{
  "type": "URL",
  "indicator": "https://shakti.nevm.de/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://shakti.nevm.de/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4142060020,
      "indicator": "https://shakti.nevm.de/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "69a3c685d4b7c139ffe62930",
          "name": "Clone Pulse Reference",
          "description": "",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-03-01T04:54:29.384000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6906bd99cadbd4140014c6af",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 454,
            "hostname": 1404,
            "URL": 3557,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 6754,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6976d69ecbc0497f97e28618",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:10.502000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6976d6a601f06adcd1ed22fc",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:18.022000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6976d6afd744c55bd596ed6e",
          "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
          "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
          "modified": "2026-02-25T02:03:02.441000",
          "created": "2026-01-26T02:51:27.248000",
          "tags": [
            "united",
            "error",
            "port",
            "destination",
            "host",
            "tlsv1",
            "intel",
            "ms windows",
            "worm",
            "delphi",
            "write",
            "malware",
            "suspicious",
            "autorun",
            "bloat",
            "checkin",
            "google",
            "drive",
            "cape",
            "lowfi",
            "hookwowlow dec",
            "passive dns",
            "mtb jan",
            "mtb nov",
            "hookwowlow nov",
            "twitter",
            "trojandropper",
            "virtool",
            "win32",
            "susp",
            "hookwowlow",
            "injection",
            "please",
            "x msedge",
            "ipv4 add",
            "urls",
            "dynamicloader",
            "windows",
            "professional",
            "delete c",
            "tls issuing",
            "x005x00xc0",
            "xc0xc0",
            "xc0nxc0tx00jx00",
            "stwa",
            "lredmond",
            "explorer",
            "powershell",
            "accept",
            "corporation10",
            "trojan",
            "pegasus",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "present sep",
            "present aug",
            "redacted for",
            "ip address",
            "search",
            "unknown cname",
            "memcommit",
            "default",
            "sectigo limited",
            "read c",
            "gb st",
            "inprocserver32",
            "sectigo public",
            "defender",
            "next",
            "present jan",
            "spain",
            "domain add",
            "files",
            "asn as15169",
            "flag",
            "click",
            "windir",
            "openurl c",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "ck techniques",
            "mitre att",
            "ck matrix",
            "starfield",
            "hybrid",
            "general",
            "path",
            "strings",
            "extraction",
            "data upload",
            "failed",
            "include review",
            "exclude sugges",
            "stop data",
            "levelblue",
            "open threat",
            "url https",
            "none google",
            "url http",
            "no expiration",
            "iocs",
            "domain",
            "pdf report",
            "pcap",
            "stix",
            "openioc",
            "ocs to",
            "exclude",
            "suggesteu",
            "find s",
            "snow",
            "aitypes",
            "suspicious_redirect",
            "url_encoding",
            "present dec",
            "unknown aaaa",
            "present oct",
            "record value",
            "body",
            "encrypt",
            "access att",
            "link initial",
            "ascii text",
            "pattern match",
            "sha256",
            "show technique",
            "iframe",
            "local",
            "united states",
            "brian sabey",
            "christopher p. ahmann",
            "black rock",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "meta name",
            "strong",
            "static dns",
            "date",
            "null",
            "enough",
            "hosts",
            "fast"
          ],
          "references": [
            "Sprouts Farmers Market",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
            "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
            "Pegasus | A targets devices are obviously infiltrated",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
            "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
            "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
            "Alerts: cape_detected_threat https_ urls",
            "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
            "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
            "Domains Contacted: drive.usercontent.google.com",
            "ConventionEngine_Anomaly_MultiPDB_Double",
            "https://jviwczq.zc-apple.com/",
            "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
            "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
            "Malware Hosting: 13.107.226.70",
            "Scanning Host: 13.107.246.70",
            "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
            "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
            "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
            "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
            "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
            "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
            "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
            "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
            "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
            "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
            "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
            "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
            "sprouts@em.sprouts.com?",
            "http://blackrock.work.gd/",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
            "blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
            "supplierportal.gov2x.com",
            "http://wonporn.com/top/Pakistani_Sucking",
            "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
            "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
            "supply.qld.gov.au",
            "okta-dev.gov2x.com",
            "verify.gov.tl",
            "api.optimizer.insitemaxdev.gov2x.com",
            "iot.insitemaxdev.gov2x.com",
            "https://kb.drakesoftware.com/Site/Browse/15183/State",
            "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
            "freedns.afraid.org",
            "https://hello.riskxchange.co/api/mailings/unsubscribe",
            "Sabey , Ahmann, Quasi Government, Government"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "#LowFI:HookwowLow",
              "display_name": "#LowFI:HookwowLow",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Trojan.VBGeneric-6735875-0",
              "display_name": "Win.Trojan.VBGeneric-6735875-0",
              "target": null
            },
            {
              "id": "SLF:Win64/CobPipe.A",
              "display_name": "SLF:Win64/CobPipe.A",
              "target": "/malware/SLF:Win64/CobPipe.A"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "ALF:Trojan:Win32/Anorocuriv.A",
              "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
              "target": null
            },
            {
              "id": "Sf:ShellCode-AU\\ [Trj]",
              "display_name": "Sf:ShellCode-AU\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Pushdo-15",
              "display_name": "Win.Trojan.Pushdo-15",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Win32:Trojano-CHF\\ [Trj]",
              "display_name": "Win32:Trojano-CHF\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Downloader.3867-1",
              "display_name": "Win.Downloader.3867-1",
              "target": null
            },
            {
              "id": "Win32:Evo-gen\\ [Susp]",
              "display_name": "Win32:Evo-gen\\ [Susp]",
              "target": null
            },
            {
              "id": "Virtool:Win32/CeeInject.gen!AH",
              "display_name": "Virtool:Win32/CeeInject.gen!AH",
              "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1003.003",
              "name": "NTDS",
              "display_name": "T1003.003 - NTDS"
            },
            {
              "id": "T1055.008",
              "name": "Ptrace System Calls",
              "display_name": "T1055.008 - Ptrace System Calls"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1564.005",
              "name": "Hidden File System",
              "display_name": "T1564.005 - Hidden File System"
            }
          ],
          "industries": [
            "Retail",
            "Government",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 12640,
            "hostname": 4429,
            "email": 7,
            "domain": 1250,
            "FileHash-SHA256": 1633,
            "FileHash-MD5": 278,
            "FileHash-SHA1": 343,
            "SSLCertFingerprint": 17
          },
          "indicator_count": 20597,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "53 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6906bd99cadbd4140014c6af",
          "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
          "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
          "modified": "2025-12-02T01:05:30.331000",
          "created": "2025-11-02T02:10:33.546000",
          "tags": [
            "ipv4",
            "active related",
            "trojandropper",
            "mtb jun",
            "lowfi",
            "trojan",
            "mtb jan",
            "fastly error",
            "please",
            "united",
            "ttl value",
            "get na",
            "total",
            "delete",
            "search",
            "yara detections",
            "sinkhole cookie",
            "value snkz",
            "write",
            "suspicious",
            "ransom",
            "malware",
            "Ransom.Win32.Birele.gsg Checkin",
            "AnubisNetworks Sinkhole Cookie Value Snkz",
            "Possible Compromised Host",
            "dynamicloader",
            "delete c",
            "default",
            "medium",
            "write c",
            "settingswpad",
            "intel",
            "ms windows",
            "users",
            "number",
            "title",
            "installer",
            "top source",
            "top destination",
            "source source",
            "port",
            "filehash",
            "av detections",
            "ids detections",
            "yara rule",
            "gravityrat",
            "detectvm",
            "x00 x00",
            "x00x00",
            "doviacmd",
            "rootjob",
            "getfiles",
            "updateserver",
            "ethernetid",
            "ids signatures",
            "exploits",
            "sid name",
            "malware cve",
            "dns query",
            "dnsbin demo",
            "data exfil",
            "exif data",
            "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
            "DNSBin Demo (requestbin .net) - Data Exfitration",
            "source port",
            "destination",
            "present sep",
            "script urls",
            "script script",
            "a domains",
            "script domains",
            "ip address",
            "meta",
            "present nov",
            "passive dns",
            "next associated",
            "domain add",
            "pe executable",
            "entries",
            "show",
            "msie",
            "windows nt",
            "wow64",
            "copy",
            "present jan",
            "present feb",
            "domain",
            "pulse pulses",
            "urls",
            "files",
            "tam legal",
            "christopher ahmann",
            "https://unicef.se/assets/apple",
            "treece alfrey",
            "hours ago",
            "information",
            "report spam",
            "ahmann colorado",
            "state",
            "special cousel",
            "created",
            "expiro",
            "capture"
          ],
          "references": [
            "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
            "Fastly Error and Palantir blocked several times over the last few months.",
            "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
            "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
            "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
            "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
            "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
            "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
            "https://unicef.se/assets/apple"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Neconyd.A",
              "display_name": "Trojan:Win32/Neconyd.A",
              "target": "/malware/Trojan:Win32/Neconyd.A"
            },
            {
              "id": "PWS:Win32/QQpass.FC",
              "display_name": "PWS:Win32/QQpass.FC",
              "target": "/malware/PWS:Win32/QQpass.FC"
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "Win.Malware.Urelas-9863836-0",
              "display_name": "Win.Malware.Urelas-9863836-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
              "target": null
            },
            {
              "id": "Win.Trojan.Vundo-7170412-0",
              "display_name": "Win.Trojan.Vundo-7170412-0",
              "target": null
            },
            {
              "id": "#Lowfi:SuspiciousSectionName",
              "display_name": "#Lowfi:SuspiciousSectionName",
              "target": null
            },
            {
              "id": "Multiple Malware\u2019s , Trojans and Rats",
              "display_name": "Multiple Malware\u2019s , Trojans and Rats",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1197",
              "name": "BITS Jobs",
              "display_name": "T1197 - BITS Jobs"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 909,
            "domain": 449,
            "hostname": 1403,
            "URL": 3552,
            "CIDR": 1,
            "FileHash-MD5": 242,
            "FileHash-SHA1": 185,
            "email": 1
          },
          "indicator_count": 6742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "138 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f9288e0d98f3b44c2cb90c",
          "name": "Ultrasounds attack - South African criminal group-Denver, Vo affects critical infrastructure , Oil and public safety",
          "description": "South African and Ethiopian crime group with Denver , Co  presence is not only infiltrating infrastructure from banking to oil, they are human traffickers, hitmen and yes, I received this tip from team member Pheona who a \u2018sassa.gov.za\u2018 South African link recurrently as a top search suggestion in a \u2018targets\u2019  browser. The most frightening piece is that a name listed is of an Ethiopian man who attempted to force a very targeted victim to go somewhere with him,, be his girlfriend and did show up outside of her residence in a different City & County. He also knew the exact name of where she purchased specific items. If you can see this. Please help the best way you can. Something is incredibly wrong. [OTX auto populated Title: We can\u2019t rely on goodwill to protect our critical infrastructure - Help Net Security]",
          "modified": "2025-11-21T18:02:11.054000",
          "created": "2025-10-22T18:55:10.527000",
          "tags": [
            "server nginx",
            "date fri",
            "etag w",
            "urls",
            "passive dns",
            "acceptranges",
            "contentlength",
            "date thu",
            "gmt expires",
            "server",
            "code",
            "link",
            "script script",
            "south africa",
            "ipv4",
            "files",
            "location south",
            "accept",
            "present aug",
            "certificate",
            "hostname add",
            "domain",
            "files ip",
            "unknown a",
            "script urls",
            "ip address",
            "unknown soa",
            "unknown ns",
            "reverse dns",
            "africa flag",
            "asn as16637",
            "dns resolutions",
            "domains top",
            "level",
            "unique tld",
            "related pulses",
            "tags none",
            "indicator facts",
            "title",
            "ipv4 add",
            "opinion",
            "netacea",
            "lockbit",
            "wannacry attack",
            "nhs trusts",
            "council",
            "uk government",
            "protect",
            "cni safe",
            "acls",
            "praio",
            "prink",
            "prsc",
            "prla",
            "lg2en",
            "cti98",
            "search",
            "seiko epson",
            "corporation",
            "arc file",
            "malware",
            "delete c",
            "default",
            "show",
            "write",
            "next",
            "unknown",
            "united",
            "tlsv1",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "as15169",
            "port",
            "execution",
            "dock",
            "capture",
            "persistence",
            "yara detections",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "cabinet archive",
            "microsoft",
            "read c",
            "dynamicloader",
            "medium",
            "ltda me",
            "high",
            "write c",
            "entries",
            "checks",
            "delphi",
            "win32",
            "url pulse",
            "data upload",
            "extraction",
            "find suggested",
            "type",
            "domain hostname",
            "url add",
            "http",
            "related nids",
            "files location",
            "ireland flag",
            "files domain",
            "chrome",
            "ireland unknown",
            "pulse submit",
            "url analysis",
            "body",
            "date",
            "status",
            "name servers",
            "creation date",
            "expiration date",
            "flag united",
            "destination",
            "systemdrive",
            "html document",
            "crlf line",
            "updater",
            "copy",
            "unknown aaaa",
            "moved",
            "domain add",
            "extri data",
            "enter sc",
            "extr include",
            "review exclude",
            "sugges",
            "present jul",
            "saudi arabia",
            "present mar",
            "present oct",
            "present jun",
            "present feb",
            "present nov",
            "present may",
            "eeee",
            "eeeeeee",
            "eeeeee",
            "eefe",
            "ebeee",
            "ee eme",
            "eeheee",
            "eeefee e",
            "eeeee e",
            "vmprotect",
            "push",
            "local",
            "defender",
            "regsetvalueexa",
            "utf8 unicode"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lockbit",
              "display_name": "Lockbit",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "target": null
            },
            {
              "id": "Other Dangerous Malware",
              "display_name": "Other Dangerous Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1561",
              "name": "Disk Wipe",
              "display_name": "T1561 - Disk Wipe"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Oil"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 648,
            "hostname": 1604,
            "FileHash-SHA256": 1826,
            "URL": 4153,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 60,
            "SSLCertFingerprint": 18,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 8418,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "148 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68f93b1cebf80f48450bd517",
          "name": "Yuner - File deletion and Disk Wiping / Cyberstalking ",
          "description": "",
          "modified": "2025-11-21T18:02:11.054000",
          "created": "2025-10-22T20:14:20.632000",
          "tags": [
            "server nginx",
            "date fri",
            "etag w",
            "urls",
            "passive dns",
            "acceptranges",
            "contentlength",
            "date thu",
            "gmt expires",
            "server",
            "code",
            "link",
            "script script",
            "south africa",
            "ipv4",
            "files",
            "location south",
            "accept",
            "present aug",
            "certificate",
            "hostname add",
            "domain",
            "files ip",
            "unknown a",
            "script urls",
            "ip address",
            "unknown soa",
            "unknown ns",
            "reverse dns",
            "africa flag",
            "asn as16637",
            "dns resolutions",
            "domains top",
            "level",
            "unique tld",
            "related pulses",
            "tags none",
            "indicator facts",
            "title",
            "ipv4 add",
            "opinion",
            "netacea",
            "lockbit",
            "wannacry attack",
            "nhs trusts",
            "council",
            "uk government",
            "protect",
            "cni safe",
            "acls",
            "praio",
            "prink",
            "prsc",
            "prla",
            "lg2en",
            "cti98",
            "search",
            "seiko epson",
            "corporation",
            "arc file",
            "malware",
            "delete c",
            "default",
            "show",
            "write",
            "next",
            "unknown",
            "united",
            "tlsv1",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "as15169",
            "port",
            "execution",
            "dock",
            "capture",
            "persistence",
            "yara detections",
            "filehash",
            "md5 add",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "low risk",
            "cabinet archive",
            "microsoft",
            "read c",
            "dynamicloader",
            "medium",
            "ltda me",
            "high",
            "write c",
            "entries",
            "checks",
            "delphi",
            "win32",
            "url pulse",
            "data upload",
            "extraction",
            "find suggested",
            "type",
            "domain hostname",
            "url add",
            "http",
            "related nids",
            "files location",
            "ireland flag",
            "files domain",
            "chrome",
            "ireland unknown",
            "pulse submit",
            "url analysis",
            "body",
            "date",
            "status",
            "name servers",
            "creation date",
            "expiration date",
            "flag united",
            "destination",
            "systemdrive",
            "html document",
            "crlf line",
            "updater",
            "copy",
            "unknown aaaa",
            "moved",
            "domain add",
            "extri data",
            "enter sc",
            "extr include",
            "review exclude",
            "sugges",
            "present jul",
            "saudi arabia",
            "present mar",
            "present oct",
            "present jun",
            "present feb",
            "present nov",
            "present may",
            "eeee",
            "eeeeeee",
            "eeeeee",
            "eefe",
            "ebeee",
            "ee eme",
            "eeheee",
            "eeefee e",
            "eeeee e",
            "vmprotect",
            "push",
            "local",
            "defender",
            "regsetvalueexa",
            "utf8 unicode"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lockbit",
              "display_name": "Lockbit",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
              "target": null
            },
            {
              "id": "Other Dangerous Malware",
              "display_name": "Other Dangerous Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1561",
              "name": "Disk Wipe",
              "display_name": "T1561 - Disk Wipe"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Oil"
          ],
          "TLP": "green",
          "cloned_from": "68f9288e0d98f3b44c2cb90c",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 648,
            "hostname": 1604,
            "FileHash-SHA256": 1826,
            "URL": 4153,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 60,
            "SSLCertFingerprint": 18,
            "CVE": 2,
            "email": 5
          },
          "indicator_count": 8418,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "148 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://jviwczq.zc-apple.com/",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "iot.insitemaxdev.gov2x.com",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "okta-dev.gov2x.com",
        "supplierportal.gov2x.com",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "Domains Contacted: drive.usercontent.google.com",
        "https://unicef.se/assets/apple",
        "supply.qld.gov.au",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "http://blackrock.work.gd/",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "Alerts: cape_detected_threat https_ urls",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "verify.gov.tl",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "Pegasus | A targets devices are obviously infiltrated",
        "Sprouts Farmers Market",
        "freedns.afraid.org",
        "Malware Hosting: 13.107.226.70",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "api.optimizer.insitemaxdev.gov2x.com",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "sprouts@em.sprouts.com?",
        "Sabey , Ahmann, Quasi Government, Government",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "Scanning Host: 13.107.246.70",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win32:evo-gen\\ [susp]",
            "Trojan:win32/neconyd.a",
            "#lowfi:hookwowlow",
            "Pegasus",
            "Worm:win32/mofksys.rnd!mtb",
            "Slf:win64/cobpipe.a",
            "Alf:program:win32/webcompanion",
            "Multiple malware\u2019s , trojans and rats",
            "Win.trojan.vundo-7170412-0",
            "Win.trojan.emotet-9850453-0",
            "Worm:win32/autorun!atmn",
            "Win.downloader.3867-1",
            "Other dangerous malware",
            "Lockbit",
            "Alf:heraklezeval:pua:win32/ultradownloads",
            "Alf:trojan:win32/anorocuriv.a",
            "Pws:win32/qqpass.fc",
            "Win.trojan.pushdo-15",
            "Win.malware.urelas-9863836-0",
            "Win.trojan.vbgeneric-6735875-0",
            "Win32:trojano-chf\\ [trj]",
            "Win.trojan.cobaltstrike-9044898-1",
            "Virtool:win32/ceeinject.gen!ah",
            "#lowfi:suspicioussectionname",
            "Trojandownloader:win32/cutwail.bs",
            "Sf:shellcode-au\\ [trj]",
            "Trojan:win32/zombie.a",
            "Alf:heraklezeval:trojan:msil/gravityrat!rfn"
          ],
          "industries": [
            "Retail",
            "Technology",
            "Government",
            "Oil"
          ],
          "unique_indicators": 35088
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/nevm.de",
    "whois": "http://whois.domaintools.com/nevm.de",
    "domain": "nevm.de",
    "hostname": "shakti.nevm.de"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "69a3c685d4b7c139ffe62930",
      "name": "Clone Pulse Reference",
      "description": "",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-03-01T04:54:29.384000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6906bd99cadbd4140014c6af",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 454,
        "hostname": 1404,
        "URL": 3557,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1,
        "CVE": 1
      },
      "indicator_count": 6754,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6976d69ecbc0497f97e28618",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:10.502000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6976d6a601f06adcd1ed22fc",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:18.022000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6976d6afd744c55bd596ed6e",
      "name": "Sprouts Farmers Market - Apple Product Access Attack | Pegasus | EndGame (01.25.26)",
      "description": "Suspicious redirect on an infected Apple product. Pegasus auto populated. Targets positive for Pegasus Hit List. Brian Sabey , Christopher P. Ahmann , State of Colorado quasi government entities.  \n\nPegasus isn\u2019t obviously seen in this pulse. Next pulse will show Installer.\n[OTX Auto Populated- LevelBlue - Open Threat Exchange - Why?] \n#ProjecctEndgame #Pegasus #Sprouts #SuspiciousRedirect #Malicious_Coding #Hello",
      "modified": "2026-02-25T02:03:02.441000",
      "created": "2026-01-26T02:51:27.248000",
      "tags": [
        "united",
        "error",
        "port",
        "destination",
        "host",
        "tlsv1",
        "intel",
        "ms windows",
        "worm",
        "delphi",
        "write",
        "malware",
        "suspicious",
        "autorun",
        "bloat",
        "checkin",
        "google",
        "drive",
        "cape",
        "lowfi",
        "hookwowlow dec",
        "passive dns",
        "mtb jan",
        "mtb nov",
        "hookwowlow nov",
        "twitter",
        "trojandropper",
        "virtool",
        "win32",
        "susp",
        "hookwowlow",
        "injection",
        "please",
        "x msedge",
        "ipv4 add",
        "urls",
        "dynamicloader",
        "windows",
        "professional",
        "delete c",
        "tls issuing",
        "x005x00xc0",
        "xc0xc0",
        "xc0nxc0tx00jx00",
        "stwa",
        "lredmond",
        "explorer",
        "powershell",
        "accept",
        "corporation10",
        "trojan",
        "pegasus",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "present sep",
        "present aug",
        "redacted for",
        "ip address",
        "search",
        "unknown cname",
        "memcommit",
        "default",
        "sectigo limited",
        "read c",
        "gb st",
        "inprocserver32",
        "sectigo public",
        "defender",
        "next",
        "present jan",
        "spain",
        "domain add",
        "files",
        "asn as15169",
        "flag",
        "click",
        "windir",
        "openurl c",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "learn",
        "ck id",
        "name tactics",
        "informative",
        "adversaries",
        "command",
        "defense evasion",
        "spawns",
        "ck techniques",
        "mitre att",
        "ck matrix",
        "starfield",
        "hybrid",
        "general",
        "path",
        "strings",
        "extraction",
        "data upload",
        "failed",
        "include review",
        "exclude sugges",
        "stop data",
        "levelblue",
        "open threat",
        "url https",
        "none google",
        "url http",
        "no expiration",
        "iocs",
        "domain",
        "pdf report",
        "pcap",
        "stix",
        "openioc",
        "ocs to",
        "exclude",
        "suggesteu",
        "find s",
        "snow",
        "aitypes",
        "suspicious_redirect",
        "url_encoding",
        "present dec",
        "unknown aaaa",
        "present oct",
        "record value",
        "body",
        "encrypt",
        "access att",
        "link initial",
        "ascii text",
        "pattern match",
        "sha256",
        "show technique",
        "iframe",
        "local",
        "united states",
        "brian sabey",
        "christopher p. ahmann",
        "black rock",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "meta name",
        "strong",
        "static dns",
        "date",
        "null",
        "enough",
        "hosts",
        "fast"
      ],
      "references": [
        "Sprouts Farmers Market",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print? _gl=1*loeqyip*_ *_gc|_au*MTM5Mjg3NzAwNC4xNzY5MzY30DA2",
        "https://shop.sprouts.com/store/sprouts/flyers/view/weekly/print?",
        "Pegasus | A targets devices are obviously infiltrated",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com",
        "IDS Detections: Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "Yara Detections: Zeppelin_30 ,  Zeppelin_19 ,  ConventionEngine_Term_Desktop ,",
        "Yara Detections: ConventionEngine_Term_Users ,  ConventionEngine_Keyword_Launch ,  Delphi",
        "Alerts: cape_detected_threat https_ urls",
        "IP\u2019s Contacted:  142.250.217.65  142.251.33.110  69.42.215.252",
        "Domains Contacted: xred.mooo.com freedns.afraid.org docs.google.com crls.pki.goog",
        "Domains Contacted: drive.usercontent.google.com",
        "ConventionEngine_Anomaly_MultiPDB_Double",
        "https://jviwczq.zc-apple.com/",
        "SUSP_NET_NAME_ConfuserEx ConfuserEx AssemblyTitle dbgdetect_files siCe ntIce dbgdetect DotNET_ConfuserEx",
        "Registrar: JIANGSU BANGNING SCIENCE & TECHNOLOGY CO. LTD,",
        "Malware Hosting: 13.107.226.70",
        "Scanning Host: 13.107.246.70",
        "https://blog.endgames.com/ \u2022  https://pages.endgames.com \u2022 https://www.endgames.com",
        "http://www.endgames.com \u2022 http://www.endgames.com/ \u2022 https://blog.endgames.com  \u2022 http://pages.endgames.com/",
        "pages.endgames.com\u2022 http://blog.endgames.com \u2022 http://blog.endgames.com/ \u2022 http://pages.endgames.com",
        "www.endgame.com \u2022 blog.endgames.com \u2022 blog.endgames.us \u2022 blog.endgamesystems.com\t\u2022 www.onyx-ware.com",
        "https://wg41xm05b3.endgamesystems.com/ \u2022 https://www.endgamesystems.com \u2022 https://www.endgamesystems.com/",
        "endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "endgames.us \u2022 endgames.com \u2022 endgamesystems.com \u2022 http://www.endgames.us \u2022 http://www.endgames.us/",
        "https://wg41xm05b3.endgamesystems.com \u2022 http://blog.endgames.us/ \u2022 http://blog.endgames.us",
        "https://blog.endgamesystems.com \u2022 https://blog.endgamesystems.com/ \u2022 https://httpswww.endgamesystems.com",
        "https://blog.endgames.us \u2022 https://blog.endgames.us/ \u2022 https://www.endgames.us \u2022 https://www.endgames.us/",
        "wg41xm05b3.endgamesystems.com \u2022 http://blog.endgamesystems.com \u2022 http://blog.endgamesystems.com/",
        "http://httpswww.endgamesystems.com \u2022 http://wg41xm05b3.endgamesystems.com \u2022 http://www.endgamesystems.com/",
        "http://wg41xm05b3.endgamesystems.com/ \u2022http://www.endgamesystems.com",
        "sprouts@em.sprouts.com?",
        "http://blackrock.work.gd/",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io/",
        "blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "https://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "http://blackbox-exporter.lenovo-k8s.home.local.advena.io",
        "supplierportal.gov2x.com",
        "http://wonporn.com/top/Pakistani_Sucking",
        "https://embed-nl.pornoperso.com/storage/videos/l/o/lottie/lottie-moss-nude-spreading-it-open-wide-fo",
        "https://otx.alienvault.com/indicator/url/https://sl.trustedtechteam.com/t/112341/opt_out/25cf6e0a-4f09-4066-ac1d-ded32587a303",
        "supply.qld.gov.au",
        "okta-dev.gov2x.com",
        "verify.gov.tl",
        "api.optimizer.insitemaxdev.gov2x.com",
        "iot.insitemaxdev.gov2x.com",
        "https://kb.drakesoftware.com/Site/Browse/15183/State",
        "https://support.drakesoftware.com/oidc-callback&response_mode=query&response_type=code&scope=openid openid profile email&state=OpenIdConnect.AuthenticationProperties=VWCAd8SYI908zOmw3cLV0bBiMQ-qzTmuLAOEu1zXcvGui69s75FlxoGyoi9h1TNe6C5MlboHQM_xJqlqHjIBmxbRn-oJzJr3TfLSdIw_joIphiQwbzCTE1_5-elZiRtGglrbVEqQCSBFbo3AlcHMdEQyyO_3brHjBAm4yhRw04eEYb4DhQTrBumIoEyEAsxDnnhElMDx7h6lPliA_JWZW3IabbYj5k8oFf9lS-XgQAqEkYbPRkhT8d96uNjSlex7BcM0Ug&nonce=639003960753552218.MGNhMjllMTktYTA3My00NzUzLTljYjUtNzNkNzM0NTA0OGEyZTZlYmZjYW",
        "freedns.afraid.org",
        "https://hello.riskxchange.co/api/mailings/unsubscribe",
        "Sabey , Ahmann, Quasi Government, Government"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "#LowFI:HookwowLow",
          "display_name": "#LowFI:HookwowLow",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Trojan.VBGeneric-6735875-0",
          "display_name": "Win.Trojan.VBGeneric-6735875-0",
          "target": null
        },
        {
          "id": "SLF:Win64/CobPipe.A",
          "display_name": "SLF:Win64/CobPipe.A",
          "target": "/malware/SLF:Win64/CobPipe.A"
        },
        {
          "id": "ALF:Program:Win32/Webcompanion",
          "display_name": "ALF:Program:Win32/Webcompanion",
          "target": null
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "ALF:Trojan:Win32/Anorocuriv.A",
          "display_name": "ALF:Trojan:Win32/Anorocuriv.A",
          "target": null
        },
        {
          "id": "Sf:ShellCode-AU\\ [Trj]",
          "display_name": "Sf:ShellCode-AU\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Pushdo-15",
          "display_name": "Win.Trojan.Pushdo-15",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Win32:Trojano-CHF\\ [Trj]",
          "display_name": "Win32:Trojano-CHF\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Downloader.3867-1",
          "display_name": "Win.Downloader.3867-1",
          "target": null
        },
        {
          "id": "Win32:Evo-gen\\ [Susp]",
          "display_name": "Win32:Evo-gen\\ [Susp]",
          "target": null
        },
        {
          "id": "Virtool:Win32/CeeInject.gen!AH",
          "display_name": "Virtool:Win32/CeeInject.gen!AH",
          "target": "/malware/Virtool:Win32/CeeInject.gen!AH"
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1456",
          "name": "Drive-by Compromise",
          "display_name": "T1456 - Drive-by Compromise"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1598",
          "name": "Phishing for Information",
          "display_name": "T1598 - Phishing for Information"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1003.003",
          "name": "NTDS",
          "display_name": "T1003.003 - NTDS"
        },
        {
          "id": "T1055.008",
          "name": "Ptrace System Calls",
          "display_name": "T1055.008 - Ptrace System Calls"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1564.005",
          "name": "Hidden File System",
          "display_name": "T1564.005 - Hidden File System"
        }
      ],
      "industries": [
        "Retail",
        "Government",
        "Technology"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 12640,
        "hostname": 4429,
        "email": 7,
        "domain": 1250,
        "FileHash-SHA256": 1633,
        "FileHash-MD5": 278,
        "FileHash-SHA1": 343,
        "SSLCertFingerprint": 17
      },
      "indicator_count": 20597,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "53 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6906bd99cadbd4140014c6af",
      "name": "Espionage - Gravity RAT + | Legal entities are State owned.  Attacking severely injured  PT\u2019s SA victim.",
      "description": "Fastly CDN for Palantir (Verizon) unless updated.  Very malicious IoC\u2019s found evaluating IoC\u2019 from Christopher Ahmann - TAM Legal link.\n- Made contact with victim several times.\n- Illegal contact made with attorneys considering representing Tsara. \n- https://unicef.se/assets/apple - link related to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage.\n\nAhmann is named as special counsel but he , like Brian Sabey are \u2018ONLY\u2019  cyber attacking Tsara Brashears.\n\n- protecting Jeffrey Reimer DPT, multiple doctors, Concentra,  blocked and denied care , hired a hitman/men and it would have. Even cheaper to pay her for the injuries she never sought compensation for due to aggressive attacks and threats.",
      "modified": "2025-12-02T01:05:30.331000",
      "created": "2025-11-02T02:10:33.546000",
      "tags": [
        "ipv4",
        "active related",
        "trojandropper",
        "mtb jun",
        "lowfi",
        "trojan",
        "mtb jan",
        "fastly error",
        "please",
        "united",
        "ttl value",
        "get na",
        "total",
        "delete",
        "search",
        "yara detections",
        "sinkhole cookie",
        "value snkz",
        "write",
        "suspicious",
        "ransom",
        "malware",
        "Ransom.Win32.Birele.gsg Checkin",
        "AnubisNetworks Sinkhole Cookie Value Snkz",
        "Possible Compromised Host",
        "dynamicloader",
        "delete c",
        "default",
        "medium",
        "write c",
        "settingswpad",
        "intel",
        "ms windows",
        "users",
        "number",
        "title",
        "installer",
        "top source",
        "top destination",
        "source source",
        "port",
        "filehash",
        "av detections",
        "ids detections",
        "yara rule",
        "gravityrat",
        "detectvm",
        "x00 x00",
        "x00x00",
        "doviacmd",
        "rootjob",
        "getfiles",
        "updateserver",
        "ethernetid",
        "ids signatures",
        "exploits",
        "sid name",
        "malware cve",
        "dns query",
        "dnsbin demo",
        "data exfil",
        "exif data",
        "DNS Query for Webhook/HTTP Request Inspection Service (x .pipedr",
        "DNSBin Demo (requestbin .net) - Data Exfitration",
        "source port",
        "destination",
        "present sep",
        "script urls",
        "script script",
        "a domains",
        "script domains",
        "ip address",
        "meta",
        "present nov",
        "passive dns",
        "next associated",
        "domain add",
        "pe executable",
        "entries",
        "show",
        "msie",
        "windows nt",
        "wow64",
        "copy",
        "present jan",
        "present feb",
        "domain",
        "pulse pulses",
        "urls",
        "files",
        "tam legal",
        "christopher ahmann",
        "https://unicef.se/assets/apple",
        "treece alfrey",
        "hours ago",
        "information",
        "report spam",
        "ahmann colorado",
        "state",
        "special cousel",
        "created",
        "expiro",
        "capture"
      ],
      "references": [
        "Fastly IP Block:  151.101.0.0/16 | Organizations like Palantir may use third-party services such as Fastly's CDN",
        "Fastly Error and Palantir blocked several times over the last few months.",
        "Denver ; ISP, Fastly, Inc. ; Organization, Fastly, Inc. ; Network, AS54113 Fastly, Inc. (VPN, CDN, DDOSM,)",
        "IP Region, Quebec. City ; Net Range, 151.101.0.0 - 151.101.255.255. CIDR ; Full Name, Fastly, Inc.",
        "Palantir quasi government client Ab/using Palantir subdomains , Fastly is CDN",
        "Yara: SUSP_ENV_Folder_Root_File_Jan23_1 %APPDATA%\\ewiuer2.exe SCRIPT",
        "Win.Trojan.Vundo-7170412-0\t#Lowfi:SuspiciousSectionName",
        "Link below used to defraud Tsara to think she\u2019d violated Patriot Act warranting NSA , Palinter espionage",
        "https://unicef.se/assets/apple"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Neconyd.A",
          "display_name": "Trojan:Win32/Neconyd.A",
          "target": "/malware/Trojan:Win32/Neconyd.A"
        },
        {
          "id": "PWS:Win32/QQpass.FC",
          "display_name": "PWS:Win32/QQpass.FC",
          "target": "/malware/PWS:Win32/QQpass.FC"
        },
        {
          "id": "Trojan:Win32/Zombie.A",
          "display_name": "Trojan:Win32/Zombie.A",
          "target": "/malware/Trojan:Win32/Zombie.A"
        },
        {
          "id": "Win.Malware.Urelas-9863836-0",
          "display_name": "Win.Malware.Urelas-9863836-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "display_name": "ALF:HeraklezEval:Trojan:MSIL/Gravityrat!rfn",
          "target": null
        },
        {
          "id": "Win.Trojan.Vundo-7170412-0",
          "display_name": "Win.Trojan.Vundo-7170412-0",
          "target": null
        },
        {
          "id": "#Lowfi:SuspiciousSectionName",
          "display_name": "#Lowfi:SuspiciousSectionName",
          "target": null
        },
        {
          "id": "Multiple Malware\u2019s , Trojans and Rats",
          "display_name": "Multiple Malware\u2019s , Trojans and Rats",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1197",
          "name": "BITS Jobs",
          "display_name": "T1197 - BITS Jobs"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 909,
        "domain": 449,
        "hostname": 1403,
        "URL": 3552,
        "CIDR": 1,
        "FileHash-MD5": 242,
        "FileHash-SHA1": 185,
        "email": 1
      },
      "indicator_count": 6742,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "138 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f9288e0d98f3b44c2cb90c",
      "name": "Ultrasounds attack - South African criminal group-Denver, Vo affects critical infrastructure , Oil and public safety",
      "description": "South African and Ethiopian crime group with Denver , Co  presence is not only infiltrating infrastructure from banking to oil, they are human traffickers, hitmen and yes, I received this tip from team member Pheona who a \u2018sassa.gov.za\u2018 South African link recurrently as a top search suggestion in a \u2018targets\u2019  browser. The most frightening piece is that a name listed is of an Ethiopian man who attempted to force a very targeted victim to go somewhere with him,, be his girlfriend and did show up outside of her residence in a different City & County. He also knew the exact name of where she purchased specific items. If you can see this. Please help the best way you can. Something is incredibly wrong. [OTX auto populated Title: We can\u2019t rely on goodwill to protect our critical infrastructure - Help Net Security]",
      "modified": "2025-11-21T18:02:11.054000",
      "created": "2025-10-22T18:55:10.527000",
      "tags": [
        "server nginx",
        "date fri",
        "etag w",
        "urls",
        "passive dns",
        "acceptranges",
        "contentlength",
        "date thu",
        "gmt expires",
        "server",
        "code",
        "link",
        "script script",
        "south africa",
        "ipv4",
        "files",
        "location south",
        "accept",
        "present aug",
        "certificate",
        "hostname add",
        "domain",
        "files ip",
        "unknown a",
        "script urls",
        "ip address",
        "unknown soa",
        "unknown ns",
        "reverse dns",
        "africa flag",
        "asn as16637",
        "dns resolutions",
        "domains top",
        "level",
        "unique tld",
        "related pulses",
        "tags none",
        "indicator facts",
        "title",
        "ipv4 add",
        "opinion",
        "netacea",
        "lockbit",
        "wannacry attack",
        "nhs trusts",
        "council",
        "uk government",
        "protect",
        "cni safe",
        "acls",
        "praio",
        "prink",
        "prsc",
        "prla",
        "lg2en",
        "cti98",
        "search",
        "seiko epson",
        "corporation",
        "arc file",
        "malware",
        "delete c",
        "default",
        "show",
        "write",
        "next",
        "unknown",
        "united",
        "tlsv1",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "as15169",
        "port",
        "execution",
        "dock",
        "capture",
        "persistence",
        "yara detections",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "cabinet archive",
        "microsoft",
        "read c",
        "dynamicloader",
        "medium",
        "ltda me",
        "high",
        "write c",
        "entries",
        "checks",
        "delphi",
        "win32",
        "url pulse",
        "data upload",
        "extraction",
        "find suggested",
        "type",
        "domain hostname",
        "url add",
        "http",
        "related nids",
        "files location",
        "ireland flag",
        "files domain",
        "chrome",
        "ireland unknown",
        "pulse submit",
        "url analysis",
        "body",
        "date",
        "status",
        "name servers",
        "creation date",
        "expiration date",
        "flag united",
        "destination",
        "systemdrive",
        "html document",
        "crlf line",
        "updater",
        "copy",
        "unknown aaaa",
        "moved",
        "domain add",
        "extri data",
        "enter sc",
        "extr include",
        "review exclude",
        "sugges",
        "present jul",
        "saudi arabia",
        "present mar",
        "present oct",
        "present jun",
        "present feb",
        "present nov",
        "present may",
        "eeee",
        "eeeeeee",
        "eeeeee",
        "eefe",
        "ebeee",
        "ee eme",
        "eeheee",
        "eeefee e",
        "eeeee e",
        "vmprotect",
        "push",
        "local",
        "defender",
        "regsetvalueexa",
        "utf8 unicode"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lockbit",
          "display_name": "Lockbit",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "target": null
        },
        {
          "id": "Other Dangerous Malware",
          "display_name": "Other Dangerous Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1561",
          "name": "Disk Wipe",
          "display_name": "T1561 - Disk Wipe"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Oil"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 648,
        "hostname": 1604,
        "FileHash-SHA256": 1826,
        "URL": 4153,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 60,
        "SSLCertFingerprint": 18,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 8418,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "148 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68f93b1cebf80f48450bd517",
      "name": "Yuner - File deletion and Disk Wiping / Cyberstalking ",
      "description": "",
      "modified": "2025-11-21T18:02:11.054000",
      "created": "2025-10-22T20:14:20.632000",
      "tags": [
        "server nginx",
        "date fri",
        "etag w",
        "urls",
        "passive dns",
        "acceptranges",
        "contentlength",
        "date thu",
        "gmt expires",
        "server",
        "code",
        "link",
        "script script",
        "south africa",
        "ipv4",
        "files",
        "location south",
        "accept",
        "present aug",
        "certificate",
        "hostname add",
        "domain",
        "files ip",
        "unknown a",
        "script urls",
        "ip address",
        "unknown soa",
        "unknown ns",
        "reverse dns",
        "africa flag",
        "asn as16637",
        "dns resolutions",
        "domains top",
        "level",
        "unique tld",
        "related pulses",
        "tags none",
        "indicator facts",
        "title",
        "ipv4 add",
        "opinion",
        "netacea",
        "lockbit",
        "wannacry attack",
        "nhs trusts",
        "council",
        "uk government",
        "protect",
        "cni safe",
        "acls",
        "praio",
        "prink",
        "prsc",
        "prla",
        "lg2en",
        "cti98",
        "search",
        "seiko epson",
        "corporation",
        "arc file",
        "malware",
        "delete c",
        "default",
        "show",
        "write",
        "next",
        "unknown",
        "united",
        "tlsv1",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "as15169",
        "port",
        "execution",
        "dock",
        "capture",
        "persistence",
        "yara detections",
        "filehash",
        "md5 add",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "low risk",
        "cabinet archive",
        "microsoft",
        "read c",
        "dynamicloader",
        "medium",
        "ltda me",
        "high",
        "write c",
        "entries",
        "checks",
        "delphi",
        "win32",
        "url pulse",
        "data upload",
        "extraction",
        "find suggested",
        "type",
        "domain hostname",
        "url add",
        "http",
        "related nids",
        "files location",
        "ireland flag",
        "files domain",
        "chrome",
        "ireland unknown",
        "pulse submit",
        "url analysis",
        "body",
        "date",
        "status",
        "name servers",
        "creation date",
        "expiration date",
        "flag united",
        "destination",
        "systemdrive",
        "html document",
        "crlf line",
        "updater",
        "copy",
        "unknown aaaa",
        "moved",
        "domain add",
        "extri data",
        "enter sc",
        "extr include",
        "review exclude",
        "sugges",
        "present jul",
        "saudi arabia",
        "present mar",
        "present oct",
        "present jun",
        "present feb",
        "present nov",
        "present may",
        "eeee",
        "eeeeeee",
        "eeeeee",
        "eefe",
        "ebeee",
        "ee eme",
        "eeheee",
        "eeefee e",
        "eeeee e",
        "vmprotect",
        "push",
        "local",
        "defender",
        "regsetvalueexa",
        "utf8 unicode"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lockbit",
          "display_name": "Lockbit",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "display_name": "ALF:HeraklezEval:PUA:Win32/UltraDownloads",
          "target": null
        },
        {
          "id": "Other Dangerous Malware",
          "display_name": "Other Dangerous Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1561",
          "name": "Disk Wipe",
          "display_name": "T1561 - Disk Wipe"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Oil"
      ],
      "TLP": "green",
      "cloned_from": "68f9288e0d98f3b44c2cb90c",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 648,
        "hostname": 1604,
        "FileHash-SHA256": 1826,
        "URL": 4153,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 60,
        "SSLCertFingerprint": 18,
        "CVE": 2,
        "email": 5
      },
      "indicator_count": 8418,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "148 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://shakti.nevm.de/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://shakti.nevm.de/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591899.7060828
}