad Host | Terse alphanumeric executable downloader high likelihood of being hostile",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users",
        "Alerts: network_ip_exe network_questionable_http_path suricata_alert",
        "Alerts: dynamic_function_loading powershell_download powershell_request network_cnc_http network_http",
        "Alerts: dead_connect antivm_network_adapters",
        "https://otx.alienvault.com/indicator/file/a909dd4960d4da51de82e4dfff0a5aa60e35da6b2845680716ad832dc1d8b010",
        "http://www.leechburg.k12.pa.us/cms/lib09/PA01916522/Centricity/Domain/4/Mr.%20Ritzel%20obituary.pdf",
        "https://ato.gov.au.69741db048f4bdd03a6dad409e702ab4.grantelgin.com/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!atmn",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!atmn",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "Win32:CoinminerX-gen\\ [Trj]",
          "display_name": "Win32:CoinminerX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Malware.Tofsee-6958935-0",
          "display_name": "Win.Malware.Tofsee-6958935-0",
          "target": null
        },
        {
          "id": "Trojan:Win32/SmokeLoader.YL",
          "display_name": "Trojan:Win32/SmokeLoader.YL",
          "target": "/malware/Trojan:Win32/SmokeLoader.YL"
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [
        "Civil Society",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 338,
        "FileHash-SHA1": 77,
        "email": 2,
        "hostname": 497,
        "URL": 928,
        "FileHash-SHA256": 572,
        "FileHash-MD5": 76,
        "SSLCertFingerprint": 6
      },
      "indicator_count": 2496,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "660 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a2f9169d6996c1c928ac0b",
      "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
      "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
      "modified": "2024-02-12T20:02:49.516000",
      "created": "2024-01-13T20:56:54.333000",
      "tags": [
        "default",
        "show",
        "regsetvalueexa",
        "search",
        "regdword",
        "medium",
        "settingswpad",
        "delete",
        "ids detections",
        "yara detections",
        "worm",
        "malware",
        "copy",
        "write",
        "win32",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "graph community",
        "productidis",
        "urls",
        "mb iesettings",
        "related file",
        "cybersecurity",
        "agency",
        "csc corporate",
        "domains",
        "tucows domains",
        "nameweb bvba",
        "tucows",
        "google",
        "amazon02",
        "twitter",
        "ovh sas",
        "facebook",
        "incapsula",
        "optimizer",
        "activator",
        "kb program",
        "mb super",
        "kb acrotray",
        "1tzv",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "checks_debugger",
        "network_icmp",
        "network_smtp",
        "persistence_autorun",
        "modifies_proxy_wpad",
        "antivm_queries_computername",
        "dumped_buffer",
        "network_http",
        "antivm_network_adapters",
        "smtp_gmail",
        "attacking",
        "browser",
        "object",
        "deleted",
        "deleting",
        "deleted virustotal graphs",
        "corruption",
        "legal",
        "gvt",
        "adams co",
        "colorado",
        "law",
        "illegal practices",
        "hacking",
        "enter rexxfield",
        "roberts",
        "smith",
        "script urls",
        "as20940",
        "united",
        "a domains",
        "certificate",
        "showing",
        "entries",
        "entrust",
        "scan endpoints",
        "district",
        "as16625 akamai",
        "aaaa",
        "passive dns",
        "united kingdom",
        "whitelisted",
        "modification",
        "silence",
        "state",
        "hostname",
        "samples",
        "cover up",
        "silencing",
        "Iowa.gov",
        "dga",
        "fcc",
        "unsigned",
        "remote",
        "wiper",
        "nosy pega",
        "trojan",
        "unknown",
        "access denied",
        "servers",
        "creation date",
        "date",
        "next",
        "apple",
        "ssl certificate",
        "threat roundup",
        "march",
        "october",
        "july",
        "april",
        "whois record",
        "june",
        "roundup",
        "september",
        "august",
        "plugx",
        "goldfinder",
        "sibot",
        "hacktool",
        "february",
        "regsz",
        "english",
        "nsisinetc",
        "mozilla",
        "adobe air",
        "java",
        "http",
        "post http",
        "updater",
        "meta",
        "suspicious",
        "persistence",
        "execution",
        "referrer",
        "communicating",
        "skynet",
        "malicious",
        "gen.o",
        "dynamicloader",
        "cape",
        "enosch malware",
        "enosch",
        "music",
        "contacted",
        "pe resource",
        "resolutions",
        "siblings",
        "urls http"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.google.com/?authuser=0",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Belgium",
        "Netherlands",
        "Spain",
        "Australia",
        "Korea, Republic of",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Nullsoft_NSIS",
          "display_name": "Nullsoft_NSIS",
          "target": null
        },
        {
          "id": "Win32:Agent-ASTI\\ [Trj]",
          "display_name": "Win32:Agent-ASTI\\ [Trj]",
          "target": null
        },
        {
          "id": "Worm:Win32/Enosch!atmn",
          "display_name": "Worm:Win32/Enosch!atmn",
          "target": "/malware/Worm:Win32/Enosch!atmn"
        },
        {
          "id": "Win.Trojan.Agent-357800",
          "display_name": "Win.Trojan.Agent-357800",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2701,
        "FileHash-SHA1": 1512,
        "FileHash-SHA256": 5351,
        "SSLCertFingerprint": 1,
        "URL": 1774,
        "email": 7,
        "hostname": 1170,
        "domain": 1209
      },
      "indicator_count": 13725,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "797 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65a2f9200337f0d1fa195ada",
      "name": "Remote attack: Win32/Enosch.A gtalk connectivity check | High Priority",
      "description": "W32/Enosch.A!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) attacks. Worms automatically spread to other PCs. This threat can perform a number of actions of a malicious hacker's choice. This hacker is choosing to delete files, accounts, pulses, by graphs while acting as user.  An authenticated use in browser bar https://www.google.com/?authuser=0.\n\nAttempts to modify,delete graphs, pulses, accounts, passwords. Acting as user.",
      "modified": "2024-02-12T20:02:49.516000",
      "created": "2024-01-13T20:57:04.197000",
      "tags": [
        "default",
        "show",
        "regsetvalueexa",
        "search",
        "regdword",
        "medium",
        "settingswpad",
        "delete",
        "ids detections",
        "yara detections",
        "worm",
        "malware",
        "copy",
        "write",
        "win32",
        "first",
        "utc submissions",
        "submitters",
        "cloudflarenet",
        "summary iocs",
        "graph community",
        "productidis",
        "urls",
        "mb iesettings",
        "related file",
        "cybersecurity",
        "agency",
        "csc corporate",
        "domains",
        "tucows domains",
        "nameweb bvba",
        "tucows",
        "google",
        "amazon02",
        "twitter",
        "ovh sas",
        "facebook",
        "incapsula",
        "optimizer",
        "activator",
        "kb program",
        "mb super",
        "kb acrotray",
        "1tzv",
        "ioc search",
        "new ioc",
        "teams api",
        "contact",
        "threat analyzer",
        "threat",
        "paste",
        "iocs",
        "hostnames",
        "urls https",
        "checks_debugger",
        "network_icmp",
        "network_smtp",
        "persistence_autorun",
        "modifies_proxy_wpad",
        "antivm_queries_computername",
        "dumped_buffer",
        "network_http",
        "antivm_network_adapters",
        "smtp_gmail",
        "attacking",
        "browser",
        "object",
        "deleted",
        "deleting",
        "deleted virustotal graphs",
        "corruption",
        "legal",
        "gvt",
        "adams co",
        "colorado",
        "law",
        "illegal practices",
        "hacking",
        "enter rexxfield",
        "roberts",
        "smith",
        "script urls",
        "as20940",
        "united",
        "a domains",
        "certificate",
        "showing",
        "entries",
        "entrust",
        "scan endpoints",
        "district",
        "as16625 akamai",
        "aaaa",
        "passive dns",
        "united kingdom",
        "whitelisted",
        "modification",
        "silence",
        "state",
        "hostname",
        "samples",
        "cover up",
        "silencing",
        "Iowa.gov",
        "dga",
        "fcc",
        "unsigned",
        "remote",
        "wiper",
        "nosy pega",
        "trojan",
        "unknown",
        "access denied",
        "servers",
        "creation date",
        "date",
        "next",
        "apple",
        "ssl certificate",
        "threat roundup",
        "march",
        "october",
        "july",
        "april",
        "whois record",
        "june",
        "roundup",
        "september",
        "august",
        "plugx",
        "goldfinder",
        "sibot",
        "hacktool",
        "february",
        "regsz",
        "english",
        "nsisinetc",
        "mozilla",
        "adobe air",
        "java",
        "http",
        "post http",
        "updater",
        "meta",
        "suspicious",
        "persistence",
        "execution",
        "referrer",
        "communicating",
        "skynet",
        "malicious",
        "gen.o",
        "dynamicloader",
        "cape",
        "enosch malware",
        "enosch",
        "music",
        "contacted",
        "pe resource",
        "resolutions",
        "siblings",
        "urls http"
      ],
      "references": [
        "https://otx.alienvault.com/indicator/file/c98108ca8f4e0dd8a3f63d4ac490e115",
        "https://www.google.com/?authuser=0",
        "Wiper to Ransomware: The Evolution of Agrius - Sourced: ArcSight Threat Intelligence",
        "AS15133 MCI Communications Services Inc d b a Verizon Business, Loudon County, Va",
        "207 Iowa.gov domains and hosts acting as cyber security [cyberreason]",
        "iowa.gov, accidentreports.iowa.gov, beready.iowa.gov, affordableconnectivity.gov",
        "appanoosecounty.iowa.gov, bigben.iowa.gov [Ben Smith?]",
        "lacity.gov, auditortest.iowa.gov, broadband.iowa.gov, admin.auditor.iowa.gov,",
        "https://lacity.gov/san/index.htm, https://personnel.lacity.gov, https://lacity.gov/SAN,",
        "Domains Contacted: smtp.gmail.com www.google.com",
        "DGA Domain [affordableconnectivity.gov & GetInternet.gov]  Home ACP Universal Service Administrative Company",
        "www.fcc.gov? DGA Domains : Certificate Subject\tUS 443 Certificate Subject\tDistrict of Columbia 443 Certificate Subject\tWashington 443 Certificate Subject\tFederal Communications Commission 443 Certificate Subject\tGovernment Entity 443 Certificate Subject\t1934-06-19 443 Certificate Subject\taffordableconnectivity.gov 443 Certificate Issuer\tEntrust, Inc. 443 Certificate Issuer\tSee www.entrust.net/legal-terms 443 Certificate Issuer",
        "(c) 2014 Entrust, Inc. - for authorized use only 443 Certificate Issuer\tEntrust Certification Authority - L1M",
        "https://www.clear.com.br/site/DirectTalk/Filter?botopenned=3Dtrue [???]"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Belgium",
        "Netherlands",
        "Spain",
        "Australia",
        "Korea, Republic of",
        "Hong Kong"
      ],
      "malware_families": [
        {
          "id": "Nullsoft_NSIS",
          "display_name": "Nullsoft_NSIS",
          "target": null
        },
        {
          "id": "Win32:Agent-ASTI\\ [Trj]",
          "display_name": "Win32:Agent-ASTI\\ [Trj]",
          "target": null
        },
        {
          "id": "Worm:Win32/Enosch!atmn",
          "display_name": "Worm:Win32/Enosch!atmn",
          "target": "/malware/Worm:Win32/Enosch!atmn"
        },
        {
          "id": "Win.Trojan.Agent-357800",
          "display_name": "Win.Trojan.Agent-357800",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2701,
        "FileHash-SHA1": 1512,
        "FileHash-SHA256": 5351,
        "SSLCertFingerprint": 1,
        "URL": 1774,
        "email": 7,
        "hostname": 1170,
        "domain": 1209
      },
      "indicator_count": 13725,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "797 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://schema.rdfs.org",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://schema.rdfs.org",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776629993.4631033
}