{
  "type": "URL",
  "indicator": "https://skybet-assets.ftstatic.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://skybet-assets.ftstatic.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3783170317,
      "indicator": "https://skybet-assets.ftstatic.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 12,
      "pulses": [
        {
          "id": "66661087254f9a6b75d799f7",
          "name": "Assurance [Prudential]  CnC Emotet activity | Hackers",
          "description": "IDS Detections\nWin32/Emotet CnC Activity (POST) M11\nSMB IPC$ unicode share access\nYara Detections\nMS_Visual_Cpp_6_0\nAlerts\ndead_host\nnids_malware_alert\nnolookup_communication\nmodifies_proxy_wpad\nnetwork_cnc_http\nnetwork_http\nnetwork_http_post\nallocates_rwx\ninjection_process_search\nprotection_rx\nantivm_network_adapters\npacker_entropy\nprocess_interest\nreads_user_agent\nantivm_queries_computername\ngenerates_crypto_key\npeid_packer",
          "modified": "2024-07-09T20:02:35.557000",
          "created": "2024-06-09T20:28:55.154000",
          "tags": [
            "historical ssl",
            "red team",
            "referrer",
            "mr windows",
            "logistics",
            "cyber defense",
            "apt ip",
            "address list",
            "ip block",
            "malicious",
            "general",
            "hiddentear",
            "united",
            "aaaa",
            "unknown",
            "as8075",
            "as8068",
            "for privacy",
            "asnone united",
            "creation date",
            "search",
            "expiration date",
            "date",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers server",
            "date sun",
            "msie",
            "chrome",
            "passive dns",
            "urls",
            "record value",
            "body",
            "name verdict",
            "falcon sandbox",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "sha1",
            "windows nt",
            "wow64",
            "format",
            "hybrid",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "default",
            "post",
            "delete",
            "read",
            "settingswpad",
            "yara detections",
            "medium",
            "medium process",
            "discovery t1057",
            "write",
            "malware",
            "copy",
            "regsetvalueexa",
            "regdword",
            "ip address",
            "post http",
            "http",
            "user agent",
            "high"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 52,
            "FileHash-SHA256": 727,
            "URL": 5735,
            "domain": 887,
            "hostname": 2241,
            "email": 2
          },
          "indicator_count": 9692,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "650 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6666123fa4fee8009e828206",
          "name": "Red Teaming & Cyber Defense is a guide. They are attacking. Let's see who it is. I already know. ",
          "description": "",
          "modified": "2024-07-09T20:02:35.557000",
          "created": "2024-06-09T20:36:15.204000",
          "tags": [
            "historical ssl",
            "red team",
            "referrer",
            "mr windows",
            "logistics",
            "cyber defense",
            "apt ip",
            "address list",
            "ip block",
            "malicious",
            "general",
            "hiddentear",
            "united",
            "aaaa",
            "unknown",
            "as8075",
            "as8068",
            "for privacy",
            "asnone united",
            "creation date",
            "search",
            "expiration date",
            "date",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers server",
            "date sun",
            "msie",
            "chrome",
            "passive dns",
            "urls",
            "record value",
            "body",
            "name verdict",
            "falcon sandbox",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "sha1",
            "windows nt",
            "wow64",
            "format",
            "hybrid",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "default",
            "post",
            "delete",
            "read",
            "settingswpad",
            "yara detections",
            "medium",
            "medium process",
            "discovery t1057",
            "write",
            "malware",
            "copy",
            "regsetvalueexa",
            "regdword",
            "ip address",
            "post http",
            "http",
            "user agent",
            "high"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66661087254f9a6b75d799f7",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 52,
            "FileHash-SHA256": 727,
            "URL": 5735,
            "domain": 887,
            "hostname": 2241,
            "email": 2
          },
          "indicator_count": 9692,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "650 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "666612c655b9b466d6ff1cc3",
          "name": "Red Teaming & Cyber Defense is a GUISE. They are attacking, they are hackers. ",
          "description": "",
          "modified": "2024-07-09T20:02:35.557000",
          "created": "2024-06-09T20:38:30.595000",
          "tags": [
            "historical ssl",
            "red team",
            "referrer",
            "mr windows",
            "logistics",
            "cyber defense",
            "apt ip",
            "address list",
            "ip block",
            "malicious",
            "general",
            "hiddentear",
            "united",
            "aaaa",
            "unknown",
            "as8075",
            "as8068",
            "for privacy",
            "asnone united",
            "creation date",
            "search",
            "expiration date",
            "date",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers server",
            "date sun",
            "msie",
            "chrome",
            "passive dns",
            "urls",
            "record value",
            "body",
            "name verdict",
            "falcon sandbox",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "sha1",
            "windows nt",
            "wow64",
            "format",
            "hybrid",
            "june",
            "local",
            "click",
            "strings",
            "contact",
            "default",
            "post",
            "delete",
            "read",
            "settingswpad",
            "yara detections",
            "medium",
            "medium process",
            "discovery t1057",
            "write",
            "malware",
            "copy",
            "regsetvalueexa",
            "regdword",
            "ip address",
            "post http",
            "http",
            "user agent",
            "high"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6666123fa4fee8009e828206",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 48,
            "FileHash-SHA1": 52,
            "FileHash-SHA256": 727,
            "URL": 5735,
            "domain": 887,
            "hostname": 2241,
            "email": 2
          },
          "indicator_count": 9692,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "650 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65642d43a6029c41643dfb5e",
          "name": "http://fireeyei.iowa.gov/",
          "description": "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
          "modified": "2023-12-26T23:03:25.397000",
          "created": "2023-11-27T05:46:43.630000",
          "tags": [
            "passive dns",
            "urls",
            "scan endpoints",
            "pulse pulses",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "script",
            "beginstring",
            "severity",
            "null",
            "unknown",
            "date",
            "error",
            "refresh",
            "span",
            "class",
            "generator",
            "critical",
            "tools",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "referrer",
            "resolutions",
            "contacted",
            "historical",
            "communicating",
            "whois whois",
            "siblings",
            "execution",
            "united",
            "malware",
            "phishing site",
            "malicious site",
            "malware site",
            "ibm xforce",
            "exchange",
            "mail spammer",
            "firehol",
            "phishing",
            "fuery",
            "unsafe",
            "rostpay",
            "wacatac",
            "genkryptik",
            "riskware",
            "artemis",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "team",
            "installcore",
            "generic malware",
            "keylogger",
            "downloader",
            "tag count",
            "mon feb",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "blacklist https",
            "productidis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "heur",
            "filerepmalware",
            "seraph",
            "webcompanion",
            "redline stealer",
            "opencandy",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "maltiverse",
            "site top",
            "site safe",
            "malicious",
            "cve201711882",
            "phish",
            "driverreviver",
            "o.gen",
            "redline",
            "blacklist http",
            "microsoft",
            "detection list",
            "blacklist",
            "south carolina",
            "union",
            "traffic",
            "node tcp",
            "spammer",
            "tor known",
            "tor relayrouter",
            "host"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "O.gen",
              "display_name": "O.gen",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 816,
            "hostname": 1542,
            "URL": 5023,
            "FileHash-SHA256": 1827,
            "FileHash-MD5": 786,
            "FileHash-SHA1": 403,
            "CVE": 4
          },
          "indicator_count": 10401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a9b46382eefe9b0acda21",
          "name": "http://fireeyei.iowa.gov/",
          "description": "",
          "modified": "2023-12-26T23:03:25.397000",
          "created": "2023-12-02T02:49:42.129000",
          "tags": [
            "passive dns",
            "urls",
            "scan endpoints",
            "pulse pulses",
            "files",
            "verdict",
            "domain",
            "files ip",
            "address",
            "location united",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "pattern match",
            "script",
            "beginstring",
            "severity",
            "null",
            "unknown",
            "date",
            "error",
            "refresh",
            "span",
            "class",
            "generator",
            "critical",
            "tools",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "referrer",
            "resolutions",
            "contacted",
            "historical",
            "communicating",
            "whois whois",
            "siblings",
            "execution",
            "united",
            "malware",
            "phishing site",
            "malicious site",
            "malware site",
            "ibm xforce",
            "exchange",
            "mail spammer",
            "firehol",
            "phishing",
            "fuery",
            "unsafe",
            "rostpay",
            "wacatac",
            "genkryptik",
            "riskware",
            "artemis",
            "qakbot",
            "asyncrat",
            "cobalt strike",
            "team",
            "installcore",
            "generic malware",
            "keylogger",
            "downloader",
            "tag count",
            "mon feb",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "first",
            "blacklist https",
            "productidis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "adware",
            "heur",
            "filerepmalware",
            "seraph",
            "webcompanion",
            "redline stealer",
            "opencandy",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "maltiverse",
            "site top",
            "site safe",
            "malicious",
            "cve201711882",
            "phish",
            "driverreviver",
            "o.gen",
            "redline",
            "blacklist http",
            "microsoft",
            "detection list",
            "blacklist",
            "south carolina",
            "union",
            "traffic",
            "node tcp",
            "spammer",
            "tor known",
            "tor relayrouter",
            "host"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "DriverReviver",
              "display_name": "DriverReviver",
              "target": null
            },
            {
              "id": "O.gen",
              "display_name": "O.gen",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65642d43a6029c41643dfb5e",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 816,
            "hostname": 1542,
            "URL": 5023,
            "FileHash-SHA256": 1827,
            "FileHash-MD5": 786,
            "FileHash-SHA1": 403,
            "CVE": 4
          },
          "indicator_count": 10401,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655650c9b2be6cc930c92cf3",
          "name": "https://myaccount.uscis.gov/",
          "description": "HOW!?!? My device was remotely logged into this account somehow.\nThis is egregious. Silence  Threats. I have no connection to this but was contacted by a while ago. I don't know how or why a part of the government would attack a person with a TBI and C1 - S1 Spinal cord injury allegedly caused by Colorado physical therapist and protect him. Why  is victim, tracked and unsafe, receiving death threats, monitored, denied medical care, stalked EVERYWHERE.   \nEven felons aren't monitored for life. STOP.\nWill this get us killed. Do the right thing.\nGod bless America, purge the government.\nThe truth should set you fee not get you harmed.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:26:33",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655652f6ddcbf952a599cded",
          "name": "https://myaccount.uscis.gov/",
          "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:35:50.285000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65565477da453c46f05a6ac4",
          "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:42:15.123000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655657ca2e402d4f98283de9",
          "name": "https://myaccount.uscis.gov/ ",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:56:26.312000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655686e2c072557f03e9cba2",
          "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T21:17:22.087000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c52bf98f256b6a01da6",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-18T00:58:58.944000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aac25a8a2caaddf0d3b88",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-12-02T04:01:41.427000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655652f6ddcbf952a599cded",
          "export_count": 93,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "856 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Webtoolbar",
            "Redline",
            "Driverreviver",
            "Lumma",
            "Trojanspy",
            "O.gen",
            "Maltiverse"
          ],
          "industries": [],
          "unique_indicators": 48014
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/ftstatic.com",
    "whois": "http://whois.domaintools.com/ftstatic.com",
    "domain": "ftstatic.com",
    "hostname": "skybet-assets.ftstatic.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 12,
  "pulses": [
    {
      "id": "66661087254f9a6b75d799f7",
      "name": "Assurance [Prudential]  CnC Emotet activity | Hackers",
      "description": "IDS Detections\nWin32/Emotet CnC Activity (POST) M11\nSMB IPC$ unicode share access\nYara Detections\nMS_Visual_Cpp_6_0\nAlerts\ndead_host\nnids_malware_alert\nnolookup_communication\nmodifies_proxy_wpad\nnetwork_cnc_http\nnetwork_http\nnetwork_http_post\nallocates_rwx\ninjection_process_search\nprotection_rx\nantivm_network_adapters\npacker_entropy\nprocess_interest\nreads_user_agent\nantivm_queries_computername\ngenerates_crypto_key\npeid_packer",
      "modified": "2024-07-09T20:02:35.557000",
      "created": "2024-06-09T20:28:55.154000",
      "tags": [
        "historical ssl",
        "red team",
        "referrer",
        "mr windows",
        "logistics",
        "cyber defense",
        "apt ip",
        "address list",
        "ip block",
        "malicious",
        "general",
        "hiddentear",
        "united",
        "aaaa",
        "unknown",
        "as8075",
        "as8068",
        "for privacy",
        "asnone united",
        "creation date",
        "search",
        "expiration date",
        "date",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers server",
        "date sun",
        "msie",
        "chrome",
        "passive dns",
        "urls",
        "record value",
        "body",
        "name verdict",
        "falcon sandbox",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "sha1",
        "windows nt",
        "wow64",
        "format",
        "hybrid",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "default",
        "post",
        "delete",
        "read",
        "settingswpad",
        "yara detections",
        "medium",
        "medium process",
        "discovery t1057",
        "write",
        "malware",
        "copy",
        "regsetvalueexa",
        "regdword",
        "ip address",
        "post http",
        "http",
        "user agent",
        "high"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 52,
        "FileHash-SHA256": 727,
        "URL": 5735,
        "domain": 887,
        "hostname": 2241,
        "email": 2
      },
      "indicator_count": 9692,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "650 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6666123fa4fee8009e828206",
      "name": "Red Teaming & Cyber Defense is a guide. They are attacking. Let's see who it is. I already know. ",
      "description": "",
      "modified": "2024-07-09T20:02:35.557000",
      "created": "2024-06-09T20:36:15.204000",
      "tags": [
        "historical ssl",
        "red team",
        "referrer",
        "mr windows",
        "logistics",
        "cyber defense",
        "apt ip",
        "address list",
        "ip block",
        "malicious",
        "general",
        "hiddentear",
        "united",
        "aaaa",
        "unknown",
        "as8075",
        "as8068",
        "for privacy",
        "asnone united",
        "creation date",
        "search",
        "expiration date",
        "date",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers server",
        "date sun",
        "msie",
        "chrome",
        "passive dns",
        "urls",
        "record value",
        "body",
        "name verdict",
        "falcon sandbox",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "sha1",
        "windows nt",
        "wow64",
        "format",
        "hybrid",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "default",
        "post",
        "delete",
        "read",
        "settingswpad",
        "yara detections",
        "medium",
        "medium process",
        "discovery t1057",
        "write",
        "malware",
        "copy",
        "regsetvalueexa",
        "regdword",
        "ip address",
        "post http",
        "http",
        "user agent",
        "high"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "66661087254f9a6b75d799f7",
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 52,
        "FileHash-SHA256": 727,
        "URL": 5735,
        "domain": 887,
        "hostname": 2241,
        "email": 2
      },
      "indicator_count": 9692,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "650 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "666612c655b9b466d6ff1cc3",
      "name": "Red Teaming & Cyber Defense is a GUISE. They are attacking, they are hackers. ",
      "description": "",
      "modified": "2024-07-09T20:02:35.557000",
      "created": "2024-06-09T20:38:30.595000",
      "tags": [
        "historical ssl",
        "red team",
        "referrer",
        "mr windows",
        "logistics",
        "cyber defense",
        "apt ip",
        "address list",
        "ip block",
        "malicious",
        "general",
        "hiddentear",
        "united",
        "aaaa",
        "unknown",
        "as8075",
        "as8068",
        "for privacy",
        "asnone united",
        "creation date",
        "search",
        "expiration date",
        "date",
        "http response",
        "final url",
        "serving ip",
        "address",
        "status code",
        "body length",
        "b body",
        "sha256",
        "headers server",
        "date sun",
        "msie",
        "chrome",
        "passive dns",
        "urls",
        "record value",
        "body",
        "name verdict",
        "falcon sandbox",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "sha1",
        "windows nt",
        "wow64",
        "format",
        "hybrid",
        "june",
        "local",
        "click",
        "strings",
        "contact",
        "default",
        "post",
        "delete",
        "read",
        "settingswpad",
        "yara detections",
        "medium",
        "medium process",
        "discovery t1057",
        "write",
        "malware",
        "copy",
        "regsetvalueexa",
        "regdword",
        "ip address",
        "post http",
        "http",
        "user agent",
        "high"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6666123fa4fee8009e828206",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 48,
        "FileHash-SHA1": 52,
        "FileHash-SHA256": 727,
        "URL": 5735,
        "domain": 887,
        "hostname": 2241,
        "email": 2
      },
      "indicator_count": 9692,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "650 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65642d43a6029c41643dfb5e",
      "name": "http://fireeyei.iowa.gov/",
      "description": "Found in http://kaplanmorrell.com/meet-kaplan-morrel/meet-ronda-cordova/",
      "modified": "2023-12-26T23:03:25.397000",
      "created": "2023-11-27T05:46:43.630000",
      "tags": [
        "passive dns",
        "urls",
        "scan endpoints",
        "pulse pulses",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "script",
        "beginstring",
        "severity",
        "null",
        "unknown",
        "date",
        "error",
        "refresh",
        "span",
        "class",
        "generator",
        "critical",
        "tools",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "referrer",
        "resolutions",
        "contacted",
        "historical",
        "communicating",
        "whois whois",
        "siblings",
        "execution",
        "united",
        "malware",
        "phishing site",
        "malicious site",
        "malware site",
        "ibm xforce",
        "exchange",
        "mail spammer",
        "firehol",
        "phishing",
        "fuery",
        "unsafe",
        "rostpay",
        "wacatac",
        "genkryptik",
        "riskware",
        "artemis",
        "qakbot",
        "asyncrat",
        "cobalt strike",
        "team",
        "installcore",
        "generic malware",
        "keylogger",
        "downloader",
        "tag count",
        "mon feb",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "blacklist https",
        "productidis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "heur",
        "filerepmalware",
        "seraph",
        "webcompanion",
        "redline stealer",
        "opencandy",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "maltiverse",
        "site top",
        "site safe",
        "malicious",
        "cve201711882",
        "phish",
        "driverreviver",
        "o.gen",
        "redline",
        "blacklist http",
        "microsoft",
        "detection list",
        "blacklist",
        "south carolina",
        "union",
        "traffic",
        "node tcp",
        "spammer",
        "tor known",
        "tor relayrouter",
        "host"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "O.gen",
          "display_name": "O.gen",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 816,
        "hostname": 1542,
        "URL": 5023,
        "FileHash-SHA256": 1827,
        "FileHash-MD5": 786,
        "FileHash-SHA1": 403,
        "CVE": 4
      },
      "indicator_count": 10401,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656a9b46382eefe9b0acda21",
      "name": "http://fireeyei.iowa.gov/",
      "description": "",
      "modified": "2023-12-26T23:03:25.397000",
      "created": "2023-12-02T02:49:42.129000",
      "tags": [
        "passive dns",
        "urls",
        "scan endpoints",
        "pulse pulses",
        "files",
        "verdict",
        "domain",
        "files ip",
        "address",
        "location united",
        "et tor",
        "known tor",
        "misc attack",
        "relayrouter",
        "exit",
        "node traffic",
        "pattern match",
        "script",
        "beginstring",
        "severity",
        "null",
        "unknown",
        "date",
        "error",
        "refresh",
        "span",
        "class",
        "generator",
        "critical",
        "tools",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "referrer",
        "resolutions",
        "contacted",
        "historical",
        "communicating",
        "whois whois",
        "siblings",
        "execution",
        "united",
        "malware",
        "phishing site",
        "malicious site",
        "malware site",
        "ibm xforce",
        "exchange",
        "mail spammer",
        "firehol",
        "phishing",
        "fuery",
        "unsafe",
        "rostpay",
        "wacatac",
        "genkryptik",
        "riskware",
        "artemis",
        "qakbot",
        "asyncrat",
        "cobalt strike",
        "team",
        "installcore",
        "generic malware",
        "keylogger",
        "downloader",
        "tag count",
        "mon feb",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "first",
        "blacklist https",
        "productidis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "adware",
        "heur",
        "filerepmalware",
        "seraph",
        "webcompanion",
        "redline stealer",
        "opencandy",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "maltiverse",
        "site top",
        "site safe",
        "malicious",
        "cve201711882",
        "phish",
        "driverreviver",
        "o.gen",
        "redline",
        "blacklist http",
        "microsoft",
        "detection list",
        "blacklist",
        "south carolina",
        "union",
        "traffic",
        "node tcp",
        "spammer",
        "tor known",
        "tor relayrouter",
        "host"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "DriverReviver",
          "display_name": "DriverReviver",
          "target": null
        },
        {
          "id": "O.gen",
          "display_name": "O.gen",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65642d43a6029c41643dfb5e",
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 816,
        "hostname": 1542,
        "URL": 5023,
        "FileHash-SHA256": 1827,
        "FileHash-MD5": 786,
        "FileHash-SHA1": 403,
        "CVE": 4
      },
      "indicator_count": 10401,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655650c9b2be6cc930c92cf3",
      "name": "https://myaccount.uscis.gov/",
      "description": "HOW!?!? My device was remotely logged into this account somehow.\nThis is egregious. Silence  Threats. I have no connection to this but was contacted by a while ago. I don't know how or why a part of the government would attack a person with a TBI and C1 - S1 Spinal cord injury allegedly caused by Colorado physical therapist and protect him. Why  is victim, tracked and unsafe, receiving death threats, monitored, denied medical care, stalked EVERYWHERE.   \nEven felons aren't monitored for life. STOP.\nWill this get us killed. Do the right thing.\nGod bless America, purge the government.\nThe truth should set you fee not get you harmed.",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:26:33",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 102,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "856 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655652f6ddcbf952a599cded",
      "name": "https://myaccount.uscis.gov/",
      "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:35:50.285000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 100,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "856 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65565477da453c46f05a6ac4",
      "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:42:15.123000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 101,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "856 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655657ca2e402d4f98283de9",
      "name": "https://myaccount.uscis.gov/ ",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:56:26.312000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 100,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "856 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655686e2c072557f03e9cba2",
      "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T21:17:22.087000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 102,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "856 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://skybet-assets.ftstatic.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://skybet-assets.ftstatic.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776745283.8085368
}