{
  "type": "URL",
  "indicator": "https://snap.licdn.com/li.lms-analytics/insight.min.js",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://snap.licdn.com/li.lms-analytics/insight.min.js",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "akamai",
        "message": "Akamai rank: #715",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain licdn.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain licdn.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2808379864,
      "indicator": "https://snap.licdn.com/li.lms-analytics/insight.min.js",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69a12a81af4358973fbdf1a8",
          "name": "Example 2: Belasco Chain Byproduct of Certificate Hosted Malware (See Prior Thread #2 Entrust.com",
          "description": "CAcert bypass",
          "modified": "2026-04-19T07:42:53.546000",
          "created": "2026-02-27T05:24:16.997000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 20,
            "FileHash-SHA256": 112,
            "FileHash-MD5": 8,
            "URL": 69,
            "hostname": 17,
            "FileHash-SHA1": 6,
            "CVE": 6,
            "YARA": 5
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "9 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "699c3b796fcaed878ca94c5c",
          "name": "https://m.vzw.com/wIvzrd8",
          "description": "the wizard",
          "modified": "2026-04-18T05:30:18.690000",
          "created": "2026-02-23T11:35:21.673000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1818,
            "hostname": 575,
            "URL": 200,
            "FileHash-SHA1": 450,
            "CIDR": 11,
            "domain": 887,
            "email": 7,
            "FileHash-MD5": 402,
            "CVE": 21
          },
          "indicator_count": 4371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b6044b1389957c1d2afb58",
          "name": "Pulses in Question",
          "description": "Following.",
          "modified": "2026-04-14T01:10:24.056000",
          "created": "2026-03-15T00:58:51.761000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 56,
            "FileHash-SHA1": 56,
            "FileHash-SHA256": 93,
            "URL": 122,
            "hostname": 150,
            "email": 1,
            "domain": 37
          },
          "indicator_count": 515,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b650d954218108114d88e3",
          "name": "Files Corpus Redirected to these PDFKIT.net",
          "description": "PDFKIT.NET DMV version \"\" see old posts for details. Recommendation,  PDFkit.net DMV versions should be aggregated with data to rule out anything like ability to connect to Mac ids, or general safety. Docusign states that to fall within a secure Docusign protocol documents are not modified after creation. Please check old pdfs for post modification violating forgery, cryptography, electronic claims act integrity violations.",
          "modified": "2026-04-14T00:14:29.475000",
          "created": "2026-03-15T06:25:29.875000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 6,
            "hostname": 12,
            "URL": 15,
            "FileHash-SHA256": 3
          },
          "indicator_count": 36,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "699ffe2a0a48bdf23d11efb4",
          "name": "Cardconnect Ecosystem",
          "description": "The cardconnect.com infrastructure reveals a fragmented and high-risk network topology characterized by an atypical shift from Fastly edge delivery to Radware-Ukraine (AS30779) routing. While core transaction processing remains anchored within Fiserv (AS11121/AS39992) and status monitoring is partitioned to AWS, the persistent resolution of root and www traffic to Ukrainian IP space (176.100.165.28) creates a significant geolocation anomaly for a US financial entity. This volatility, coupled with orphaned NXDOMAIN records and inconsistent CNAME nesting (aliasing vendor-specific subdomains like idexx and frazer to centralized b2c/fts endpoints), suggests a non-unified deployment strategy that complicates the domain\u2019s security perimeter and increases its exposure to DNS-based interception.",
          "modified": "2026-04-13T23:46:24.779000",
          "created": "2026-02-26T08:02:50.501000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 301,
            "FileHash-SHA256": 198,
            "hostname": 1359,
            "URL": 229,
            "email": 8,
            "FileHash-SHA1": 49,
            "CIDR": 4,
            "FileHash-MD5": 11,
            "CVE": 2
          },
          "indicator_count": 2161,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d79c38e0a059039b475ebe",
          "name": "CAPE Sandbox",
          "description": "<Here is a full list of annotations and links to the research published in the journal of the Open Science.. \u00c2\u00a31.5m (3.3m euros) in its first year.>Email today from them on my line. Very wild things happening here. trying to close my line",
          "modified": "2026-04-09T12:55:23.059000",
          "created": "2026-04-09T12:31:52.495000",
          "tags": [
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "site",
            "meta",
            "verizon",
            "wireless",
            "internet",
            "phone services",
            "official",
            "shop verizon",
            "lte network",
            "get fios",
            "title",
            "code",
            "error",
            "utc na",
            "utc google",
            "tag manager",
            "gtmw2vn2cq",
            "utc dc9849921",
            "utc dc685973",
            "utc g12r1dx1lx7",
            "utc aw647962234",
            "utc aw2761768",
            "utc aw685973",
            "verizon business",
            "verizon for business",
            "verizon business account",
            "verizon business phone",
            "verizon wireless for business",
            "verizon business service",
            "verizon business plan",
            "business internet services",
            "learn",
            "gartner",
            "contact",
            "find",
            "discover",
            "support",
            "close log",
            "shop",
            "upgrade",
            "small",
            "voice",
            "chat",
            "mitre attack",
            "network info",
            "program",
            "html page",
            "t1055 process",
            "overview",
            "processes extra",
            "overview zenbox",
            "verdict",
            "guest system",
            "phishing",
            "next",
            "ver2",
            "msclkidn",
            "utc amazon",
            "analytics na",
            "utc bing",
            "vids1",
            "vids0",
            "gdlname"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737365&Signature=S%2B7RcHYjab1hbKlKwFfvUbDirFPJS1A2TJQ3bVIObMcON4PD9pRDvhMtYMCnEBrYsICi0UJCFW5eUDolL5Jlbngsc587kF36vvuhlkPprbkSOY1jOyDTpe3Qsb6jRFz3xwOfZc9S5QervoLnRKb%2FyGSyZE6ZK6TxzBrOPczPtZ7sLf9NfD6E%2B2gMRXaRjEqVwVITLG7YqCiiNuohFOuNlK3uNHFpIk53viKvBSAIqLtSklH9bHW4q1DX",
            "https://www.verizon.com/business/",
            "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737710&Signature=fbsokraSd7lsYmUfaTEl8Phs2K3hp7AtVmQU9axeEBcYmYbrrYrrfpP5lPEQaE%2Fh3%2BEP9Rn8mD8D1haqQVXCN0VVlxJ4sddjWmyC5USsgBsvUb0%2F72h1WHDS2KXHlteZWE%2Bauckabain9D5kX501AnqFY38s77OIqO6SMOkQ%2BvXiDSSRK%2FZhbfradBnei3ZLHsXGxkoshTyvB0%2BC%2F8SiUzdVsqSjik0Bn2r%2BIlLpDQK90GlZTD0N"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 772,
            "hostname": 706,
            "domain": 875,
            "FileHash-SHA256": 2348,
            "FileHash-MD5": 2237,
            "FileHash-SHA1": 2260,
            "IPv4": 442,
            "CVE": 1,
            "email": 9
          },
          "indicator_count": 9650,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d79c38622d6235b8c04603",
          "name": "CAPE Sandbox",
          "description": "<Here is a full list of annotations and links to the research published in the journal of the Open Science.. \u00c2\u00a31.5m (3.3m euros) in its first year.>Email today from them on my line. Very wild things happening here. trying to close my line",
          "modified": "2026-04-09T12:35:40.120000",
          "created": "2026-04-09T12:31:52.780000",
          "tags": [
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "site",
            "meta",
            "verizon",
            "wireless",
            "internet",
            "phone services",
            "official",
            "shop verizon",
            "lte network",
            "get fios",
            "title",
            "code",
            "error",
            "utc na",
            "utc google",
            "tag manager",
            "gtmw2vn2cq",
            "utc dc9849921",
            "utc dc685973",
            "utc g12r1dx1lx7",
            "utc aw647962234",
            "utc aw2761768",
            "utc aw685973",
            "verizon business",
            "verizon for business",
            "verizon business account",
            "verizon business phone",
            "verizon wireless for business",
            "verizon business service",
            "verizon business plan",
            "business internet services",
            "learn",
            "gartner",
            "contact",
            "find",
            "discover",
            "support",
            "close log",
            "shop",
            "upgrade",
            "small",
            "voice",
            "chat",
            "mitre attack",
            "network info",
            "program",
            "html page",
            "t1055 process",
            "overview",
            "processes extra",
            "overview zenbox",
            "verdict",
            "guest system",
            "phishing",
            "next",
            "ver2",
            "msclkidn",
            "utc amazon",
            "analytics na",
            "utc bing",
            "vids1",
            "vids0",
            "gdlname"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737365&Signature=S%2B7RcHYjab1hbKlKwFfvUbDirFPJS1A2TJQ3bVIObMcON4PD9pRDvhMtYMCnEBrYsICi0UJCFW5eUDolL5Jlbngsc587kF36vvuhlkPprbkSOY1jOyDTpe3Qsb6jRFz3xwOfZc9S5QervoLnRKb%2FyGSyZE6ZK6TxzBrOPczPtZ7sLf9NfD6E%2B2gMRXaRjEqVwVITLG7YqCiiNuohFOuNlK3uNHFpIk53viKvBSAIqLtSklH9bHW4q1DX",
            "https://www.verizon.com/business/",
            "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737710&Signature=fbsokraSd7lsYmUfaTEl8Phs2K3hp7AtVmQU9axeEBcYmYbrrYrrfpP5lPEQaE%2Fh3%2BEP9Rn8mD8D1haqQVXCN0VVlxJ4sddjWmyC5USsgBsvUb0%2F72h1WHDS2KXHlteZWE%2Bauckabain9D5kX501AnqFY38s77OIqO6SMOkQ%2BvXiDSSRK%2FZhbfradBnei3ZLHsXGxkoshTyvB0%2BC%2F8SiUzdVsqSjik0Bn2r%2BIlLpDQK90GlZTD0N"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 196,
            "hostname": 128,
            "domain": 4,
            "FileHash-SHA256": 90,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 1,
            "IPv4": 90,
            "CVE": 1
          },
          "indicator_count": 516,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "10 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf2bee5c7200ce4af4593b",
          "name": "Reconnaissance | Network Attack CREATED 9 MONTHS AGO MODIFIED 8 MONTHS AGO by Q.Vashti   credit",
          "description": "",
          "modified": "2026-04-03T02:59:00.747000",
          "created": "2026-04-03T02:54:38.204000",
          "tags": [
            "united",
            "unknown aaaa",
            "status",
            "search",
            "servers",
            "ip address",
            "domain",
            "creation date",
            "emails",
            "date",
            "passive dns",
            "urls",
            "registrar",
            "hostname add",
            "pulse submit",
            "url analysis",
            "files",
            "files ip",
            "united kingdom",
            "unknown ns",
            "entries",
            "domain add",
            "utc na",
            "utc google",
            "tag manager",
            "gb3ys36jk1z",
            "utc gtm5829vrt",
            "utc gtmk5dxr7",
            "utc linkedin",
            "insight tag",
            "secure",
            "samesitenone",
            "path",
            "expiresthu",
            "pragma",
            "expires 1",
            "secchuaarch",
            "secchuamodel",
            "sameorigin",
            "connection",
            "sha256",
            "submitted",
            "focus ip",
            "appdetex",
            "thumbprint",
            "extraction",
            "data upload",
            "sc data",
            "type",
            "extr",
            "include review",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "window memory",
            "extra window",
            "pattern match",
            "blue shield",
            "file",
            "colorado",
            "runtime process",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "program",
            "service",
            "span",
            "footer",
            "body",
            "find",
            "meta",
            "back",
            "mental",
            "download",
            "main",
            "iframe",
            "tips",
            "hybrid",
            "general",
            "local",
            "format",
            "click",
            "strings",
            "cookie"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6874a4e3316a973129ded267",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "email": 3,
            "hostname": 533,
            "FileHash-SHA256": 254,
            "URL": 2159,
            "FileHash-MD5": 30,
            "FileHash-SHA1": 46
          },
          "indicator_count": 3307,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "16 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf2bee5726541dfad53a2b",
          "name": "Reconnaissance | Network Attack CREATED 9 MONTHS AGO MODIFIED 8 MONTHS AGO by Q.Vashti   credit",
          "description": "",
          "modified": "2026-04-03T02:54:38.075000",
          "created": "2026-04-03T02:54:38.075000",
          "tags": [
            "united",
            "unknown aaaa",
            "status",
            "search",
            "servers",
            "ip address",
            "domain",
            "creation date",
            "emails",
            "date",
            "passive dns",
            "urls",
            "registrar",
            "hostname add",
            "pulse submit",
            "url analysis",
            "files",
            "files ip",
            "united kingdom",
            "unknown ns",
            "entries",
            "domain add",
            "utc na",
            "utc google",
            "tag manager",
            "gb3ys36jk1z",
            "utc gtm5829vrt",
            "utc gtmk5dxr7",
            "utc linkedin",
            "insight tag",
            "secure",
            "samesitenone",
            "path",
            "expiresthu",
            "pragma",
            "expires 1",
            "secchuaarch",
            "secchuamodel",
            "sameorigin",
            "connection",
            "sha256",
            "submitted",
            "focus ip",
            "appdetex",
            "thumbprint",
            "extraction",
            "data upload",
            "sc data",
            "type",
            "extr",
            "include review",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "window memory",
            "extra window",
            "pattern match",
            "blue shield",
            "file",
            "colorado",
            "runtime process",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "program",
            "service",
            "span",
            "footer",
            "body",
            "find",
            "meta",
            "back",
            "mental",
            "download",
            "main",
            "iframe",
            "tips",
            "hybrid",
            "general",
            "local",
            "format",
            "click",
            "strings",
            "cookie"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6874a4e3316a973129ded267",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "email": 3,
            "hostname": 527,
            "FileHash-SHA256": 254,
            "URL": 2157,
            "FileHash-MD5": 30,
            "FileHash-SHA1": 46
          },
          "indicator_count": 3299,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "16 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ccd2f7984fad6feebb4ca4",
          "name": "VirusTotal report\n                    for index.html",
          "description": "The full text of the full report-to-gws, which was published on 1 April 2026, has been published online by the Csp website, following a request from the BBC>pretext .",
          "modified": "2026-04-01T08:44:36.825000",
          "created": "2026-04-01T08:10:31.621000",
          "tags": [
            "self",
            "downlink rtt",
            "html document",
            "ascii text",
            "crlf line",
            "windows",
            "linux",
            "build web",
            "html",
            "javascript",
            "https",
            "acceptencoding",
            "cookie",
            "dynamic",
            "authorization",
            "contentmd5",
            "wp engine",
            "xmsedgeref ref",
            "bl2edge1520 ref",
            "expires sun",
            "gmt date",
            "gmt xcache",
            "tcphit",
            "gmt etag",
            "b8glwd",
            "afeap",
            "bmxagc",
            "e5bfse",
            "bgs6mb",
            "bjwmce",
            "ciztgb",
            "kqhykb",
            "cxxawb",
            "fevhcf",
            "code",
            "server",
            "registrar abuse",
            "admin country",
            "expiration date",
            "registry domain",
            "registrar iana",
            "creation date",
            "admin city",
            "redmond tech",
            "samesitelax",
            "path",
            "httponly",
            "secure",
            "priorityhigh",
            "gmt contenttype",
            "contentlength",
            "connection",
            "cfray",
            "accept",
            "anycast",
            "wifi display",
            "android",
            "hdtv",
            "anycast og",
            "anything",
            "big screen",
            "mobileoptimized",
            "try shopify",
            "platform",
            "businesses",
            "shopify fb",
            "shopify og",
            "snapchat",
            "chat",
            "snaps",
            "a snap",
            "utc google",
            "adobe dynamic",
            "tag management",
            "amazon",
            "utc amazon",
            "utc facebook",
            "connect na",
            "analytics na",
            "tag manager",
            "gdlname",
            "miss",
            "drupal",
            "miss xtimer",
            "ve9 xcache",
            "miss date",
            "gmt link",
            "build",
            "home og",
            "cloudfront",
            "iad6",
            "kb body",
            "sha256",
            "aspen",
            "aspen one",
            "return",
            "transformed og",
            "aioseo",
            "site kit",
            "google",
            "file type",
            "name file",
            "html internet",
            "unicode text",
            "utf8 text"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 238,
            "URL": 367,
            "domain": 80,
            "hostname": 155,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 105,
            "email": 5,
            "IPv4": 40,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 1109,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ccd2f93b5cf1fa8fcb0810",
          "name": "VirusTotal report\n                    for index.html",
          "description": "The full text of the full report-to-gws, which was published on 1 April 2026, has been published online by the Csp website, following a request from the BBC>pretext .",
          "modified": "2026-04-01T08:41:56.177000",
          "created": "2026-04-01T08:10:33.232000",
          "tags": [
            "self",
            "downlink rtt",
            "html document",
            "ascii text",
            "crlf line",
            "windows",
            "linux",
            "build web",
            "html",
            "javascript",
            "https",
            "acceptencoding",
            "cookie",
            "dynamic",
            "authorization",
            "contentmd5",
            "wp engine",
            "xmsedgeref ref",
            "bl2edge1520 ref",
            "expires sun",
            "gmt date",
            "gmt xcache",
            "tcphit",
            "gmt etag",
            "b8glwd",
            "afeap",
            "bmxagc",
            "e5bfse",
            "bgs6mb",
            "bjwmce",
            "ciztgb",
            "kqhykb",
            "cxxawb",
            "fevhcf",
            "code",
            "server",
            "registrar abuse",
            "admin country",
            "expiration date",
            "registry domain",
            "registrar iana",
            "creation date",
            "admin city",
            "redmond tech",
            "samesitelax",
            "path",
            "httponly",
            "secure",
            "priorityhigh",
            "gmt contenttype",
            "contentlength",
            "connection",
            "cfray",
            "accept",
            "anycast",
            "wifi display",
            "android",
            "hdtv",
            "anycast og",
            "anything",
            "big screen",
            "mobileoptimized",
            "try shopify",
            "platform",
            "businesses",
            "shopify fb",
            "shopify og",
            "snapchat",
            "chat",
            "snaps",
            "a snap",
            "utc google",
            "adobe dynamic",
            "tag management",
            "amazon",
            "utc amazon",
            "utc facebook",
            "connect na",
            "analytics na",
            "tag manager",
            "gdlname",
            "miss",
            "drupal",
            "miss xtimer",
            "ve9 xcache",
            "miss date",
            "gmt link",
            "build",
            "home og",
            "cloudfront",
            "iad6",
            "kb body",
            "sha256",
            "aspen",
            "aspen one",
            "return",
            "transformed og",
            "aioseo",
            "site kit",
            "google",
            "file type",
            "name file",
            "html internet",
            "unicode text",
            "utf8 text"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 181,
            "URL": 262,
            "domain": 28,
            "hostname": 114,
            "FileHash-MD5": 105,
            "FileHash-SHA1": 93,
            "email": 3,
            "IPv4": 34
          },
          "indicator_count": 820,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6996eacbe2d99caae4a5b2d7",
          "name": "172.69.58.33",
          "description": "potential rogue exploit kit",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-02-19T10:49:47.043000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 18,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "FileHash-SHA256": 171,
            "URL": 432,
            "domain": 629,
            "hostname": 461,
            "CIDR": 6,
            "email": 23
          },
          "indicator_count": 1800,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c78d9d025362382344355a",
          "name": "LevelBlue - Open Threat Exchange",
          "description": "Here is a full list of links to the source of a request from Amazon.com for access to content on its website: www.googletagmanager..co.uk,",
          "modified": "2026-03-28T08:16:13.889000",
          "created": "2026-03-28T08:13:17.160000",
          "tags": [
            "self",
            "sampled0",
            "lineage1",
            "sophos",
            "cybersecurity",
            "defend",
            "sophos twitter",
            "service og",
            "utc google",
            "tag manager",
            "gtmkgq9d7wc",
            "utc na",
            "utc gv88teq7eyl",
            "utc dc9570324",
            "utc aw743773256",
            "utc g9c69zcxvh6",
            "utc gtmtw8w88b",
            "utc gp5c276nxls",
            "ver2",
            "msclkidn",
            "vids0",
            "utc facebook",
            "utc gcbfbwqsrsc",
            "utc gtmmctpg8v",
            "utc gtm556n8ks"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 149,
            "domain": 23,
            "hostname": 59,
            "FileHash-SHA256": 204,
            "FileHash-MD5": 2
          },
          "indicator_count": 437,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "22 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c78d9c8826178ae1c42a22",
          "name": "LevelBlue - Open Threat Exchange",
          "description": "Here is a full list of links to the source of a request from Amazon.com for access to content on its website: www.googletagmanager..co.uk,",
          "modified": "2026-03-28T08:16:13.091000",
          "created": "2026-03-28T08:13:16.356000",
          "tags": [
            "self",
            "sampled0",
            "lineage1",
            "sophos",
            "cybersecurity",
            "defend",
            "sophos twitter",
            "service og",
            "utc google",
            "tag manager",
            "gtmkgq9d7wc",
            "utc na",
            "utc gv88teq7eyl",
            "utc dc9570324",
            "utc aw743773256",
            "utc g9c69zcxvh6",
            "utc gtmtw8w88b",
            "utc gp5c276nxls",
            "ver2",
            "msclkidn",
            "vids0",
            "utc facebook",
            "utc gcbfbwqsrsc",
            "utc gtmmctpg8v",
            "utc gtm556n8ks"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 150,
            "domain": 24,
            "hostname": 59,
            "FileHash-SHA256": 204,
            "FileHash-MD5": 2
          },
          "indicator_count": 439,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "22 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c78d9cd0b873a0573f7e88",
          "name": "LevelBlue - Open Threat Exchange",
          "description": "Here is a full list of links to the source of a request from Amazon.com for access to content on its website: www.googletagmanager..co.uk,",
          "modified": "2026-03-28T08:13:16.039000",
          "created": "2026-03-28T08:13:16.039000",
          "tags": [
            "self",
            "sampled0",
            "lineage1",
            "sophos",
            "cybersecurity",
            "defend",
            "sophos twitter",
            "service og",
            "utc google",
            "tag manager",
            "gtmkgq9d7wc",
            "utc na",
            "utc gv88teq7eyl",
            "utc dc9570324",
            "utc aw743773256",
            "utc g9c69zcxvh6",
            "utc gtmtw8w88b",
            "utc gp5c276nxls",
            "ver2",
            "msclkidn",
            "vids0",
            "utc facebook",
            "utc gcbfbwqsrsc",
            "utc gtmmctpg8v",
            "utc gtm556n8ks"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 149,
            "domain": 22,
            "hostname": 59,
            "FileHash-SHA256": 204,
            "FileHash-MD5": 2
          },
          "indicator_count": 436,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "22 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c4f8b131158f80e5e3d672",
          "name": "IDonTMIND",
          "description": "Here is the full text of the text line - IDonTMIND - that you don't have to be in crisis to text Crisis Text Line - and here is a full set of images<<hueristic smear",
          "modified": "2026-03-26T12:10:03.225000",
          "created": "2026-03-26T09:13:21.544000",
          "tags": [
            "crisis",
            "text crisis",
            "text line",
            "idontmind og",
            "google",
            "developers og",
            "privacy",
            "data collection",
            "fonts",
            "self",
            "google frontend",
            "deny",
            "data",
            "miss",
            "origin",
            "ver2",
            "vids1",
            "msclkidn",
            "adobe dynamic",
            "tag management",
            "utc na",
            "utc amazon",
            "utc google",
            "tag manager",
            "dc11992325",
            "c source",
            "ascii text",
            "secure",
            "httponly",
            "cae p3p",
            "date wed",
            "gmt server",
            "contentlength",
            "samesitelax",
            "samesitenone",
            "httponly altsvc",
            "g64eqffkshw",
            "utc gtmndv7k7v5",
            "utc g272j68fcrf",
            "airport kghg",
            "located",
            "boston",
            "b airspace"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 62,
            "domain": 5,
            "FileHash-MD5": 191,
            "hostname": 35,
            "FileHash-SHA256": 356,
            "FileHash-SHA1": 172
          },
          "indicator_count": 821,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "24 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c1e12737e9fbfd330fdc22",
          "name": "alphamountain.ai",
          "description": "DGA domain",
          "modified": "2026-03-25T02:48:08.520000",
          "created": "2026-03-24T00:56:07.456000",
          "tags": [
            "united",
            "unknown",
            "asnone country",
            "aaaa",
            "present jun",
            "present jul",
            "present sep",
            "moved",
            "a domains",
            "passive dns",
            "title",
            "date",
            "zeppelin",
            "accept",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 275,
            "FileHash-MD5": 8,
            "FileHash-SHA1": 12,
            "FileHash-SHA256": 4,
            "IPv4": 48,
            "IPv6": 203,
            "domain": 19,
            "hostname": 137
          },
          "indicator_count": 706,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "25 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c06b11f3c60c9b8e9285a6",
          "name": "Inhumane",
          "description": "Here is a full list of names you might not have known:-GTM-MX6WG5, Google Tag Manager, Facebook Custom Audience, New Relic and LiveRamp.",
          "modified": "2026-03-24T02:49:01.819000",
          "created": "2026-03-22T22:20:01.250000",
          "tags": [
            "utc na",
            "utc google",
            "utc facebook",
            "custom audience",
            "analytics na",
            "tag manager",
            "gtmmx6wg5",
            "utc aw607027800",
            "utc gbevs59l7mp",
            "utc aw955729049"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 49,
            "FileHash-SHA256": 2,
            "domain": 6,
            "URL": 302,
            "FileHash-SHA1": 3,
            "FileHash-MD5": 2,
            "IPv4": 1
          },
          "indicator_count": 365,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "26 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c093748442bdddcab64347",
          "name": "Clone by Q.Vashti credit - \" emotet-is-not-dead-yet.html\"",
          "description": "",
          "modified": "2026-03-23T02:38:59.086000",
          "created": "2026-03-23T01:12:20.012000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "spawns",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "ascii text",
            "sha256",
            "united",
            "size",
            "pattern match",
            "png image",
            "path",
            "date",
            "encrypt",
            "mask",
            "june",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "domains",
            "hashes",
            "value",
            "variables",
            "optanonwrapper",
            "parsely",
            "typeof function",
            "handlebars",
            "stq function",
            "x string",
            "optanon",
            "verified",
            "ecdsa",
            "automattic",
            "linux x8664",
            "khtml",
            "gecko",
            "aes128gcm",
            "cloudflarenet",
            "europedublin",
            "facebook",
            "accept",
            "emotet",
            "dead",
            "twitter",
            "unit",
            "thursday",
            "january",
            "google tag",
            "utc gtm53l4wgzn",
            "utc na",
            "server nginx",
            "date mon",
            "gmt contenttype",
            "connection",
            "wordpress vip",
            "https",
            "link",
            "contentencoding",
            "miss xrq",
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "resolved ips",
            "cname",
            "http",
            "ip address",
            "gmt ifnonematch",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "shutdown",
            "address port",
            "url data",
            "address range",
            "cidr",
            "network name",
            "type",
            "status",
            "whois server",
            "entity autom93",
            "handle",
            "key identifier",
            "x509v3 subject",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "thumbprint",
            "inc abuse",
            "email",
            "street",
            "service",
            "arin rdapwhois",
            "rdapwhois",
            "reporting",
            "copyright",
            "registry",
            "allocation",
            "geofeed https",
            "range",
            "name automattic",
            "parent net192",
            "net1920000",
            "net type",
            "origin as",
            "autom93",
            "restful link",
            "arin search",
            "whoisrws",
            "delegation",
            "ta0007 command",
            "control ta0011",
            "catalog tree",
            "cndigicert sha2",
            "secure server",
            "ca odigicert",
            "inc cus",
            "subject",
            "corporation cus",
            "algorithm",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "corporation c",
            "get http",
            "request",
            "response",
            "windows nt",
            "win64",
            "dns resolutions"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6846c463106765b93b44335a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 446,
            "FileHash-SHA1": 349,
            "FileHash-SHA256": 1979,
            "SSLCertFingerprint": 15,
            "URL": 362,
            "domain": 120,
            "hostname": 329,
            "CIDR": 8,
            "email": 2,
            "IPv4": 1
          },
          "indicator_count": 3611,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "27 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68b60cdecf42fb532f2ceb12",
          "name": "U of A DataBreach Update - 11.13.25",
          "description": "Domain Analysis that serves as evidence of an on-going DataBreaches at the University of Alberta with associated references.\nAnalysis demonstrates abused critical infrastructure in the Province of Alberta stemming from UAlberta as detailed in this Pulse.",
          "modified": "2025-12-13T22:01:27.739000",
          "created": "2025-09-01T21:15:10.117000",
          "tags": [
            "as16509",
            "amazon02",
            "redirect",
            "tags",
            "as14618",
            "amazonaes",
            "search",
            "public",
            "search live",
            "api blog",
            "patch http",
            "please",
            "javascript",
            "url",
            "website",
            "web",
            "scanner",
            "analyze",
            "analyzer",
            "search api",
            "make sure",
            "domain",
            "and not",
            "page",
            "home search",
            "live api",
            "blog docs",
            "pricing login",
            "greynoise",
            "visualizer skip",
            "service status",
            "company blog",
            "us careers",
            "policies vpat",
            "slo privacy",
            "cookie patent",
            "copyright",
            "google privacy",
            "sandbox",
            "reputation",
            "phishing",
            "malware",
            "amazon web",
            "services",
            "warning icon",
            "share report",
            "systems",
            "cloudflare",
            "varnish",
            "nginx",
            "apache",
            "write",
            "virus",
            "trojan",
            "ransomware",
            "static",
            "analysis",
            "indicator of compromise",
            "ioc",
            "extraction",
            "emulation",
            "online",
            "submit",
            "sample",
            "download",
            "platform",
            "course",
            "program",
            "vxstream",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "UAlberta"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/iocs",
            "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/summary",
            "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
            "https://viz.greynoise.io/ip/analysis/d90b0bd7-aaa1-4ea6-93c1-92bfd2d8f930",
            "https://urlquery.net/report/e9f9c430-fb2f-4166-8bfb-500339fdb9c0",
            "https://www.filescan.io/uploads/68b608d639a6221faa7935aa/reports/dd218cea-f81d-43ed-97fe-dd8c5aec52a3/ioc",
            "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43",
            "https://viz.greynoise.io/query/AS3359",
            "https://www.virustotal.com/graph/embed/g4022b02acb3b46ddb4b24043845853d9f56a84d80b5849188fee79c90217d4ca?theme=dark",
            "http://ci-www.threatcrowd.org/domain.php?domain=ualberta.ca",
            "https://www.urlvoid.com/dns-records-lookup/",
            "https://www.shodan.io/search?query=ualberta.ca",
            "https://dnsdumpster.com/",
            "https://bgpview.io/asn/3359#whois",
            "https://centralops.net/co/",
            "https://app.netlas.io/domains/stats/?facets=domain&indices=&q=domain%3A%2A.ualberta.ca&size=1100",
            "09.10.25 - https://viz.greynoise.io/ip/analysis/df2c8c37-f8f2-4398-b709-7c716b03b697",
            "09.10.25 - https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
            "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43/680e723df123be6c63004290",
            "https://www.criminalip.io/asset/search?query=ualberta.ca",
            "09.20.25 - https://urlscan.io/search/#page.domain%3Aualberta.ca",
            "https://app.threat.zone/submission/c70698bf-881e-491a-a582-eee634b4bf73/url-analysis-report",
            "https://whois.domaintools.com/ualberta.ca",
            "https://research.domaintools.com/research/whois-history/search/?q=ualberta.ca",
            "https://viewdns.info/iphistory/?domain=ualberta.ca",
            "https://viewdns.info/portscan/?host=ualberta.ca",
            "https://whois.easycounter.com/ualberta.ca",
            "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=ualberta.ca",
            "https://who.is/whois/ualberta.ca",
            "https://www.robtex.com/en/dns-lookup/ca/ualberta",
            "https://www.whoxy.com/ualberta.ca",
            "https://reverseip.domaintools.com/search/?q=ualberta.ca",
            "https://bgp.he.net/dns/ualberta.ca",
            "https://intelx.io/?s=ualberta.ca",
            "https://pulsedive.com/indicator/?indicator=ualberta.ca",
            "https://web.archive.org/web/20250000000000*/ualberta.ca",
            "https://crt.sh/?q=ualberta.ca&exclude=expired&group=none",
            "https://viewdns.info/traceroute/?domain=ualberta.ca",
            "https://centralops.net/co/DomainDossier.aspx",
            "https://search.odin.io/hosts?query=ualberta.ca",
            "https://www.merklemap.com/search?query=ualberta.ca&page=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 9901,
            "domain": 790,
            "email": 982,
            "hostname": 10520,
            "FileHash-MD5": 550,
            "FileHash-SHA256": 1726,
            "FileHash-SHA1": 519,
            "SSLCertFingerprint": 64,
            "CIDR": 26,
            "CVE": 12
          },
          "indicator_count": 25090,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "126 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68fd0cc422cea2fd989581fd",
          "name": "LevelBlue - Open Threat Exchange (Malicious Attacks)",
          "description": "I\u2019ll\nrefer to these bad actors as the .lol .fun group. London, Australia , South Africa with US base External resources. With this group, you e probably met though attackers.. OTX errors! Difficult to pulse. There are some profiles in here that are shady and attempt or do co connect to your products. They usually begin social engineering by saying that you have a \u2018problem\u2019 just like they do. Say they are from Canada or\nFrance , somewhere abroad when they are down the street using your services. There was user \u2018Merkd\u2019 whose entire system seem to become infected by someone or someone about this platform. Check the IP address at all\nTo see if it matches or is on the same block as OTC, region will show as well. Hackers may potentially cnc / move your profile on their own block. What happened today was weird. Alien Vault became a PHP and turned bright pink and black, requesting I download page. Keep your systems locked down if you\u2019re researching not reporting vulnerabilities.",
          "modified": "2025-11-24T17:02:12.441000",
          "created": "2025-10-25T17:45:40.291000",
          "tags": [
            "ipv4",
            "levelblue",
            "open threat",
            "date sat",
            "connection",
            "etag w",
            "cloudfront",
            "sameorigin age",
            "vary",
            "ip address",
            "kb body",
            "gtmkvjvztk",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "learn",
            "exchange og",
            "levelblue open",
            "threat exchange",
            "exchange",
            "google tag",
            "iocs",
            "search otx",
            "included iocs",
            "review iocs",
            "data upload",
            "extraction",
            "layer protocol",
            "v full",
            "reports v",
            "port t1571",
            "t1573",
            "oc0006 http",
            "c0014",
            "get http",
            "dns resolutions",
            "user",
            "data",
            "datacrashpad",
            "edge",
            "tag manager",
            "us er",
            "help files",
            "shell",
            "html",
            "cve202323397",
            "iframe tags",
            "community score",
            "url http",
            "url https",
            "united",
            "united kingdom",
            "netherlands",
            "search",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "indicator role",
            "title added",
            "active related",
            "otc oct",
            "report spam",
            "week ago",
            "scan",
            "learn more",
            "filehashmd5",
            "filehashsha1",
            "domain",
            "australia",
            "does",
            "josh",
            "created",
            "filehashsha256",
            "present jul",
            "present oct",
            "date",
            "a domains",
            "script urls",
            "for privacy",
            "moved",
            "script domains",
            "meta",
            "title",
            "body",
            "pragma",
            "encrypt",
            "ck ids",
            "t1060",
            "run keys",
            "startup",
            "folder",
            "t1027",
            "files",
            "information",
            "t1055",
            "injection",
            "capture",
            "south korea",
            "malaysia",
            "pulses",
            "fatal error",
            "hacker known",
            "name",
            "unknown",
            "risk",
            "weeks ago",
            "scary",
            "sova",
            "colorado",
            "wire",
            "name unknown",
            "thursday",
            "denver",
            "types of",
            "indicators hong",
            "kong",
            "tsara brashears",
            "african",
            "ethiopia",
            "b8reactjs",
            "india",
            "america",
            "x ua",
            "hostname",
            "dicator role",
            "pulses url",
            "airplane",
            "icator role",
            "t1432",
            "access contact",
            "list",
            "t1525",
            "image",
            "security scan",
            "heuristic oct",
            "discovery",
            "t1069",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1114",
            "t1480",
            "internal image",
            "brian sabey",
            "month ago",
            "modified",
            "days ago",
            "green well",
            "sabey stash",
            "service",
            "t1040",
            "sniffing",
            "t1045",
            "packing",
            "t1053",
            "taskjob"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Sova",
              "display_name": "Sova",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1525",
              "name": "Implant Internal Image",
              "display_name": "T1525 - Implant Internal Image"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1448",
              "name": "Carrier Billing Fraud",
              "display_name": "T1448 - Carrier Billing Fraud"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 956,
            "FileHash-SHA1": 906,
            "FileHash-SHA256": 2651,
            "URL": 4450,
            "domain": 708,
            "hostname": 2403,
            "CVE": 1,
            "email": 5
          },
          "indicator_count": 12080,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "146 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68886564cdc44059c7b2ef08",
          "name": "Denver Apartment Community website with multiple compromises",
          "description": "Network of a multi block Denver Townhome complex experiencing issues with info stealing, password o, spyware, ransomware, malware\u2026 \u2022Win.Trojan.Crypted-30\tPWS:Win32/Zbot\u2022(phish_alert_sp2_2.0.0.0) \u2022 (phish_alert_sp1_1.0.0.0 )(30)_url_001.bin\tFile detected as \"image\", this format is not supported on WINDOWS\terror\t\nMay 23rd 2023 06:20:30 (UTC)\tRe__Motherson_INVENSITY_Project_Discussion_url_001.bin\tFile \"Re__Motherson_INVENSITY_Project_Discussion_url_001.bin\" was detected as \"image\", this format is not supported on WINDOWS\terror\t\nMay 5th 2023 07:59:14 (UTC)\tRE XDR Roadmap Planning Workshop for Temasek Polytechnic_url_007.bin\tFile \"RE XDR Roadmap Planning Workshop for Temasek Polytechnic_url_007.bin\" was detected as \"image\", this format is not supported on WINDOWS\terror",
          "modified": "2025-08-28T06:00:46.366000",
          "created": "2025-07-29T06:08:36.770000",
          "tags": [
            "context related",
            "associated urls",
            "community",
            "present jul",
            "present jun",
            "present may",
            "present apr",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present showing",
            "sha256",
            "submitted",
            "urls",
            "passive dns",
            "http",
            "unique",
            "ip asn",
            "as701 verizon",
            "url add",
            "pulse pulses",
            "ip address",
            "related nids",
            "windows error",
            "file",
            "re xdr",
            "workshop",
            "march",
            "february",
            "january",
            "windows nt",
            "klpx",
            "span",
            "script",
            "united",
            "indicator",
            "appdata",
            "pattern match",
            "runtime process",
            "copy md5",
            "iframe",
            "date",
            "jquery",
            "null",
            "solid",
            "code",
            "summer",
            "polish",
            "body",
            "hybrid",
            "general",
            "local",
            "accept",
            "click",
            "strings",
            "music",
            "class",
            "core",
            "contact",
            "flag",
            "united kingdom",
            "name server",
            "tcp system",
            "private limited",
            "prefetch2",
            "dns requests",
            "win32",
            "mtb jul",
            "susp",
            "worm",
            "trojan",
            "entries",
            "next associated",
            "mtb apr",
            "showing",
            "trojandropper",
            "virtool",
            "country",
            "csc corporate",
            "domains",
            "ransom",
            "lowfi",
            "urls show",
            "date checked",
            "url hostname",
            "domain address",
            "learn",
            "command",
            "control att",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "t1105 ingress",
            "tool transfer",
            "t1573 encrypted",
            "dynamicloader",
            "medium",
            "yara rule",
            "high",
            "windows",
            "remote data",
            "http traffic",
            "installs",
            "windows startup",
            "malware",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1134,
            "hostname": 292,
            "domain": 197,
            "FileHash-MD5": 139,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 708,
            "email": 2
          },
          "indicator_count": 2602,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "234 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "688865644a38fd5eef407891",
          "name": "Denver Apartment Community website with multiple compromises",
          "description": "Network of a multi block Denver Townhome complex experiencing issues with info stealing, password o, spyware, ransomware, malware\u2026 \u2022Win.Trojan.Crypted-30\tPWS:Win32/Zbot\u2022(phish_alert_sp2_2.0.0.0) \u2022 (phish_alert_sp1_1.0.0.0 )(30)_url_001.bin\tFile detected as \"image\", this format is not supported on WINDOWS\terror\t\nMay 23rd 2023 06:20:30 (UTC)\tRe__Motherson_INVENSITY_Project_Discussion_url_001.bin\tFile \"Re__Motherson_INVENSITY_Project_Discussion_url_001.bin\" was detected as \"image\", this format is not supported on WINDOWS\terror\t\nMay 5th 2023 07:59:14 (UTC)\tRE XDR Roadmap Planning Workshop for Temasek Polytechnic_url_007.bin\tFile \"RE XDR Roadmap Planning Workshop for Temasek Polytechnic_url_007.bin\" was detected as \"image\", this format is not supported on WINDOWS\terror",
          "modified": "2025-08-28T06:00:46.366000",
          "created": "2025-07-29T06:08:36.869000",
          "tags": [
            "context related",
            "associated urls",
            "community",
            "present jul",
            "present jun",
            "present may",
            "present apr",
            "checked url",
            "hostname server",
            "response ip",
            "address google",
            "safe browsing",
            "present showing",
            "sha256",
            "submitted",
            "urls",
            "passive dns",
            "http",
            "unique",
            "ip asn",
            "as701 verizon",
            "url add",
            "pulse pulses",
            "ip address",
            "related nids",
            "windows error",
            "file",
            "re xdr",
            "workshop",
            "march",
            "february",
            "january",
            "windows nt",
            "klpx",
            "span",
            "script",
            "united",
            "indicator",
            "appdata",
            "pattern match",
            "runtime process",
            "copy md5",
            "iframe",
            "date",
            "jquery",
            "null",
            "solid",
            "code",
            "summer",
            "polish",
            "body",
            "hybrid",
            "general",
            "local",
            "accept",
            "click",
            "strings",
            "music",
            "class",
            "core",
            "contact",
            "flag",
            "united kingdom",
            "name server",
            "tcp system",
            "private limited",
            "prefetch2",
            "dns requests",
            "win32",
            "mtb jul",
            "susp",
            "worm",
            "trojan",
            "entries",
            "next associated",
            "mtb apr",
            "showing",
            "trojandropper",
            "virtool",
            "country",
            "csc corporate",
            "domains",
            "ransom",
            "lowfi",
            "urls show",
            "date checked",
            "url hostname",
            "domain address",
            "learn",
            "command",
            "control att",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "t1105 ingress",
            "tool transfer",
            "t1573 encrypted",
            "dynamicloader",
            "medium",
            "yara rule",
            "high",
            "windows",
            "remote data",
            "http traffic",
            "installs",
            "windows startup",
            "malware",
            "copy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1134,
            "hostname": 292,
            "domain": 197,
            "FileHash-MD5": 139,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 708,
            "email": 2
          },
          "indicator_count": 2602,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "234 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687d91b1a8f414040bfba430",
          "name": "Spyware",
          "description": "And I've been walking, talking\nBelieving the things that are true\nAnd I've been finding\nThe difference between right and wrong, bad and good\nSee me put things together\nPut them back where they belong\nWhen I look at each other\nHave I always been singing the same song?\n\nShe said\nThis is a perfect world\nRiding on an incline\nI'm staring in your face\nYou'll photograph mine\n\nI-I-I-I-I\nWhoo, ah-ha-ha\nHa-ha-ha-ha-ha-ha\n\nSomebody said that it happens all over the world\nI do believe that it's true (\u2022o\u2022)\n#spyware #MaaS #malvertizing #bullyfor$ #unethical #dangerous_tool",
          "modified": "2025-08-20T00:01:59.498000",
          "created": "2025-07-21T01:02:41.049000",
          "tags": [
            "serving ip",
            "address",
            "status",
            "utc na",
            "utc google",
            "utc facebook",
            "custom audience",
            "tag manager",
            "ua748443502",
            "utc gtmwrp73mt",
            "utc gsrdlm5jnx1",
            "utc aw937838002",
            "adsense na",
            "connect",
            "file type",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "powershell",
            "b file",
            "ta0004 defense",
            "evasion ta0005",
            "command",
            "control ta0011",
            "c0002 wininet",
            "number",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "corporation cus",
            "algorithm",
            "cndigicert sha2",
            "secure server",
            "ca odigicert",
            "inc cus",
            "subject",
            "cnwe1 ogoogle",
            "trust",
            "cnmicrosoft ecc",
            "update secure",
            "server ca",
            "omicrosoft",
            "get http",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "united",
            "search",
            "creation date",
            "expiration date",
            "name servers",
            "unknown soa",
            "germany unknown",
            "entries",
            "pulse submit",
            "url analysis",
            "date"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 304,
            "hostname": 796,
            "URL": 2590,
            "FileHash-SHA256": 2735,
            "FileHash-MD5": 253,
            "FileHash-SHA1": 144,
            "email": 1
          },
          "indicator_count": 6823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "242 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6874a4e3316a973129ded267",
          "name": "Reconnaissance | Network Attack",
          "description": "",
          "modified": "2025-08-13T06:00:10.383000",
          "created": "2025-07-14T06:34:11.063000",
          "tags": [
            "united",
            "unknown aaaa",
            "status",
            "search",
            "servers",
            "ip address",
            "domain",
            "creation date",
            "emails",
            "date",
            "passive dns",
            "urls",
            "registrar",
            "hostname add",
            "pulse submit",
            "url analysis",
            "files",
            "files ip",
            "united kingdom",
            "unknown ns",
            "entries",
            "domain add",
            "utc na",
            "utc google",
            "tag manager",
            "gb3ys36jk1z",
            "utc gtm5829vrt",
            "utc gtmk5dxr7",
            "utc linkedin",
            "insight tag",
            "secure",
            "samesitenone",
            "path",
            "expiresthu",
            "pragma",
            "expires 1",
            "secchuaarch",
            "secchuamodel",
            "sameorigin",
            "connection",
            "sha256",
            "submitted",
            "focus ip",
            "appdetex",
            "thumbprint",
            "extraction",
            "data upload",
            "sc data",
            "type",
            "extr",
            "include review",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "javascript",
            "window memory",
            "extra window",
            "pattern match",
            "blue shield",
            "file",
            "colorado",
            "runtime process",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "program",
            "service",
            "span",
            "footer",
            "body",
            "find",
            "meta",
            "back",
            "mental",
            "download",
            "main",
            "iframe",
            "tips",
            "hybrid",
            "general",
            "local",
            "format",
            "click",
            "strings",
            "cookie"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "email": 3,
            "hostname": 527,
            "FileHash-SHA256": 254,
            "URL": 2157,
            "FileHash-MD5": 30,
            "FileHash-SHA1": 46
          },
          "indicator_count": 3299,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "249 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "687479e7b4cd29304527a9b6",
          "name": "IDK OTX - LevelBlue - Open Threat Exchange",
          "description": "Something\u2019s, someone is successfully hacking all our accounts on OTX. IS this a subsidiary of AT&T ? What is this?",
          "modified": "2025-08-13T03:00:55.577000",
          "created": "2025-07-14T03:30:47.687000",
          "tags": [
            "google tag",
            "utc gtmkvjvztk",
            "connection",
            "gmt date",
            "gmt etag",
            "referrerpolicy",
            "xcache error",
            "cloudfront",
            "utc google",
            "tag manager",
            "gtmkvjvztk",
            "utc gcfezl5ynvb",
            "utc na",
            "utc linkedin",
            "insight tag",
            "learn",
            "open threat",
            "exchange meta",
            "alienvault",
            "levelblue",
            "exchange og",
            "levelblue open",
            "threat exchange",
            "trackers",
            "amazon",
            "net3128001",
            "net3168001",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "entity amazon4",
            "handle",
            "extraction",
            "data upload",
            "type",
            "please sub",
            "include",
            "review data",
            "exclude",
            "sugges",
            "enter source",
            "url or",
            "texurag",
            "drop",
            "oiprop",
            "enter sourue",
            "url uk",
            "tenkau",
            "drop or",
            "drowol type",
            "extr please",
            "included iocs",
            "sc tenn",
            "drow type",
            "data",
            "failed",
            "extre data",
            "please",
            "tima",
            "pulse",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "mitre att",
            "ascii text",
            "pattern match",
            "ck id",
            "show technique",
            "hybrid",
            "date",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "se extraction",
            "enter sc",
            "oidrop",
            "extract",
            "review io",
            "excluded ous",
            "u suggested",
            "stop data",
            "extraction fa",
            "enter sou",
            "se source",
            "iocs",
            "manually add",
            "indicator",
            "extra",
            "extra data",
            "review los",
            "exclude data",
            "suggestealous u"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 132,
            "FileHash-SHA256": 751,
            "hostname": 614,
            "URL": 48,
            "CIDR": 3,
            "domain": 36,
            "FileHash-SHA1": 127
          },
          "indicator_count": 1711,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "249 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68743465f53cdee0dcd25195",
          "name": "Attack on LevelBlue - OTX | Stealer? Cloudfront?",
          "description": "Strange incidents on OTX.\n1. Can\u2019t finish adding IoC\u2019s for a small\nOlor large pulse.\n2. I can annotate in rare occasions.\n3. The worst is there is a team of us working on Tsara Brashears using this tool on downtime. Yesterday there were over 1000 pulses now there are more only 144. There were 100\u2019s of indicators now it read 0 indicators on my end. 4. Tsara  or Tsara Brashears goes to an IP with an unsigned signature 5. Receiving emails re: pulses pulsed years ago.  ||\n\nThis is the second time and the largest grab. Other pulses are missing information regarding very concerning IoC\u2019s. The information truly needs to be restored. It is checked every time there is a login. \n\nFurther research is needed, the information is being stolen quickly and all devices ever used are still available. \n\n\nOpen Threat Exchange, I feel threatened. I noticed malware expert dorkingbeauty (and others with related content) has some pulses with 0 IoC\u2019s  and has seemingly abandoned platform?",
          "modified": "2025-08-12T00:00:35.297000",
          "created": "2025-07-13T22:34:13.242000",
          "tags": [
            "data upload",
            "extraction",
            "gtmkvjvztk",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "learn",
            "levelblue",
            "open threat",
            "exchange og",
            "levelblue open",
            "threat exchange",
            "exchange",
            "cloudfront",
            "contenttype",
            "connection",
            "date sun",
            "gmt etag",
            "united",
            "country",
            "alienvault name",
            "server",
            "date",
            "flag",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha256",
            "sha1",
            "size",
            "script",
            "segoe ui",
            "div id",
            "beginstring",
            "meta",
            "null",
            "error",
            "body",
            "click",
            "roboto",
            "path",
            "strings",
            "refresh",
            "tools",
            "onload",
            "span",
            "iframe",
            "pattern match",
            "ascii text",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "show process",
            "utf8",
            "crlf line",
            "unicode text",
            "local",
            "starfield",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "spawns",
            "ck techniques",
            "evasion att",
            "t1480 execution",
            "y ts",
            "include review",
            "exclude sugges",
            "uny incuat",
            "find s",
            "typ no",
            "failed",
            "extra data",
            "included ous",
            "review ic",
            "excludea tous",
            "suggeste data",
            "find suresteu",
            "type indicaloka"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 107,
            "FileHash-SHA256": 187,
            "hostname": 25,
            "FileHash-MD5": 30,
            "FileHash-SHA1": 31,
            "domain": 30,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 413,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846c463106765b93b44335a",
          "name": "emotet-is-not-dead-yet.html",
          "description": "https://blogs.vmware.com/\n\n[ emotet-is-not-dead-yet.html ]\n\nFileHash-SHA256\n3f7f582dc3ea77d4a5ca6d5d1964ae459d6a187c9c5d49cbd3405447975e4f15 ||\n\nCrowdsourced IDS:\nMatches rule PROTOCOL-ICMP PATH MTU denial of service attempt\nMatches rule PROTOCOL-ICMP Destination Unreachable Fragmentation Needed and DF bit was set\nMatches rule PROTOCOL-ICMP Echo Reply",
          "modified": "2025-07-09T11:03:10.334000",
          "created": "2025-06-09T11:24:19.234000",
          "tags": [
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "ssl certificate",
            "spawns",
            "sha1",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "ascii text",
            "sha256",
            "united",
            "size",
            "pattern match",
            "png image",
            "path",
            "date",
            "encrypt",
            "mask",
            "june",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "domains",
            "hashes",
            "value",
            "variables",
            "optanonwrapper",
            "parsely",
            "typeof function",
            "handlebars",
            "stq function",
            "x string",
            "optanon",
            "verified",
            "ecdsa",
            "automattic",
            "linux x8664",
            "khtml",
            "gecko",
            "aes128gcm",
            "cloudflarenet",
            "europedublin",
            "facebook",
            "accept",
            "emotet",
            "dead",
            "twitter",
            "unit",
            "thursday",
            "january",
            "google tag",
            "utc gtm53l4wgzn",
            "utc na",
            "server nginx",
            "date mon",
            "gmt contenttype",
            "connection",
            "wordpress vip",
            "https",
            "link",
            "contentencoding",
            "miss xrq",
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "resolved ips",
            "cname",
            "http",
            "ip address",
            "gmt ifnonematch",
            "info file",
            "network dropped",
            "duration cuckoo",
            "version file",
            "machine label",
            "shutdown",
            "address port",
            "url data",
            "address range",
            "cidr",
            "network name",
            "type",
            "status",
            "whois server",
            "entity autom93",
            "handle",
            "key identifier",
            "x509v3 subject",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne6",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "thumbprint",
            "inc abuse",
            "email",
            "street",
            "service",
            "arin rdapwhois",
            "rdapwhois",
            "reporting",
            "copyright",
            "registry",
            "allocation",
            "geofeed https",
            "range",
            "name automattic",
            "parent net192",
            "net1920000",
            "net type",
            "origin as",
            "autom93",
            "restful link",
            "arin search",
            "whoisrws",
            "delegation",
            "ta0007 command",
            "control ta0011",
            "catalog tree",
            "cndigicert sha2",
            "secure server",
            "ca odigicert",
            "inc cus",
            "subject",
            "corporation cus",
            "algorithm",
            "azure rsa",
            "tls issuing",
            "cus subject",
            "stwa lredmond",
            "corporation c",
            "get http",
            "request",
            "response",
            "windows nt",
            "win64",
            "dns resolutions"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 446,
            "FileHash-SHA1": 349,
            "FileHash-SHA256": 1979,
            "SSLCertFingerprint": 15,
            "URL": 361,
            "domain": 120,
            "hostname": 329,
            "CIDR": 8,
            "email": 2
          },
          "indicator_count": 3609,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66ae5afda5bae047f7433aaa",
          "name": "hxxps://nait[.]ca - 05.05.25",
          "description": "Detected (08.05.24 via DNS Twist) TLD Compromise: TLD -> Addition, bitsquatting, dictionary, homoglyph, omission, replacement, tld-swap, transposition, vowel-swap problems\nAdded Malcore IOCs: https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
          "modified": "2025-06-05T02:05:37.765000",
          "created": "2024-08-03T16:29:49.667000",
          "tags": [
            "entity",
            "please",
            "javascript",
            "UAlberta"
          ],
          "references": [
            "https://www.virustotal.com/graph/embed/gbd9dc992da5f49728d22429d5552c000303449923a744f018453892e1abeca74?theme=dark",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/iocs",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/summary",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/graph",
            "https://dnstwist.it/#7c697f80-c2c3-43a2-85c0-05ed178bb050",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/66b3cdc90a0b888d183249be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
            "https://www.filescan.io/uploads/68197948d95f3e34e9615af0/reports/7b5b7977-b6ee-49c0-af35-1ee866e64e4e/ioc",
            "https://www.hybrid-analysis.com/sample/cc2438f2ce5688ebea0b6fc1d556d44e0384ba1651dee3c30fc5ed4c595a40b6/6819791dee8ee1fe7b07b5d4",
            "https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Telecommunications",
            "Energy",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 54,
            "FileHash-SHA1": 53,
            "FileHash-SHA256": 549,
            "domain": 970,
            "hostname": 891,
            "URL": 735,
            "SSLCertFingerprint": 474,
            "email": 10
          },
          "indicator_count": 3736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 129,
          "modified_text": "318 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67db9be18168bc23126a0f17",
          "name": "Falcon Sandbox (Hybrid Analysis), FileScan[.]io & URLScan[.]io - UAlberta[.]ca domain analysis",
          "description": "Domain Analysis of hxxp://ualberta[.]ca w. Hybrid Analysis, Filescan, URLscan\n-Followed up w. analysis of previously submitted URLscan submissions w. an analysis by Greynoise[.]io (up to 03.19.25)\n-Greynoise yielded (from URLScan 120 Identified & 10 Unknowns) - the results classified as RIOTS appear to be confounded (potential abuse of Amazon Web Services in combination w. other cloud provider services.\n-It appears just visiting and/or touching this domain is - generally not recommended\n-Results from PulseDive -> Redirects to: https://www.ualberta[.]ca/en/index.html // SSL certificate found: ualberta[.]ca and 239 more. Edmonton, Canada, University of Alberta. dnsmaster@ualberta.ca\neasyDNS Technologies Inc. Amazon ALB, Amazon Cloudfront, Apache HTTP Server, Bootstrap, Coveo, Crazy Egg, Facebook Pixel, Font Awesome, Google Analytics, Google Font API, jQuery, Linkedin Insight Tag, Microsoft Clarity, Open Graph, TikTok Pixel, Twitter Ads",
          "modified": "2025-04-19T04:02:16.037000",
          "created": "2025-03-20T04:38:57.551000",
          "tags": [
            "as16509",
            "amazon02",
            "redirect",
            "as14618",
            "amazonaes",
            "search",
            "public",
            "home search",
            "live api",
            "blog docs",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "pcap processing",
            "ansi",
            "pcap",
            "gecko",
            "win64",
            "khtml",
            "windows nt",
            "brand",
            "prefetch8 ansi",
            "microsoft edge",
            "date",
            "cookie",
            "mozilla",
            "suspicious",
            "comspec",
            "window",
            "model",
            "hybrid",
            "accept",
            "hacked",
            "starfield",
            "encrypt",
            "close",
            "click",
            "twitter",
            "hosts",
            "service",
            "general",
            "path",
            "union",
            "dest",
            "strings",
            "contact"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/dea64c4ce5cd9b55fb634888e4c6530728e266c8cb6d2bf670a9fe9e3f712c43/67db93032dc368d2d80c3df1",
            "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
            "https://www.filescan.io/uploads/67db2f67b93e688233ef36e9/reports/7e4e4377-5eb9-48a7-848d-bfdca4fb244c/ioc",
            "https://hybrid-analysis.com/sample/dea64c4ce5cd9b55fb634888e4c6530728e266c8cb6d2bf670a9fe9e3f712c43",
            "https://hybrid-analysis.com/sample/dea64c4ce5cd9b55fb634888e4c6530728e266c8cb6d2bf670a9fe9e3f712c43/67db93032dc368d2d80c3df1",
            "https://viz.greynoise.io/analysis/5692e934-322f-48b9-bd9b-556e653ff5b6",
            "https://pulsedive.com/ioc/ualberta.ca"
          ],
          "public": 1,
          "adversary": "dosdean@ualberta[.]ca // ciso@ualberta[.]ca",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Agriculture",
            "Healthcare",
            "Chemical",
            "Finance",
            "Media"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 897,
            "domain": 37,
            "email": 34,
            "hostname": 396,
            "FileHash-MD5": 71,
            "FileHash-SHA1": 69,
            "FileHash-SHA256": 69,
            "SSLCertFingerprint": 23
          },
          "indicator_count": 1596,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "365 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6647908c09468f42bc1249f1",
          "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
          "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
          "modified": "2025-03-01T04:59:57.222000",
          "created": "2024-05-17T17:14:52.317000",
          "tags": [
            "false",
            "true",
            "visible",
            "application",
            "microsoft teams",
            "microsoft azure",
            "office",
            "service",
            "dynamics",
            "hidden",
            "android",
            "explorer",
            "write",
            "connector",
            "test",
            "sharepoint",
            "live",
            "meister",
            "tools",
            "desktop",
            "spark",
            "front",
            "enterprise",
            "designer",
            "atlas",
            "premium",
            "assistant",
            "allow",
            "azureadmyorg",
            "game",
            "verify",
            "microsoft power",
            "channelsurfcli",
            "mtd1",
            "file transfer",
            "magnus",
            "microsoft crm",
            "youth"
          ],
          "references": [
            "All - EnterpriseAppsList.csv",
            "AppRegistrationList.csv",
            "https://tria.ge/240517-vc7c1shc62/behavioral1",
            "https://tria.ge/240517-vdwb5shc71/behavioral1",
            "https://tria.ge/240517-vqxezaaa33/behavioral1",
            "https://tria.ge/240517-t9pc2ahb2t",
            "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
            "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
            "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
            "Thor Scan: S-I9VvMTB6cZU",
            "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
            "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
            "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
            "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
            "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
            "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
            "https://tria.ge/240521-q4s79agb25/static1",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
            "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
            "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
            "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
            "https://www.hudsonrock.com/search?domain=ualberta.ca",
            "https://www.criminalip.io/domain/report?scan_id=13798622",
            "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
            "https://urlscan.io/search/#ualberta.ca",
            "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
            "https://sitereport.netcraft.com/?url=http://ualberta.ca",
            "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
            "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
            "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
            "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 7,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1703,
            "FileHash-SHA256": 90472,
            "URL": 99185,
            "domain": 82954,
            "hostname": 39041,
            "FileHash-SHA1": 1624,
            "email": 4658,
            "CVE": 12
          },
          "indicator_count": 319649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66d490668683aec2631cfa20",
          "name": "Jeffrey Reimer DPT Tsara Brashears Court Records | Trellis.Law",
          "description": "Phishing expedition: Malicious bait. Threat actor/s attempting to hack whoever can see and clicks on link. The URl is parked, is malicious, attempts infiltrate device.",
          "modified": "2024-11-05T00:02:43.336000",
          "created": "2024-09-01T16:03:50.411000",
          "tags": [
            "reimer-jeffrey-v-brashears-tsara",
            "2017cv030026  suppressed",
            "case 2017cv030026  suppressed",
            "docket",
            "legal case",
            "legal",
            "litigation",
            "court cases",
            "state court docket",
            "robert r",
            "lung",
            "county",
            "case",
            "money",
            "ben l",
            "leutwyler iii",
            "reimer",
            "brashears",
            "douglas county",
            "tips",
            "district",
            "date",
            "judge",
            "shane",
            "bank",
            "contact",
            "service",
            "brashears accepts",
            "jeffrey scott",
            "reimer dpt",
            "reimer paid",
            "sa victim",
            "settlement",
            "reimer-jeffrey-paid-tsara-brahears-settlement",
            "reimer-jeffrey-claim-dismissed",
            "brashears-tsara-claims-upheld",
            "reverse dns",
            "general full",
            "protocol h2",
            "security tls",
            "resource",
            "united",
            "hash",
            "name value",
            "security",
            "main",
            "facebook",
            "brashears-tsara-v-reimer-jeffrey",
            "so false",
            "as134548 dxtl",
            "kwan o",
            "hong kong",
            "passive dns",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "export graph",
            "historical ssl",
            "referrer",
            "gameprofitshack",
            "webstudio",
            "smartdata",
            "alloymedia",
            "industries",
            "theakkas",
            "korplug",
            "default",
            "module load",
            "t1129",
            "show",
            "search",
            "regbinary",
            "malware beacon",
            "upatre",
            "suspicious",
            "trojan",
            "copy",
            "dock",
            "downloader",
            "loader",
            "write",
            "malware",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "related pulses",
            "dashboard",
            "browse scan",
            "endpoints all",
            "showing",
            "p2p zeus",
            "september",
            "popper",
            "cookies",
            "x function",
            "hsp boolean",
            "oribili boolean",
            "hstcran",
            "hsusertoken",
            "domainpath name",
            "ns nxdomain",
            "parked",
            "tsara won",
            "brashears prevails",
            "reimer dismissal",
            "dangerous data collection",
            "get device",
            "parked uri"
          ],
          "references": [
            "Scam Aggregators: https://trellis.law/case/8035/2017cv030026-suppressed/reimer-jeffrey-v-brashears-tsara [parked here: ctjsz.com]",
            "http://www.qq664.com/seximanhua/22128.html [looks legit to me]",
            "sex2e.com  | http://qq664.com/seximanhua/22128.html [trellis.law]",
            "https://prnbae.com/191693/at-37-ellie-discovers-the-unique-sensations-of-double-vaginal-sex/ [trellis.law]",
            "http://www.philippinesredcat.com/girls-for-sex-in-manila/ [trellis.law]",
            "http://us.1.powerfront.com/thehealthylivingshow/scripts/redir.asp?link=https://www.sexbestgals.info/cougar-porn/ [trellis.law]",
            "https://help.competitionsuite.com/article/76-using-the-judge-app-tablets",
            "https://www.paidhmars.com/",
            "https://urlscan.io/result/e4ed8a1d-1b23-46cd-a237-a2ad4e974fc3/content/",
            "False: This case was filed in Douglas County Superior Courts with Jeffrey K Holmes presiding. | Who is he?",
            "False: Never served. Had several PI's and background checks",
            "Jeffrey Scott Reimer DPT was allegedly arrested 02/14/2022 |  Very unreliable self proclaimed PI's (multiple)",
            "Brian Sabey begged victim to accept tiny settlement. Contingency, 'Brashears may use  settlement to find hacker.'",
            "Judge Shay Whittaker dismissed Reimers 'malicious' prosecution claom",
            "Reimers case V Brashears in 2017 after Denver Police Major Crimes located Reimer",
            "Brashears documented on corr record she wanted to proceed with case",
            "Brian Sabey Speaking for Jeffrey Scott Reimer DPT refused further court proceedings",
            "Brian Sabey offered Brashears a settlement. Begged her to accept it.",
            "Case: Defamation of character based on truthful reviews left on HealthGrades.",
            "A series of reviews detailing Jeffrey Reimer DPT egregious behavior proved not left by Brashears except 2 with comments -4",
            "Brashears Review: 'He would benefit from more training' [Very considerate considering the complimentary spinal cord injuries 'plural']",
            "Health Grades erased 20+ positive reviews that originated from Reimers email address.",
            "Most of not all  positive Jeffrey Reimer DPT reviews are false.  Reimer wasn't practicing when 'amazing' trat,ent alleged",
            "Brian Sabey. Esq filed motion to dismiss after judge dismissed Reimers meritlesscase",
            "Brian Sabey would  be most foolish after it was determined Brashears was 100% disabled. This was cause by Jeffrey Scott Reimer DPT",
            "Brashears would gladly go to court as stated in court documents to then judge who wished to be briefed by Brashears. Thwarted by Sabey.",
            "Brian Sabey wanted to appear to win. Sandy demanded Brashears remove every patients negative review about Jeffrey Reimer DPT",
            "Brian Sabey had cashiers check delivered to Brashears in person.",
            "Victim is willing to have her attorney post entire court proceedings online , on YouTube and more",
            "There is NO other physical therapist with as many reviews as Jeffrey Reimer DPT, even non offenders. Reimers clientele is largely non-english speaking.",
            "Reimer often criticized non English speakers, large women and short Hispanic men according to witness.",
            "He also spoke frequently about Brashears infamously 'real' large bosom and figure. He decided to touch, grab, grope, assault,injure, beg for more",
            "Jeffrey Scott Reimer PT , DPT. assaulters defense: 'I had to be of the top/front of Brashears, She consented!'",
            "False: Brashears didn't expect this coming. Jeffrey Reimer DPT suddenly jumped on top of Brashears and tried to start a family. He didn't ask.",
            "Unless tampered with, court records will show Brashears dropped as a patient to be told she'd face legal consequences if she did.",
            "Survivor was told an investigation would begin, she'd be safe among other careless things her MD advised",
            "Brashears would LOVE for the true court proceedings to be read. She feels they were hacked away. DougCo was unable to 'print' records 'glitch'",
            "Did I mention she prevailed, won, got a check? Tsara Lynn Brashears survivor; won her counter claim. Weak Reimer claim burned like a dying moth.",
            "Trellis: 3.223.115.185 In cloud provider range: provider=AWS\t  IPv4 34.240.160.162 In cloud provider range: provider=AWS",
            "Trellis: http://blockpage.bt.com/pcstaticpage/blocked.html?list=BT |  https://search.app.goo.gl/?ofl",
            "Trellis: www.youtube.com/watch?v=GyuMozsVyYs \t\u00bb Survivors video references assault. Does not name or depict Reimers likeness.",
            "Trellis: Hostname blockpage.bt.com | hdredirect-lb7-5a03e1c2772e1c9c.elb.us-east-1.amazonaws.com | itunes.apple.com | search.app.goo.gl  | www.youtube.com",
            "Trellis: https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
            "IDS Detections: Downloader (P2P Zeus dropper UA) Common Upatre Header Structure 2 Upatre Retrieving encoded payload (Common Header Struct)",
            "IDS Detections: Suspicious User-Agent containing Loader Observed TLS Handshake Failure",
            "Trellis: High Priority Alerts: network_icmp modifies_proxy_wpad packer_polymorphic",
            "Trellis:TrojanDownloader:Win32/Upatre.A  | Yara Detections Upack_all_versions",
            "Trellis: secure04-appleid.com | http://secure04-appleid.com | cpcalendars.secure04-appleid.com"
          ],
          "public": 1,
          "adversary": "Parking Crew",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan:Win32/Zbot.SIBG3!MTB",
              "display_name": "Trojan:Win32/Zbot.SIBG3!MTB",
              "target": "/malware/Trojan:Win32/Zbot.SIBG3!MTB"
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "P2P ZeuS - S0016",
              "display_name": "P2P ZeuS - S0016",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1399",
              "name": "Modify Trusted Execution Environment",
              "display_name": "T1399 - Modify Trusted Execution Environment"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [
            "Research",
            "Telecommunications",
            "Technology",
            "Civilians"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 269,
            "FileHash-SHA1": 266,
            "FileHash-SHA256": 981,
            "domain": 480,
            "hostname": 684,
            "email": 1,
            "URL": 2102
          },
          "indicator_count": 4783,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "530 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e47020bdbbc384d102d169",
          "name": "AWS Botnet *2nd L\u2070\u2070K \u00bb Quantum Fiber | Brute Forcer",
          "description": "I researched link again. Stealthy hackers surrounding a targets whereabouts in Denver Metro/Denver Proper (Co) and surrounding areas. Unsafe targeting activity escalates.\n\n*Tip { PDF:UrlMal-inf\\ [Trj] - https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw } Malware Families:\nWin.Dropper.LokiBot-9975730-0\n#LowFiEnableDTContinueAfterUnpacking\n#LowFiMalf_gen\nALF:PUA:Block:IObit\nALF:Program:Win32/Webcompanion\nALF:Ransom:Win32/Babax\nALF:Trojan:Win32/FormBook\nAWS\nPDF:UrlMal-inf\\ [Trj]\nTrojan:Win32/Qbot\nTrojanDownloader:Win32/Upatre\nUnix\nUnix.Malware.Generic-9875933-0\nVirTool:Win32/Injector\nVirTool:Win32/Obfuscator\nWin.Dropper.LokiBot-9975730-0\nWin.Keylogger.Banbra-9936388-0\nWorm:Win32/Mofksys",
          "modified": "2024-10-13T13:01:27.179000",
          "created": "2024-09-13T17:02:24.806000",
          "tags": [
            "namecheap",
            "server",
            "registrar abuse",
            "code",
            "dnssec",
            "email",
            "contact phone",
            "registrar iana",
            "registrar url",
            "registrar whois",
            "date",
            "vhash",
            "authentihash",
            "imphash",
            "ssdeep",
            "file type",
            "win32 exe",
            "magic pe32",
            "ms windows",
            "trid upx",
            "win16 ne",
            "generic",
            "packer",
            "info sections",
            "name virtual",
            "address virtual",
            "size raw",
            "size entropy",
            "md5 chi2",
            "upx0",
            "1 upx1",
            "upx2",
            "sysinternals",
            "zenbox",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "dynamic",
            "utc na",
            "utc facebook",
            "html info",
            "meta tags",
            "commerce cloud",
            "trackers google",
            "tag manager",
            "gtmkj5bfwx",
            "utc gtmp4hkt96",
            "utc gtm5z5w687v",
            "sample",
            "t1497",
            "sandbox evasion",
            "may sleep",
            "downloads",
            "http performs",
            "mitre att",
            "evasion ta0005",
            "upx software",
            "t1036 creates",
            "get http",
            "post http",
            "number",
            "ja3s",
            "algorithm",
            "subject",
            "data",
            "server ca",
            "odigicert inc",
            "cus lsan",
            "calls",
            "text",
            "passive dns",
            "urls",
            "scan endpoints",
            "all scoreblue",
            "url https",
            "http",
            "ip address",
            "related nids",
            "files location",
            "as8068",
            "united",
            "unknown",
            "ref b",
            "wed may",
            "entries",
            "mtb dec",
            "body",
            "please",
            "twitter",
            "malware",
            "trojan",
            "trojan features",
            "related pulses",
            "file samples",
            "files matching",
            "show",
            "search",
            "date hash",
            "next",
            "showing",
            "worm",
            "win32",
            "alf features",
            "aaaa",
            "cname",
            "united kingdom",
            "creation date",
            "certificate",
            "tlsv1",
            "oglobalsign",
            "stzhejiang",
            "lhangzhou",
            "oalibaba",
            "china",
            "encrypt",
            "copy",
            "write",
            "august",
            "local",
            "xport",
            "regsetvalueexa",
            "regdword",
            "regbinary",
            "medium",
            "high",
            "regsetvalueexw",
            "regsz",
            "langchinese",
            "delphi",
            "persistence",
            "execution",
            "read c",
            "create c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "write c",
            "delete c",
            "mozilla",
            "as62597 nsone",
            "domain",
            "as20940",
            "as8075",
            "virtool",
            "whitelisted ip",
            "location united",
            "asn as8068",
            "registrar",
            "markmonitor",
            "tags",
            "related tags",
            "threat roundup",
            "october",
            "historical ssl",
            "referrer",
            "round",
            "december",
            "november",
            "guloader",
            "files",
            "detections file",
            "name file",
            "file size",
            "name",
            "html",
            "cab null",
            "ubuntu",
            "linux x8664",
            "contentlength",
            "gobrut",
            "malware c",
            "c request",
            "config",
            "meta",
            "photolan",
            "moved",
            "a domains",
            "as47748 daticum",
            "meta http",
            "content",
            "gmt server",
            "ipv4",
            "pragma",
            "apache",
            "sales",
            "expiration date",
            "name servers",
            "asnone bulgaria",
            "ns nxdomain",
            "nxdomain",
            "soa nxdomain",
            "cape",
            "gobrut malware",
            "suricata",
            "et malware",
            "bruter cnc",
            "checkin",
            "activity",
            "malware config",
            "yara detections",
            "contacted",
            "a li",
            "li ul",
            "div div",
            "set cookie",
            "as29873",
            "link",
            "hong kong",
            "as45102 alibaba",
            "div li",
            "gmt max",
            "age2592000 path",
            "log id",
            "gmtn",
            "tls web",
            "ca issuers",
            "timestamp",
            "b715",
            "b59bn timestamp",
            "false",
            "as2914 ntt",
            "record value",
            "data redacted",
            "as4230 claro",
            "invalid url",
            "research group",
            "as13768 aptum",
            "canada unknown",
            "canada",
            "hostpapa",
            "hosting",
            "click",
            "rdds service",
            "record",
            "registrant",
            "admin",
            "tech contact",
            "script domains",
            "as3257 gtt",
            "asnone canada",
            "access denied",
            "servers",
            "emails",
            "as397241",
            "as31898 oracle",
            "as397240",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as15169 google",
            "as396982 google",
            "as16625 akamai",
            "as35994 akamai",
            "france",
            "discovery",
            "t1010",
            "t1012",
            "t1027",
            "information",
            "t1055",
            "injection",
            "t1057",
            "t1059",
            "ssh attacker",
            "mitm",
            "aitm",
            "tracker",
            "botnet",
            "binary",
            "ghostscript",
            "brendan coates",
            "daley",
            "trent wiltshire",
            "aws botnet",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "https",
            "salitiy",
            "unix malware",
            "created",
            "url http",
            "unix",
            "aws",
            "role title",
            "added active",
            "report spam",
            "quantumfiber",
            "denver co",
            "critical",
            "default",
            "traditional",
            "compiler",
            "intel",
            "ms windows",
            "ssdeep",
            "rich pe",
            "imphash",
            "utc gtm5z5w687v",
            "utc gtmp4hkt96",
            "pecompact",
            "packer",
            "ids",
            "commerce cloud",
            "meta tags",
            "gmt etag",
            "accept encoding",
            "accept",
            "status",
            "west domains",
            "path",
            "author avatar",
            "active file",
            "denver",
            "vt graph",
            "currently",
            "im unaware",
            "pnpd5d",
            "susp",
            "filehash",
            "av detections",
            "pecompact",
            "february",
            "asnone germany",
            "as21499 host",
            "singapore",
            "germany",
            "object",
            "alerts",
            "icmp traffic",
            "createdate",
            "microsoft color",
            "msft",
            "format",
            "as44273 host",
            "content type",
            "kodak easyshare",
            "easyshare",
            "eastman kodak",
            "kodak",
            "kukacka",
            "virus",
            "rsdsr7siwwd d",
            "install",
            "service",
            "explorer",
            "windows",
            "name type",
            "md5 process",
            "sqlite",
            "sqlite version",
            "active",
            "pre crime",
            "cyber attack",
            "hackers",
            "quantum fiber",
            "quantumfiber.com",
            "target tsara brashears",
            "tech id",
            "hallrender",
            "brian sabey",
            "hijack",
            "spotify artists",
            "idlinea8 sep",
            "xo544",
            "xa10629",
            "sitegg",
            "fcolorffffff",
            "net1",
            "inhibit system",
            "oracle",
            "level 3"
          ],
          "references": [
            "QuantumFiber.com a 2nd look",
            "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968 [OG:dorkingbeauty | Cloned: StreaminingEx]",
            "13.107.21.200 Bat.Bing - Trojan:Win32/Qbot | ALF:Ransom:Win32/Babax | Worm:Win32/Mofksys | ALF:Program:Win32/Webcompanion",
            "IDS Detections: Win32.Lexip Checkin Unsupported/Fake FireFox Version 2.",
            "IDS Detections: Windows 98 User-Agent Detected - Possible Malware or Non-Updated System Unsupported/Fake Internet Explorer Version MSIE 5.",
            "Win.Dropper.LokiBot-9975730-0",
            "Win.Dropper.LokiBot-9975730-0 FileHash-SHA256 8f65d7817731cf1b7fada1be16d85464383813dd1f0388a933cec2abbeda4ba9",
            "IDS Detections: TLS Handshake Failure Yara Detections: Nullsoft_NSIS",
            "Alerts: network_icmp modifies_proxy_wpad multiple_useragents injection_resumethread",
            "Win.Keylogger.Banbra FileHash-SHA256 94517bb37a8ebe48a06a64b20237e287101bc93bbc840bf6e1ab7dfb28a2da5a",
            "Yara Detections: Delphi",
            "IDS Detections: Win32/Adware.Ymeta.A CnC Beacon Win32/Adware.Ymeta.A CnC Win32/Adware.Ymeta Variant Activity",
            "IDS Detections: Observed Suspicious UA (Mozilla/5.0) Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)",
            "Query to a *.top domain - Likely Hostile Query for .cc TLD",
            "Alerts: dead_host network_icmp nolookup_communication disables_proxy modifies_certificates modifies_proxy_wpad",
            "Alerts: ransomware_dropped_files ransomware_mass_file_delete antivm_vmware_in_instruction",
            "Unix.Malware.Generic: IDS Detections Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config",
            "Unix.Malware.Generic: Observed DNS Query for Israel Domain (.il) | Alerts: cape_detected_threat",
            "Unix.Malware.Generic: Yara Detections: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
            "Unix.Malware.Generic:",
            "Unix.Malware.Generic:",
            "networkservice.exe: Matches rule SERVER-OTHER Spring Data Commons remote code execution attempt",
            "wallet.mewards.bing.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net | wallpapers-nature.com",
            "Malware Families: Win.Dropper.LokiBot-9975730-0 #LowFiEnableDTContinueAfterUnpacking #LowFiMalf_gen Worm:Win32/Mofksys",
            "Malware Families: ALF:PUA:Block:IObit ALF:Program:Win32/Webcompanion ALF:Ransom:Win32/Babax Win.Keylogger.Banbra-9936388-0",
            "Malware Families: ALF:Trojan:Win32/FormBook AWS PDF:UrlMal-inf\\ [Trj] Trojan:Win32/Qbot Unix.Malware.Generic-9875933-0",
            "Malware Families: VirTool:Win32/Injector TrojanDownloader:Win32/Upatre Unix   VirTool:Win32/Obfuscator Win.Dropper.LokiBot-9975730-0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Keylogger.Banbra-9936388-0",
              "display_name": "Win.Keylogger.Banbra-9936388-0",
              "target": null
            },
            {
              "id": "#LowFiMalf_gen",
              "display_name": "#LowFiMalf_gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Qbot",
              "display_name": "Trojan:Win32/Qbot",
              "target": "/malware/Trojan:Win32/Qbot"
            },
            {
              "id": "ALF:Ransom:Win32/Babax",
              "display_name": "ALF:Ransom:Win32/Babax",
              "target": null
            },
            {
              "id": "Worm:Win32/Mofksys",
              "display_name": "Worm:Win32/Mofksys",
              "target": "/malware/Worm:Win32/Mofksys"
            },
            {
              "id": "ALF:Program:Win32/Webcompanion",
              "display_name": "ALF:Program:Win32/Webcompanion",
              "target": null
            },
            {
              "id": "ALF:PUA:Block:IObit",
              "display_name": "ALF:PUA:Block:IObit",
              "target": null
            },
            {
              "id": "Win.Dropper.LokiBot-9975730-0",
              "display_name": "Win.Dropper.LokiBot-9975730-0",
              "target": null
            },
            {
              "id": "Win.Dropper.LokiBot-9975730-0",
              "display_name": "Win.Dropper.LokiBot-9975730-0",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "VirTool:Win32/Injector",
              "display_name": "VirTool:Win32/Injector",
              "target": "/malware/VirTool:Win32/Injector"
            },
            {
              "id": "#LowFiEnableDTContinueAfterUnpacking",
              "display_name": "#LowFiEnableDTContinueAfterUnpacking",
              "target": null
            },
            {
              "id": "Unix.Malware.Generic-9875933-0",
              "display_name": "Unix.Malware.Generic-9875933-0",
              "target": null
            },
            {
              "id": "ALF:Trojan:Win32/FormBook",
              "display_name": "ALF:Trojan:Win32/FormBook",
              "target": null
            },
            {
              "id": "Unix",
              "display_name": "Unix",
              "target": null
            },
            {
              "id": "AWS",
              "display_name": "AWS",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre",
              "display_name": "TrojanDownloader:Win32/Upatre",
              "target": "/malware/TrojanDownloader:Win32/Upatre"
            },
            {
              "id": "PDF:UrlMal-inf\\ [Trj]",
              "display_name": "PDF:UrlMal-inf\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1490",
              "name": "Inhibit System Recovery",
              "display_name": "T1490 - Inhibit System Recovery"
            },
            {
              "id": "T1529",
              "name": "System Shutdown/Reboot",
              "display_name": "T1529 - System Shutdown/Reboot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1510",
              "name": "Clipboard Modification",
              "display_name": "T1510 - Clipboard Modification"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1512",
              "name": "Capture Camera",
              "display_name": "T1512 - Capture Camera"
            },
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1644,
            "FileHash-SHA1": 1614,
            "FileHash-SHA256": 2742,
            "URL": 2708,
            "domain": 2150,
            "hostname": 2508,
            "email": 21,
            "SSLCertFingerprint": 33,
            "CVE": 2
          },
          "indicator_count": 13422,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "553 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66e36c33f59fedbb93c0179f",
          "name": "quantumfiber - Salitiy | CnC  | Unix Malware - Hijacking | telejoint.net",
          "description": "Active file deletion. Exploring a tip re: suspected Denver superior hacker team believed related to malicious attacks on cyber crime victims and file deletion/deleted IoC's.  Excellent tip.  Related Tag: TrojanDownloader::Win32/Updatre VT graph cited in references link to pulse created by dorkingbeauty  then cloned by  streaminingex who cloned all pulses from a select group of multiple users on otx . alienvault]  Currently , Im unaware of significance. Haven't researched enough to confirm if it is an AWS botnet. If successful targeted devices will be rebooted w/ software installation. \n\n *Tip { PDF:UrlMal-inf\\ [Trj] -https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw }",
          "modified": "2024-10-12T22:02:49.628000",
          "created": "2024-09-12T22:33:23.698000",
          "tags": [
            "as3356 level",
            "united",
            "passive dns",
            "urls",
            "tlds",
            "search",
            "scan endpoints",
            "all scoreblue",
            "alerts",
            "icmp traffic",
            "daley",
            "brendan coates",
            "trent wiltshire",
            "modifydate",
            "producer gpl",
            "ghostscript",
            "write",
            "malware",
            "format",
            "filehash",
            "av detections",
            "analysis date",
            "unknown",
            "pulse submit",
            "url analysis",
            "pnpd5d",
            "win32",
            "susp",
            "sha256",
            "pecompact",
            "packer",
            "pecompact2xx",
            "related tags",
            "ids",
            "kodak easyshare",
            "easyshare",
            "kodak",
            "kukacka",
            "virus",
            "rsdsr7siwwd d",
            "install",
            "service",
            "explorer",
            "historical ssl",
            "referrer",
            "gmt content",
            "utc na",
            "utc facebook",
            "html info",
            "meta tags",
            "commerce cloud",
            "trackers google",
            "tag manager",
            "gtmkj5bfwx",
            "utc gtmp4hkt96",
            "utc gtm5z5w687v",
            "vhash",
            "authentihash",
            "imphash",
            "rich pe",
            "ssdeep",
            "file type",
            "win32 exe",
            "magic pe32",
            "ms windows",
            "intel",
            "compiler",
            "traditional",
            "default",
            "brazilian",
            "simplified",
            "rtstring french",
            "korean",
            "dos exe",
            "dll english",
            "fish chinese",
            "jpeg jpg",
            "file size",
            "detections file",
            "name",
            "win32 dll",
            "files",
            "text",
            "b pe",
            "kb graph",
            "summary",
            "hashes c2ae",
            "capa",
            "microsoft",
            "zenbox",
            "flow t1574",
            "dll sideloading",
            "deletes",
            "t1055 allocates",
            "spawns",
            "binary",
            "t1497 contains",
            "may sleep",
            "performs dns",
            "inhibit system",
            "dns resolutions",
            "ip traffic",
            "trid upx",
            "yoda",
            "crypter",
            "delphi",
            "serial number",
            "algorithm",
            "thumbprint",
            "code signing",
            "from",
            "name comodo",
            "valid from",
            "signature",
            "ms13098",
            "issuer addtrust",
            "sections",
            "sha256 file",
            "type type",
            "chi2",
            "overlay chi2",
            "t1055 spawns",
            "sample",
            "t1497 allocates",
            "http performs",
            "downloads",
            "mitre att",
            "ta0003 hijack",
            "execution flow",
            "window",
            "msie",
            "windows nt",
            "number",
            "odigicert inc",
            "cndigicert sha2",
            "server ca",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "accept",
            "high level",
            "hackers",
            "highly targeted",
            "cyber attack",
            "spotify artist",
            "gamers",
            "aws botnet",
            "precrime",
            "tracker",
            "yara",
            "united states",
            "mitm",
            "aitm",
            "domains contacted",
            "manjusaka",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "samples",
            "detection list",
            "cyber threat",
            "engineering",
            "team phishing",
            "team",
            "team covid19",
            "ssh attacker",
            "proxy",
            "hostname",
            "malicious site",
            "installcore",
            "malicious",
            "fusioncore",
            "agent",
            "zeus",
            "zbot",
            "emotet",
            "download",
            "phishing",
            "nymaim",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malicious url",
            "maltiverse",
            "artemis",
            "bank",
            "dropper",
            "target tsara brashears",
            "target virustotal",
            "target otx alienvault",
            "javascript",
            "please",
            "domain",
            "creation date",
            "date",
            "status",
            "pulse pulses",
            "as44273 host",
            "record value",
            "nxdomain",
            "content type",
            "body",
            "files show",
            "date hash",
            "avast avg",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "pragma",
            "name servers",
            "west domains",
            "ubuntu",
            "linux x8664",
            "contentlength",
            "show",
            "gobrut",
            "malware c",
            "c request",
            "encrypt",
            "config",
            "asnone germany",
            "singapore",
            "as21499 host",
            "germany",
            "object",
            "com cnt",
            "denver",
            "less see",
            "related pulses",
            "file samples",
            "files matching",
            "entries",
            "brian sabey",
            "quantumfiber.com",
            "quantum fiber",
            "man in the middle"
          ],
          "references": [
            "https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw",
            "PDF:UrlMal-inf\\ [Trj] FileHash-SHA256 30d8d75f9457b13b8e4802a6f5b2a6379616f5f2ddd0b5db18b503628a429be7",
            "Virus:Win32/Sality.AM FileHash-SHA256 538cd5aba2f96d17324b9063807a061424b921dcd6769afb210687d32276a2da",
            "TrojanDownloader:Win32/Upatre FileHash-SHA256 dbffd83df979087e6a896ddc069cb84e1cdae1cf3dccbebcc7b544778e3d76ae",
            "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968",
            "Yara Detections: Ursnif_201904 ,  aPLib ,  PECompact_2xx ,  pecompact2 ,  PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,  PECompactv2xx",
            "wallpapers-nature.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "Unix.Malware.Generic-9875933-0 | FileHash-SHA256 be1c1ee886185dff2b29ab84649484e3f01a9dfe303213ff9ce3f652aa98b2b9",
            "Unix.Malware.Generic-9875933-0  | High Priority Alert: cape_detected_threat",
            "Unix -Yara: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
            "Unix -IDS Detections: Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config Observed",
            "telejoint.net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1490",
              "name": "Inhibit System Recovery",
              "display_name": "T1490 - Inhibit System Recovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1529",
              "name": "System Shutdown/Reboot",
              "display_name": "T1529 - System Shutdown/Reboot"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [
            "Civilian Society",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1582,
            "FileHash-SHA1": 1096,
            "FileHash-SHA256": 2123,
            "URL": 1283,
            "domain": 857,
            "hostname": 1152,
            "email": 1,
            "CVE": 1,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 8106,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 231,
          "modified_text": "553 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "669e42fea462f0c8f8db32a1",
          "name": "Worm:Win32/Ganelp.A - Malicious IP: 148.163.152.21",
          "description": "Malicious IP found in disastrous attack against a mid level media marketing firm that the healthcare, travel, corporate event industry. \nEmployee phones are 'zombies' some laptops likely impacted by the Crowd Strike issue, (blue screen). Excessive tracking, monitoring, active botnets, power outage, and more. Research of IP and other IoC's found. Unfortunately, many of the clients are also sucked into issue. It appears that the issue has persisted for several years. The outage just made us work every angle. The attack goes beyond  the CS 'update' outage, as the seemingly well cyber manged firm was under a very targeted, ongoing cyber attack that has kept company from rebounding. Red Team behavior seen.",
          "modified": "2024-08-21T11:03:59.106000",
          "created": "2024-07-22T11:31:10.391000",
          "tags": [
            "historical ssl",
            "referrer",
            "fancy bear",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "ipv4",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "reverse dns",
            "open",
            "status",
            "name servers",
            "creation date",
            "search",
            "proofpoint",
            "expiration date",
            "div div",
            "date",
            "accept",
            "next",
            "united",
            "cname",
            "asnone united",
            "a nxdomain",
            "domain",
            "united kingdom",
            "servers",
            "showing",
            "nxdomain",
            "dname",
            "whitelisted",
            "aaaa",
            "script urls",
            "costa rica",
            "script domains",
            "msie",
            "chrome",
            "unknown",
            "body",
            "gmt content",
            "all scoreblue",
            "pulse pulses",
            "entries",
            "as8987 amazon",
            "as20940",
            "hostname",
            "gartner",
            "crowdstrike",
            "business value",
            "magic quadrant",
            "customer",
            "realized",
            "assessment",
            "economic impact",
            "complete",
            "february",
            "utc na",
            "ver2",
            "msclkidn",
            "html info",
            "meta tags",
            "mobileoptimized",
            "adobe dynamic",
            "tag management",
            "utc bing",
            "cobalt strike",
            "communications",
            "android device",
            "neutral",
            "win32 exe",
            "pe32",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "sections",
            "rticon neutral",
            "ico rtgroupicon",
            "xml rtmanifest",
            "overlay",
            "threat roundup",
            "pandas",
            "attacks against",
            "southeast",
            "wannacry kill",
            "switch dns",
            "query",
            "high level",
            "hackers",
            "unknown win",
            "core",
            "ascii text",
            "sha256",
            "sha1",
            "size",
            "pattern match",
            "suricata stream",
            "command decode",
            "utf8 text",
            "mitre att",
            "path",
            "hybrid",
            "starfield",
            "meta",
            "general",
            "target",
            "local",
            "click",
            "strings",
            "trident",
            "legacy",
            "main",
            "contact",
            "flow t1574",
            "dll sideloading",
            "create",
            "modify system",
            "process t1543",
            "windows service",
            "t1055 system",
            "pe file",
            "t1497 query",
            "may sleep",
            "allocate rwx",
            "get file",
            "access",
            "windows event",
            "allocate",
            "link function",
            "windows link",
            "contains pdb",
            "dns resolutions",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls tcp",
            "hashes",
            "user",
            "file system",
            "written c",
            "samplepath",
            "files dropped",
            "userprofile",
            "registry keys",
            "registry",
            "set registrya",
            "conhost",
            "comspec",
            "created",
            "temp",
            "windows",
            "displayname",
            "process",
            "commands",
            "signals mutexes",
            "mutexes",
            "full name",
            "data",
            "v3 serial",
            "number",
            "cus cndigicert",
            "tls rsa",
            "ca1 odigicert",
            "inc validity",
            "subject public",
            "certificate",
            "whois lookup",
            "netrange",
            "nethandle",
            "net148",
            "net1480000",
            "as16509",
            "as22843",
            "as13916",
            "form",
            "server",
            "registrar abuse",
            "email",
            "request email",
            "verisign",
            "icann whois",
            "tech",
            "first",
            "project skynet",
            "cyber army",
            "dynamicloader",
            "high",
            "delete c",
            "show",
            "username",
            "medium",
            "default",
            "yara detections",
            "worm",
            "copy",
            "write",
            "duptwux",
            "malware",
            "x82xd4",
            "kx81xdbx0f",
            "x86xd3",
            "xa1xf1",
            "xe8xc2x14",
            "wx99xcdx11",
            "regsetvalueexa",
            "regbinary",
            "xe8xc6x13",
            "hx88x9ax1e",
            "stream",
            "win32",
            "persistence",
            "execution",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "ftp username",
            "contacted",
            "et tor",
            "known tor",
            "misc attack",
            "relayrouter",
            "exit",
            "node traffic",
            "severity",
            "null",
            "refresh",
            "span",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "robtex",
            "apple ios",
            "apple",
            "domains",
            "co number",
            "virtual mobile",
            "logistics",
            "cyber defense",
            "twitter",
            "read c",
            "artemis",
            "intel",
            "steals",
            "virustotal",
            "python",
            "panda",
            "falcon sandbox",
            "analysis",
            "hybrid analysis",
            "submission name",
            "av detection",
            "multi scan",
            "highest",
            "ability",
            "execute",
            "upgrade",
            "intelligence",
            "learn",
            "reports",
            "logo analysis",
            "size17kib type",
            "command",
            "found",
            "layer protocol",
            "osi application",
            "ip address",
            "t1105 ingress",
            "tool transfer",
            "problems",
            "threat network",
            "infrastructure",
            "domains part",
            "domain tracker",
            "roundup",
            "new problems",
            "startpage",
            "e1203 windows",
            "catalog tree",
            "analysis ob0001",
            "b0001 process",
            "b0003 delayed",
            "analysis ob0002",
            "evasion ob0006",
            "ob0007 system",
            "e1082 file",
            "e1083 impact",
            "data manipulation",
            "remote system",
            "discovery",
            "t1059 accept",
            "modules t1129",
            "enumerate",
            "as2914 ntt",
            "access denied",
            "as16625 akamai",
            "germany unknown",
            "csccorpdomains",
            "as31109",
            "invalid url",
            "mirai",
            "port",
            "destination",
            "bad login",
            "suspicious path",
            "nids",
            "tcp syn",
            "root account",
            "cve20185723",
            "as8068",
            "please",
            "x msedge",
            "embeddedwb",
            "windows nt",
            "tofsee",
            "push",
            "as54113",
            "as396982 google",
            "as31898 oracle",
            "moved",
            "encrypt"
          ],
          "references": [
            "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
            "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
            "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
            "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
            "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
            "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
            "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
            "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
            "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
            "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
            "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
            "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
            "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
            "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
            "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
            "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
            "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
            "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
            "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
            "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
            "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
            "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
            "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
            "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
            "http://images.contact.acams.org/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Trojan.Agent.FRYX",
              "display_name": "Trojan.Agent.FRYX",
              "target": null
            },
            {
              "id": "Win32:AceCrypter-B [Cryp]",
              "display_name": "Win32:AceCrypter-B [Cryp]",
              "target": null
            },
            {
              "id": "Mal_Tofsee",
              "display_name": "Mal_Tofsee",
              "target": null
            },
            {
              "id": "Ransom.StopcryptPMF.",
              "display_name": "Ransom.StopcryptPMF.",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Worm:Win32/Ganelp.A",
              "display_name": "Worm:Win32/Ganelp.A",
              "target": "/malware/Worm:Win32/Ganelp.A"
            },
            {
              "id": "trojan.shellrunner/emailworm",
              "display_name": "trojan.shellrunner/emailworm",
              "target": null
            },
            {
              "id": "trojan.redcap/python",
              "display_name": "trojan.redcap/python",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1565",
              "name": "Data Manipulation",
              "display_name": "T1565 - Data Manipulation"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1202",
              "name": "Indirect Command Execution",
              "display_name": "T1202 - Indirect Command Execution"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "T1583.002",
              "name": "DNS Server",
              "display_name": "T1583.002 - DNS Server"
            }
          ],
          "industries": [
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 890,
            "FileHash-SHA1": 853,
            "FileHash-SHA256": 7215,
            "domain": 2771,
            "hostname": 5544,
            "URL": 13393,
            "email": 12,
            "SSLCertFingerprint": 15,
            "CIDR": 1,
            "CVE": 3
          },
          "indicator_count": 30697,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 237,
          "modified_text": "606 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6683aae863ba601bac1a28b5",
          "name": "Zombie.A \u2022 Bayrob in fake malware information website.",
          "description": "Incredibly malicious IoC's found  in  a legitimate appearing website with informative information. Prominently appears at top of targets search results. \n https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png\nMultiple government domains behind website. Honeypot?",
          "modified": "2024-08-01T06:03:26.298000",
          "created": "2024-07-02T07:23:20.582000",
          "tags": [
            "ukraine",
            "referrer",
            "deploys fake",
            "uue files",
            "fsociety",
            "target colombia",
            "judiciary",
            "financial",
            "public",
            "tools",
            "sector",
            "mexico",
            "aka xloader",
            "html",
            "html info",
            "title",
            "meta tags",
            "google tag",
            "utc gnr5gzhd545",
            "utc na",
            "utc aw944900006",
            "utc linkedin",
            "formbook",
            "accept",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "apache",
            "so funny",
            "click",
            "urls",
            "passive dns",
            "http",
            "unique",
            "scan endpoints",
            "all octoseek",
            "url http",
            "ip address",
            "related nids",
            "code",
            "united",
            "as54113",
            "unknown",
            "aaaa",
            "as15169 google",
            "as46691",
            "status",
            "cname",
            "search",
            "whitelisted",
            "body",
            "date",
            "msil",
            "meta",
            "third-party-cookies",
            "iframes",
            "external-resources",
            "text/html",
            "trackers",
            "end game",
            "name servers",
            "select contact",
            "domain holder",
            "nexus category",
            "creation date",
            "showing",
            "date hash",
            "avast avg",
            "trojan",
            "mtb may",
            "dynamicloader",
            "high",
            "medium",
            "yara detections",
            "sniffs",
            "attempts",
            "alternate data",
            "stream",
            "a foreign",
            "cultureneutral",
            "get na",
            "show",
            "delete c",
            "entries",
            "cape",
            "delete",
            "default",
            "copy",
            "nivdort",
            "write",
            "trojanspy",
            "bayrob",
            "malware",
            "eagle eyed",
            "nonads",
            "path max",
            "age86400 set",
            "cookie",
            "script urls",
            "type",
            "script script",
            "win32 exe",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "vs98",
            "contained",
            "simplified",
            "info compiler",
            "products",
            "sp6 build",
            "header intel",
            "name md5",
            "language",
            "not found",
            "rules not",
            "mitre",
            "info ids",
            "found sigma",
            "found",
            "files not",
            "found network",
            "getlasterror",
            "icons library",
            "os2 executable",
            "files",
            "file type",
            "kb file",
            "name",
            "type name",
            "ip detections",
            "country",
            "gandi sas",
            "dynadot",
            "enom",
            "namecheap",
            "dynadot inc",
            "namecheap inc",
            "dynadot llc",
            "domains",
            "tucows domains",
            "melbourne it",
            "historical ssl",
            "realteck audio",
            "problems",
            "lemon duck",
            "iocs",
            "sneaky server",
            "replacement",
            "unauthorized",
            "windows",
            "windir",
            "samplepath",
            "user",
            "process",
            "created",
            "shell commands",
            "windefend",
            "created bus",
            "tree",
            "registry keys",
            "reports upgrade",
            "keys set",
            "upgradestart",
            "dword",
            "data registry",
            "keys deleted",
            "reports",
            "get http",
            "request",
            "http requests",
            "ip traffic",
            "dns resolutions",
            "resolutions",
            "mitre att",
            "defense evasion",
            "ta0007 command",
            "control ta0011",
            "impact ta0034",
            "impact ta0040",
            "graph",
            "bundled files",
            "name file",
            "contacted ip",
            "users",
            "number",
            "ascii text",
            "crlf line",
            "database",
            "english",
            "tue jun",
            "installer",
            "template",
            "tulach",
            "rexxfield",
            "milesit",
            "cp",
            "self deleting",
            "stuff",
            "copying",
            "packages found",
            "targeting major",
            "injects ads",
            "into search",
            "results",
            "overlay",
            "text",
            "win32 dll",
            "javascript",
            "db2maestro",
            "open ports",
            "ipv4",
            "pulse submit",
            "url analysis",
            "expiration date",
            "hostname",
            "next",
            "ten process",
            "utc facebook",
            "utc google",
            "title ten",
            "blog meta",
            "tags",
            "elastic blog",
            "bing ads",
            "as8068",
            "certificate",
            "otx telemetry",
            "ref b",
            "record value",
            "emails",
            "please",
            "win32",
            "x msedge",
            "pulse pulses",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "mail spammer",
            "million",
            "malware site",
            "phishing site",
            "malicious site",
            "bank",
            "fuery",
            "unsafe",
            "malicious",
            "alexa",
            "zbot",
            "asn as16625",
            "akamai",
            "less",
            "is2osecurity",
            "domain name",
            "active",
            "as21342",
            "domain",
            "location israel",
            "asn as1680",
            "invalid url",
            "body html",
            "head title",
            "title head",
            "body h1",
            "reference",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "organization",
            "district",
            "columbia",
            "false",
            "as20940",
            "as16625 akamai",
            "as8987 amazon",
            "moved",
            "as1680 cellcom",
            "alerts",
            "related pulses",
            "guard",
            "dynamic",
            "reads",
            "https link",
            "as8075",
            "record type",
            "ttl value",
            "redacted for",
            "privacy tech",
            "privacy admin",
            "postal code",
            "stateprovince",
            "server",
            "email",
            "office open",
            "ms word",
            "document",
            "xml document",
            "xml spreadsheet",
            "email trash",
            "rich text",
            "pdf tripwire",
            "fall",
            "whois lookups",
            "contact email",
            "blind eagle",
            "brian sabey"
          ],
          "references": [
            "https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png",
            "https://otx.alienvault.com/indicator/url/www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
            "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-MD5 da9b9e892ced7ec90841d813f6e42339",
            "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA1 48dc18f70b2dfdf554e8247eb9e4a8910e19bd3b",
            "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 215fbe9cf76ccbdde60eaa66538edeecadb844078b4379e66cacb83c7ac05690",
            "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 18f62aec151e9f17c55987f80ed1244d9812895018d2bc931df083fb846a52dc",
            "Trojan:Win32/Zombie.A: FileHash-SHA256: 72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
            "Trojan:Win32/Zombie.A: FileHash-MD5: 36b71d23ca7553fb9db0730e56e6bf77",
            "Trojan:Win32/Zombie.A: FileHash-SHA1: 1fa3519b200cf5078c1c6c7df1cf44cd747c2320",
            "Alerts: creates_largekey script_created_process antisandbox_mouse_hook antivm_generic_disk dead_connect",
            "Alerts: infostealer_cookies infostealer_keylog persistence_ads suspicious_command_tools anomalous_deletefile",
            "IDS Detections: Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin 403 Forbidden",
            "Alerts: cape_detected_threat cape_extracted_content",
            "TrojanSpy:Win32/Nivdort.CW:  FileHash-SHA256\t3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
            "TrojanSpy:Win32/Nivdort.CW: FileHash-MD5\t9d6de961a498f831acb63c95e7b2ff0c",
            "Bayrob: FileHash-SHA256 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
            "Bayrob: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
            "Bayrob: FileHash-MD5 871f1532a8f0f9cf9ec3e82b5da3a120",
            "Domains Contacted: bettercaught.net electricstrong.net recordtrouble.net electrictrouble.net recordpresident.net",
            "Domains Contacted: electricpresident.net recordcaught.net electriccaught.net streetstrong.net tradestrong.net",
            "https://otx.alienvault.com/indicator/file/72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
            "trojan.cosmu/xpiro - 960879004e1059a9e7eaca7b95f45ab9baf8f5b905e2714f1c65f92244396758",
            "Matches rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
            "Malware Behavior Catalog: Defense Evasion OB0006 \u2022 Delayed Execution B0003.003 \u2022 Move File C0063 \u2022 Process Environment Block B0001.019",
            "Malware Behavior Catalog: Dynamic Analysis Evasion B0003 \u2022 Create File C0016 \u2022 Create Process C0017 \u2022 Create Thread C0038",
            "Malware Behavior Catalog: Operating System OC0008  \u2022 Environment Variable C0034 \u2022 Self Deletion F0007 \u2022  :  Tree Anti-Behavioral Analysis",
            "Malware Behavior Catalog: System Information Discovery E1082 \u2022 File and Directory Discovery E1083 \u2022 Execution OB0009 \u2022  File System OC0001",
            "Malware Behavior Catalog: COMSPEC Environment Variable F0007.001 \u2022 Install Additional Program B0023 \u2022 Delete File C0047 \u2022",
            "Malware Behavior Catalog:  Tree Anti-Behavioral Analysis: C0017 Create Thread  \u2022 C0038 Operating System  \u2022 Debugger Detection B0001",
            "Malware Behavior Catalog: Get File Attributes C0049 \u2022 Set File Attributes C0050 \u2022 Read File C0051 \u2022 Writes File C0052",
            "Malware Behavior Catalog:  Tree Anti-Behavioral: Environment Variable C0034 \u2022 Anti-Behavioral Analysis OB0001 \u2022 Process OC0003",
            "Bayrob: 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69 ef55e2c918f9678e97037d5505b0c8a3.virus",
            "Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "Matches rule ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
            "Matches rule PROTOCOL-ICMP PING Windows Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP",
            "http://Object.prototype.hasOwnProperty.call",
            "Tulach! It's been a minute - 114.114.114.114",
            "What's going on here judiciary? Karen - cisa.gov?  e.final",
            "f.search schema.org  t.final",
            "ACTIVE Emails: IS2OSecurity@hq.dhs.gov \u2022 CISA.GOV Status \u2022 schoolsafety.gov \u2022 power2prevent.gov \u2022 is2osecurity@hq.dhs.gov",
            "[https://cisa gov] https://otx.alienvault.com/indicator/ip/92.123.203.73 \u2022 https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
            "[cisa gov] https://otx.alienvault.com/indicator/domain/cisa.gov \u2022 [hq.dhs.gov] https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
            "[dhs gov] https://otx.alienvault.com/indicator/domain/dhs.gov \u2022 https://otx.alienvault.com/indicator/url/https:%2F%2Fwww.cisa.gov%2Fcybersecurity-advisories%2Fics-advisories.xml",
            "Alerts: (cisa gov) ransomware_file_modifications script_created_process antisandbox_mouse_hook antivm_generic_disk infostealer_cookies suspicious_command_tools antidebug_guardpages dynamic_function_loading reads_self stealth_window",
            "https://otx.alienvault.com/indicator/domain/asp.net \u2022 https://otx.alienvault.com/indicator/hostname/ts1.mm.bing.net",
            "Security Contact Email: 212d0c197dca818es@hq.dhs.gov \u2022ACTIVE Domain Name: DHS.GOV"
          ],
          "public": 1,
          "adversary": "Blind Eagle",
          "targeted_countries": [
            "United States of America",
            "Colombia",
            "Netherlands",
            "Israel"
          ],
          "malware_families": [
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.CW",
              "display_name": "TrojanSpy:Win32/Nivdort.CW",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CW"
            },
            {
              "id": "Bayrob",
              "display_name": "Bayrob",
              "target": null
            },
            {
              "id": "trojan.bayrob/lazy",
              "display_name": "trojan.bayrob/lazy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0029",
              "name": "Privilege Escalation",
              "display_name": "TA0029 - Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0030",
              "name": "Defense Evasion",
              "display_name": "TA0030 - Defense Evasion"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1055.003",
              "name": "Thread Execution Hijacking",
              "display_name": "T1055.003 - Thread Execution Hijacking"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1167,
            "FileHash-SHA1": 738,
            "FileHash-SHA256": 3074,
            "URL": 1019,
            "domain": 1639,
            "hostname": 973,
            "email": 11,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8623,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "626 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6671e5844c155814e69ba4dd",
          "name": "Mirai Botnet Injection  affecting Alienvault.",
          "description": "It's unclear if some users or service itself is injecting users or if service is under a Mirai attack. I found evidence of both outbound & inbound activities.  *Crowdsourced context: Activity related to MIRAI - according to source Cluster25 - \nThis IPV4 is used by MIRAI. Mirai is a malware that created a big botnet of networked devices running Linux making them remotely controlled bots that can be used for large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers.\n#zbetcheckin tracker\nDownloaded on 2023-11-07 19:34:59 UTC\nSRC URL : http://171.228.209.167/x86_64\nIP : 171.228.209.167\nAS : AS7552 Viettel Group\nYARA : #contentis_base64 #debuggerpattern__rdtsc #ip #math_entropy_6 #is__elf #http #ft_elf #executable_elf64",
          "modified": "2024-07-18T19:02:50.386000",
          "created": "2024-06-18T19:52:36.849000",
          "tags": [
            "problems",
            "threat network",
            "infrastructure",
            "historical ssl",
            "microsoft stuff",
            "domain check",
            "referrer",
            "generic malware",
            "injector",
            "no data",
            "tag count",
            "fri mar",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "downloader",
            "generic",
            "united",
            "as14315",
            "passive dns",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "america asn",
            "unknown",
            "ransom",
            "body",
            "coinminer",
            "malware generic",
            "wed jan",
            "first",
            "status",
            "creation date",
            "search",
            "date",
            "expiration date",
            "name servers",
            "next",
            "mirai",
            "yara detections",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "reverse dns",
            "location lao",
            "viet nam",
            "domain",
            "all search",
            "otx scoreblue",
            "hostname",
            "files ip",
            "lazarus",
            "as7552 viettel",
            "vietnam unknown",
            "win32",
            "worm",
            "win32sfone jul",
            "vietnam",
            "etag",
            "telecom",
            "as16625 akamai",
            "as20940",
            "germany",
            "united kingdom",
            "singapore",
            "as20546 soprado",
            "hong kong",
            "as45102 alibaba",
            "taobao network",
            "cname",
            "aaaa",
            "entries",
            "showing",
            "a domains",
            "as38731 vietel",
            "plesk",
            "a li",
            "default page",
            "plesk a",
            "mirai variant",
            "useragent",
            "apache",
            "accept",
            "hello",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "create",
            "show",
            "medium",
            "dock",
            "execution",
            "copy",
            "xport",
            "address",
            "as131392",
            "cape",
            "orsam",
            "malware",
            "script urls",
            "moved",
            "record value",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malicious site",
            "phishing site",
            "malicious url",
            "opencandy",
            "exploit",
            "agent",
            "phishing",
            "acint",
            "iframe",
            "crack",
            "conduit",
            "artemis",
            "riskware",
            "mimikatz",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "tiggre",
            "genkryptik",
            "presenoker",
            "filetour",
            "cleaner",
            "wacatac",
            "outbreak",
            "installcore",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "related pulses",
            "whois",
            "related",
            "msil",
            "zombie",
            "dridex",
            "location viet",
            "pulse submit",
            "url analysis",
            "content",
            "google tag",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "deep malware",
            "iframes",
            "trackers",
            "external-resources",
            "text/html",
            "elf info",
            "header class",
            "elf64 data",
            "header version",
            "os abi",
            "unix",
            "v object",
            "file type",
            "exec",
            "executable file",
            "progbits",
            "type address",
            "offset size",
            "flags",
            "null",
            "nobits",
            "strtab",
            "ip detections",
            "country",
            "us bundled",
            "detections file",
            "name",
            "graph summary",
            "get hello",
            "jaws webserver",
            "outbound",
            "mvpower dvr",
            "shell uce",
            "inbound",
            "activity mirai",
            "mirai",
            "info",
            "performs dns",
            "mitre att",
            "access ta0006",
            "os credential",
            "dumping t1003",
            "enumerates",
            "command",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "relacionada",
            "mirai malware",
            "mirai 04022024",
            "nciipc",
            "ip reputaion",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "china as37963",
            "simplified",
            "trojanspy",
            "virustotal",
            "panda",
            "detections type",
            "shell",
            "javascript",
            "dns replication",
            "files referring",
            "lookups",
            "as7552",
            "vhash",
            "ssdeep",
            "magic elf",
            "sysv",
            "trid elf",
            "executable",
            "linux",
            "elf executable",
            "loccel1",
            "echobot",
            "bashlite",
            "malwarebazaar",
            "echobot malware",
            "win32 exe",
            "magic msdos",
            "pe32 executable",
            "intel",
            "ms windows",
            "trid dos",
            "compiler",
            "delphi",
            "serial number",
            "algorithm",
            "thumbprint",
            "valid from",
            "code signing",
            "from",
            "microsoft root",
            "name microsoft",
            "verisign time",
            "stamping",
            "contained",
            "info sections",
            "name virtual",
            "address virtual",
            "size raw",
            "size entropy",
            "md5 chi2",
            "regsetvalueexa",
            "type rtrcdata",
            "sha256 file",
            "threat roundup",
            "october",
            "august",
            "june",
            "september",
            "highly targeted",
            "cyberstalking",
            "round",
            "december",
            "sneaky server",
            "facebook",
            "stealer",
            "agent tesla",
            "pony",
            "april",
            "whitelisted",
            "encrypt",
            "targeting",
            "tsara brashears",
            "otx",
            "alienvault",
            "memcommit",
            "regsz",
            "regopenkeyexw",
            "english",
            "module load",
            "t1129",
            "t1082",
            "windows module",
            "dlls",
            "redline stealer",
            "updater",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "data redacted",
            "cloudflare",
            "redacted",
            "for privacy",
            "code",
            "server",
            "registrar abuse",
            "redacted for",
            "postal code",
            "registrant name",
            "red team",
            "shit",
            "logistics",
            "cyber defense",
            "gootloader",
            "march",
            "sinkhole",
            "just",
            "ramnit",
            "netsupport rat",
            "microsoft",
            "vault",
            "karen",
            "gifts",
            "hidden privacy",
            "threats",
            "malicious",
            "darkgate",
            "core",
            "hacktool",
            "emotet"
          ],
          "references": [
            "https://botnet.ngocronglau.xyz > link discovered by an Alienvault user who notified me they found it researching message from am active user.",
            "https://otx.alienvault.com/indicator/file/02b19639ad1efa59e77f45d130447c05bd2466e26a657cb9cc6ac2e8b30a0026",
            "https://otx.alienvault.com/indicator/file/001546d210a35b7c4c072b6c265f621cf4a9abdd152741d9b58deae2be204355",
            "https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
            "Unix.Mirai Botnet: https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
            "CnC IP: https://otx.alienvault.com/indicator/ip/142.202.242.45",
            "https://otx.alienvault.com/indicator/domain/bunny.net",
            "https://otx.alienvault.com/indicator/ip/210.211.117.205",
            "https://otx.alienvault.com/indicator/ip/143.244.50.212",
            "https://otx.alienvault.com/indicator/ip/125.235.4.59",
            "AV Detection: ELF:Mirai-GH\\ [Trj]",
            "IDS Detections:  MVPower DVR Shell UCE Mirai  | Variant User-Agent (Outbound) JAWS Webserver Unauthenticated Shell Command Execution",
            "IDS Detections: Huawei Remote Command Execution (CVE-2017-17215) Huawei Remote Command Execution - Outbound (CVE-2017-17215) Huawei HG532 RCE Vulnerability (CVE-2017-17215) Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World) 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST",
            "IDS Detections: Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World)",
            "IDS Detections: 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST) ...",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication network_cnc_http network_http p2p_cnc writes_to_stdout",
            "Matches rule Linux_Trojan_Mirai_6a77af0f from ruleset Linux_Trojan_Mirai by Elastic Security | botnet.ngocronglau.xyz",
            "https://otx.alienvault.com/indicator/file/2b5deac6176124ee1f7d237f070c39b03c964fce9a9fba0aaa1bce102710d2e0",
            "cu-payment-porch.pdv-3.ap-southeast-2.production.jet-external.com | qa.proxy.cognito.tigomoney.io | https://trackon.fr/track/clique",
            "Crowdsourced YARA rules Matches:  rule INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
            "Crowdsourced YARA rules Matches: INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
            "Crowdsourced YARA rules Matches: SUSP_Unsigned_OSPPSVC from ruleset gen_sign_anomalies by Florian Roth (Nextron Systems",
            "Crowdsourced YARA rules Matches: IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems)",
            "Crowdsourced YARA rules Matches: Matches rule IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com",
            "Was anyone else notified? I'm not sure why I was.",
            "Through research I did notice many references to target I'm researching for. Phishing/Injection attempt? I didn't click on links.",
            "CS Sigma: Matches rule Python Initiated Connection by frack113"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-9441505-0",
              "display_name": "Unix.Trojan.Mirai-9441505-0",
              "target": null
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_mcv",
              "display_name": "ALF:E5.SpikeAex.rhh_mcv",
              "target": null
            },
            {
              "id": "Win.Dropper.Bulz-9910065-0",
              "display_name": "Win.Dropper.Bulz-9910065-0",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Win.Dropper.Autoit-6688751-0",
              "display_name": "Win.Dropper.Autoit-6688751-0",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Dropper.Dridex-9986041-0",
              "display_name": "Win.Dropper.Dridex-9986041-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Zombie",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Zombie",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Sfone.A",
              "display_name": "Worm:Win32/Sfone.A",
              "target": "/malware/Worm:Win32/Sfone.A"
            },
            {
              "id": "Worm:Win32/Sfone",
              "display_name": "Worm:Win32/Sfone",
              "target": "/malware/Worm:Win32/Sfone"
            },
            {
              "id": "Win.Malware.Bbabdcdc-7358312-0",
              "display_name": "Win.Malware.Bbabdcdc-7358312-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "trojan.mirai/fszhh",
              "display_name": "trojan.mirai/fszhh",
              "target": null
            },
            {
              "id": "DDOS:Linux/Mirai",
              "display_name": "DDOS:Linux/Mirai",
              "target": "/malware/DDOS:Linux/Mirai"
            },
            {
              "id": "ANDROID/AVE.Mirai.fszhh",
              "display_name": "ANDROID/AVE.Mirai.fszhh",
              "target": null
            },
            {
              "id": "Flyagent L",
              "display_name": "Flyagent L",
              "target": null
            },
            {
              "id": "Win-Trojan/Malpacked5.Gen",
              "display_name": "Win-Trojan/Malpacked5.Gen",
              "target": null
            },
            {
              "id": "Atros3.LDJ",
              "display_name": "Atros3.LDJ",
              "target": null
            },
            {
              "id": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
              "display_name": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Gucotut.A",
              "display_name": "TrojanSpy:Win32/Gucotut.A",
              "target": "/malware/TrojanSpy:Win32/Gucotut.A"
            },
            {
              "id": "W32/Pidgeon-A",
              "display_name": "W32/Pidgeon-A",
              "target": null
            },
            {
              "id": "Variant.Zusy.151902",
              "display_name": "Variant.Zusy.151902",
              "target": null
            },
            {
              "id": "trojan.mirai/fedr",
              "display_name": "trojan.mirai/fedr",
              "target": null
            },
            {
              "id": "Win.Malware.Trojanx-9862538-0",
              "display_name": "Win.Malware.Trojanx-9862538-0",
              "target": null
            },
            {
              "id": "Win32:PWSX-gen\\ [Trj]",
              "display_name": "Win32:PWSX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "virus.ramnit/nimnul",
              "display_name": "virus.ramnit/nimnul",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 351,
            "FileHash-SHA1": 349,
            "FileHash-SHA256": 3715,
            "domain": 3326,
            "hostname": 5200,
            "URL": 13151,
            "email": 9,
            "CVE": 7,
            "CIDR": 2
          },
          "indicator_count": 26110,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 243,
          "modified_text": "639 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65fc4d4c24f2000879921be5",
          "name": "The Org : FormBook CnC | Pykspa",
          "description": "Front Facing Description:  'TheOrg' (https://theorg.com) The Org\nThe Org is an online professional community platform. It helps organizations get more exposure externally and operate more efficiently internally. | efficiently internally | Nefarious scheme?  Unclear. Possible visa, immigration scheme. | Pykspa is a piece of malware that can be used to remotely control infected systems. It also enables attackers to. download other malware or extract personal data. || Dark. | Score 100% Falcon Sandbox | Evasive. Moved permanently 03/21/2024 | FormBook is an infostealer  of browser cached credentials , screenshots,  keystrokes. | Tags auto populated",
          "modified": "2024-04-20T14:04:02.366000",
          "created": "2024-03-21T15:07:56.415000",
          "tags": [
            "q https",
            "https",
            "enablement",
            "org log",
            "sign",
            "contact",
            "right person",
            "explore",
            "start",
            "grafana labs",
            "ogilvy",
            "figma",
            "find",
            "apollo",
            "http",
            "span",
            "learn",
            "html",
            "expiry",
            "form",
            "label",
            "youtube video",
            "linkedin",
            "input",
            "pixel",
            "legend",
            "cookie",
            "march",
            "de indicators",
            "domains",
            "hashes",
            "gmbh version",
            "status page",
            "service privacy",
            "legal",
            "impressum",
            "reverse dns",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "united",
            "resource",
            "asn16509",
            "amazon02",
            "name value",
            "main",
            "ssl certificate",
            "whois record",
            "whois whois",
            "resolutions",
            "threat roundup",
            "communicating",
            "referrer",
            "subdomains",
            "historical ssl",
            "collections",
            "june",
            "february",
            "blister",
            "cobalt strike",
            "phishing",
            "formbook",
            "contacted",
            "ip check",
            "adult content",
            "divergent",
            "hacktool",
            "copy",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers age",
            "cachecontrol",
            "connection",
            "tsara brashears",
            "malicious",
            "life",
            "core",
            "dns replication",
            "date",
            "win32 exe",
            "files",
            "detections type",
            "name",
            "wininit",
            "office open",
            "xml document",
            "qiwi hack",
            "android",
            "mgeinteg",
            "html info",
            "title",
            "org meta",
            "tags viewport",
            "org twitter",
            "org og",
            "the org",
            "utc google",
            "tag manager",
            "g5nxq655fgp",
            "domain",
            "search",
            "status",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "passive dns",
            "urls",
            "bhagam bhag",
            "home screen",
            "entries",
            "createdate",
            "title bhagam",
            "select xmp",
            "filehash",
            "malware",
            "format",
            "unknown",
            "meta",
            "as44273 host",
            "creation date",
            "moved",
            "encrypt",
            "district",
            "body",
            "window",
            "hall law",
            "a domains",
            "script urls",
            "datalayer",
            "registrar",
            "next",
            "accept encoding",
            "showing",
            "yara rule",
            "http host",
            "worm",
            "high",
            "possible",
            "win32",
            "bits",
            "cname",
            "as396982 google",
            "redacted for",
            "expiration date",
            "div div",
            "as26710 icann",
            "script domains",
            "citadel",
            "indonesia",
            "get updates",
            "write c",
            "create c",
            "read c",
            "show",
            "default",
            "common upatre",
            "upatre",
            "downloader",
            "zeus",
            "write",
            "execution",
            "regsetvalueexa",
            "regdword",
            "module load",
            "dock",
            "persistence",
            "as54113",
            "github pages",
            "formbook cnc",
            "checkin",
            "lowfi",
            "class",
            "trojan",
            "accept",
            "visa scheme",
            "mtb feb",
            "mtb jan",
            "romeo scheme",
            "exploitation",
            "pattern match",
            "command decode",
            "mitre att",
            "suricata ipv4",
            "ck id",
            "show technique",
            "ck matrix",
            "suricata udpv4",
            "facebook",
            "hybrid",
            "general",
            "model",
            "comspec",
            "click",
            "strings",
            "footer",
            "michelle",
            "nora",
            "hallrender",
            "name servers",
            "record value",
            "emails",
            "servers",
            "found",
            "gmt content",
            "error",
            "code",
            "men",
            "man",
            "woman",
            "hit",
            "sreredrum",
            "honey client",
            "hiv",
            "threat",
            "paste",
            "iocs",
            "urls https",
            "malicious site",
            "phishing site",
            "blockchain",
            "unsafe",
            "malware site",
            "malicious url",
            "phishtank",
            "cyber threat",
            "artemis",
            "asyncrat",
            "team",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "million",
            "xrat",
            "downldr",
            "union",
            "bank",
            "gvt google video transcoding",
            "malvertizing",
            "targeting",
            "target",
            "yandex dropper extend",
            "remote procedure call",
            "identity_helper.exe",
            "cookie bot"
          ],
          "references": [
            "https://theorg.com",
            "Ransom: CVE-2023-4966",
            "Ransom: ransomed.vc",
            "FormBook: a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel | 103.246.145.111",
            "Malware: 0a6e883228a04a6e8738511a6210914dea1773d88cf57950c83e092f02c7f3bf - Other:Malware-gen\\ [Trj]",
            "Yara Detections invalid_trailer_structure ,  multiple_versions",
            "Malware Hosting IP addresses:  141.193.213.20 | 185.199.108.153| 185.199.110.153 | 185.199.111.153",
            "https://otx.alienvault.com/indicator/url/https://theorg.com/_next/data/Gh7c6NpBHZESb74aisPB8/org/springboard-collaborative.json?companySlug=springboard-collaborative",
            "Scanning host: 31.214.178.54 , 37.152.88.54",
            "Yara Detections: vad_contains_network_strings information | HackToolWin32Patch CodeOverlap | PWSWin32Phorex CodeOverlap",
            "Yara: TrojanDropperWin32Ropest | CodeOverlap TrojanWin32Gatsorm | CodeOverlap TrojanWinNTConficker | CodeOverlap Alerts: WormWin32Pykspa",
            "Aspnet collect: https://otx.alienvault.com/otxapi/indicators/file/screenshot/000444cc67b97f45f11e1fdf89ad8f5127c87aa858fe151fa9c4975276f53b42",
            "development.digitalphotogallery.com _YandexDropperExtend",
            "Emotet: FileHash-MD5 bafae95c36402dfc1ea5fa04523e4e81",
            "Emotet: FileHash-SHA256 db9d59b0f192c91f8ecf939c415b3252b13b0fb052d4a66ceefb80dfb43d6e8a |",
            "Emotet: FileHash-SHA1\t19c14ab0aaab2c1dd922f0baca3cf64056f80acc",
            "thevisafirm.com | Immigration Lawyers Capital Immigration Lawyers Green Card Lawyer [ London, DC] malicious",
            "www.hallinjurylaw.com |\tMinneapolis Personal Injury Lawyer Personal Injury Law Experts",
            "Malvertizing, Phishing, Botnet PWD: https://pin.it/ | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "Phishing, Botnet PWD:https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://www.sweetheartvideo.com/tsara-brashears/ | www.sweetheartvideo.com",
            "https://hybrid-analysis.com/sample/ac09d7f6b26675a529a366b47bc09b3fd776576fb099c020f57204ff7b4ea31c",
            "CVE-2007-3896 | CVE-2023-22518 | CVE-2023-4966",
            "jpocxaar1---r3---sn-jpocxaa-a03e.gvt1.com"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Win32:Renos-KY\\ [Trj]",
              "display_name": "Win32:Renos-KY\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Worm.Pykspa-1",
              "display_name": "Win.Worm.Pykspa-1",
              "target": null
            },
            {
              "id": "Worm:Win32/Pykspa.C",
              "display_name": "Worm:Win32/Pykspa.C",
              "target": "/malware/Worm:Win32/Pykspa.C"
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "ApolloLocker",
              "display_name": "ApolloLocker",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32",
              "display_name": "TrojanDropper:Win32",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Media",
            "Immigration",
            "Technology",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 55,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4567,
            "domain": 2576,
            "hostname": 1212,
            "FileHash-SHA256": 3836,
            "FileHash-MD5": 744,
            "FileHash-SHA1": 724,
            "CVE": 5,
            "email": 9,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 13674,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 232,
          "modified_text": "729 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eb9b25110526c6b2a0ada5",
          "name": "VirTool:MSIL/CryptInject.CF!MTB | Rexxfield? Weird stuff",
          "description": "",
          "modified": "2024-03-08T23:11:33.426000",
          "created": "2024-03-08T23:11:33.426000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a342310ab3d2c69778d608",
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "771 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eb98d47b74b50cf8ce6797",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-03-08T23:01:40.129000",
          "created": "2024-03-08T23:01:40.129000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65acace20c18a7d6c5da2e27",
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "771 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afc9cf333bbda03a18e03c",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-23T14:14:39.725000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65acace20c18a7d6c5da2e27",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65acace20c18a7d6c5da2e27",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-21T05:34:26.800000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a342310ab3d2c69778d608",
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a342310ab3d2c69778d608",
          "name": "VirTool:MSIL/CryptInject.CF!MTB | Rexxfield? Weird stuff",
          "description": "Remotely accessed device. Alleges Relationship to OTX? What I know is what I've read. Michael Roberts of Rexxfield supposedly assists, attorneys, law enforcement & helps doctors cover their crimes, injects malicious code, honeypots the web, terrorizing SA victims/allegers. Roberts is allegedly a hacker mastermind who shows his face or one of the many profiles of a hacker group targeting Tsara Brashears and https://SafeBae.org. Brashears is linked in malicious websites, Roberts suspect with ex-wife Tracey Richter alleged murderer. This is all crazy, still;  Brashears is a real person in danger. I don't get it. I'm stupid",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-14T02:08:49.638000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658ef9146f87e38603fe8bbb",
          "name": "Pegasus Attacking SA victim & advocate | Target in harms way ",
          "description": "",
          "modified": "2024-01-28T00:00:51.288000",
          "created": "2023-12-29T16:51:32.324000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "microsoft",
            "expiration",
            "url https",
            "no expiration",
            "url http",
            "hostname",
            "ipv4",
            "domain",
            "next",
            "scan endpoints",
            "filehashsha256",
            "filehashmd5",
            "filehashsha1",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "Hall Render",
            "advocate",
            "amazon02",
            "ascii text",
            "assaulted",
            "bangladesh",
            "beijing baidu",
            "blackbag",
            "car bomb threats",
            "cellbrite",
            "brian sabey",
            "brian",
            "ck id",
            "ck matrix",
            "class",
            "click",
            "communicating",
            "comspec",
            "iocs",
            "limited",
            "local",
            "contacted",
            "core",
            "critical",
            "crypto",
            "ursnif",
            "utc",
            "submissions",
            "windir",
            "highly targeted",
            "historical ssl",
            "december",
            "discord",
            "domestic cyber terrorism",
            "date",
            "error",
            "execution",
            "factory",
            "falcon",
            "falcon sandbox",
            "filehashmd5",
            "first",
            "getprocaddress",
            "gmo",
            "internet",
            "hacktool",
            "hallrender",
            "attacks",
            "hashes",
            "files",
            "hybrid",
            "infection source",
            "installer",
            "localappdata",
            "malicious",
            "malware http",
            "malware",
            "http",
            "malicious malware",
            "march",
            "spyware",
            "ssl certificate",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "meekserver",
            "meta",
            "metro",
            "microsoft",
            "survivor",
            "submitters",
            "strings",
            "mitre att",
            "model",
            "name",
            "name verdict",
            "netcom science",
            "no expiration",
            "online sas",
            "open paste",
            "path pattern match",
            "pegasus",
            "prynt",
            "redline stealer",
            "smokeloader",
            "referrer",
            "reports",
            "roboto",
            "runtime process",
            "sabey",
            "script",
            "show technique",
            "sha1",
            "sha256",
            "new ioc",
            "stopransomware",
            "targets sa",
            "teams",
            "api",
            "threat",
            "threat analyzer",
            "threat roundup",
            "tsara brashears",
            "unknown",
            "url http",
            "url https",
            "urls https",
            "malvertizing",
            "Jeffrey reimer dpt assault case",
            "114.114.114.114",
            "T1622 - Debugger Evasion"
          ],
          "references": [
            "Pegasus Attacking SA victim & advocate |  Not interested in Predator",
            "https://www.virustotal.com/gui/url/9bd3f99373b39e31fc935f62744c14e595df92c3f388753b507a395112f2dbda/summary",
            "https://cellebrite.com/en/federal-government/",
            "http://pegasus.diskel.co.uk/",
            "deviceinbox.com",
            "https://www.virustotal.com/gui/collection/29a886e3e9eed3e8185f260116f9b036abf042022e9a9b5b1b311f92be705122/iocs",
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/209db5b7a473df6f2bff9274b96e556ec296237fdb134959f413c6b3b93fff74",
            "https://hybrid-analysis.com/sample/e607e46da2b0d7129c9e783417619ee924be28792ce1323ed5cdfcbeb5c2c2e9/658df78b0dd01fa2970b7a7e",
            "https://hybrid-analysis.com/sample/9c664935c8b82101733515e488e990d3c2db4b2594b0e427d01147e50953906e/658df4ed7644098eee08e1a4",
            "Below are malvertizing links featuring target and alleged assaulter",
            "https://urlscan.io/domain/video-lal.com | Was extremely malicious",
            "https://archive.ph/rhBxZ",
            "https://mypornwap.fun/downloads/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-tgz",
            "https://www.hybrid-analysis.com/sample/eab469685b2890cd50ca8a3705119a1c0a9c273c5951b57794aa8b16e8a42d6c/5f772b611a96402847793b79",
            "https://otx.alienvault.com/browse/global/pulses?q=tag:threats&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=threats",
            "https://otx.alienvault.com/pulse/6570a6c41702fdce6c496a1d",
            "https://otx.alienvault.com/indicator/url/http:%2F%2Fpixelrz.com%2Flists%2Fkeywords%2F%2520dr-jeffrey-reimer-dpt-funds-tsara-brashears%2F",
            "https://www. pornhub .com /video/ search?search=tsara+brashears",
            "wapwon(.)live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "https://www(.)tryindiansex(.)com/s/tsara-brashears/",
            "https://m.youtube.com/watch?v=GyuMozsVyYs | Sabey angry over music expression that's never named assaulter",
            "Victim to afraid to bring lawsuit for attack that caused SCI. Endlessly bullied.",
            "https://pornbitter.com/storage/jeffrey-reimer-puts-his-love-on-top-tsara-brashears/",
            "https://iporntv.mobi/tsara-brashears.html?page=4",
            "https://www.toindian.com/s/jeffrey-reimer-dpt-porn/",
            "https://otx.alienvault.com/pulse/655d0f94ad4d7cdc5e3f0a98",
            "Social Engineering",
            "https://otx.alienvault.com/pulse/652214c652025febf66cde33",
            "https://hallrender.com/attorney/brian-sabey",
            "https://timersys.com/wordpress-social-invitations/docs/cron-jobs/",
            "Apple iOS",
            "https://t.me/hermitspyware/24",
            "developer.apple.com",
            "Tulach: 114.114.114.114"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Saudi Arabia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ASCII",
              "display_name": "ASCII",
              "target": null
            },
            {
              "id": "Appleservice",
              "display_name": "Appleservice",
              "target": null
            },
            {
              "id": "Amazon",
              "display_name": "Amazon",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Prynt",
              "display_name": "Prynt",
              "target": null
            },
            {
              "id": "Roboto",
              "display_name": "Roboto",
              "target": null
            },
            {
              "id": "Sabey Urself - S0386",
              "display_name": "Sabey Urself - S0386",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1037",
              "name": "Boot or Logon Initialization Scripts",
              "display_name": "T1037 - Boot or Logon Initialization Scripts"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1207",
              "name": "Rogue Domain Controller",
              "display_name": "T1207 - Rogue Domain Controller"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1467",
              "name": "Rogue Cellular Base Station",
              "display_name": "T1467 - Rogue Cellular Base Station"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "658e2893e01cff9072864f8e",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 591,
            "FileHash-MD5": 194,
            "FileHash-SHA1": 153,
            "FileHash-SHA256": 801,
            "domain": 230,
            "hostname": 637,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 2608,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "812 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "658e2893e01cff9072864f8e",
          "name": "Pegasus Attacking SA victim & advocate | Death threats galore",
          "description": "US Federal Government allows Pegasus to target, spy, malvertized, cripple businesses of victim of vicious 'alleged' \nSA who was also an advocate. Full control of everything m cyber attacks on anything with a computer in it. Death threats. Attempts. Target of attack left with SCI. Since no one has helped while she was alive, it only makes sense how attack may have been allowed, People who believe they are VIP m haven't much effort into silencing victim of attack by medically licensed unprofessional provider. Influenced law enforcement and attorneys, No way out.",
          "modified": "2024-01-28T00:00:51.288000",
          "created": "2023-12-29T02:01:55.064000",
          "tags": [
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "threat analyzer",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "microsoft",
            "expiration",
            "url https",
            "no expiration",
            "url http",
            "hostname",
            "ipv4",
            "domain",
            "next",
            "scan endpoints",
            "filehashsha256",
            "filehashmd5",
            "filehashsha1",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "pcap",
            "stix",
            "Hall Render",
            "advocate",
            "amazon02",
            "ascii text",
            "assaulted",
            "bangladesh",
            "beijing baidu",
            "blackbag",
            "car bomb threats",
            "cellbrite",
            "brian sabey",
            "brian",
            "ck id",
            "ck matrix",
            "class",
            "click",
            "communicating",
            "comspec",
            "iocs",
            "limited",
            "local",
            "contacted",
            "core",
            "critical",
            "crypto",
            "ursnif",
            "utc",
            "submissions",
            "windir",
            "highly targeted",
            "historical ssl",
            "december",
            "discord",
            "domestic cyber terrorism",
            "date",
            "error",
            "execution",
            "factory",
            "falcon",
            "falcon sandbox",
            "filehashmd5",
            "first",
            "getprocaddress",
            "gmo",
            "internet",
            "hacktool",
            "hallrender",
            "attacks",
            "hashes",
            "files",
            "hybrid",
            "infection source",
            "installer",
            "localappdata",
            "malicious",
            "malware http",
            "malware",
            "http",
            "malicious malware",
            "march",
            "spyware",
            "ssl certificate",
            "mark",
            "mark brian sabey",
            "mark sabey",
            "meekserver",
            "meta",
            "metro",
            "microsoft",
            "survivor",
            "submitters",
            "strings",
            "mitre att",
            "model",
            "name",
            "name verdict",
            "netcom science",
            "no expiration",
            "online sas",
            "open paste",
            "path pattern match",
            "pegasus",
            "prynt",
            "redline stealer",
            "smokeloader",
            "referrer",
            "reports",
            "roboto",
            "runtime process",
            "sabey",
            "script",
            "show technique",
            "sha1",
            "sha256",
            "new ioc",
            "stopransomware",
            "targets sa",
            "teams",
            "api",
            "threat",
            "threat analyzer",
            "threat roundup",
            "tsara brashears",
            "unknown",
            "url http",
            "url https",
            "urls https",
            "malvertizing",
            "Jeffrey reimer dpt assault case",
            "114.114.114.114",
            "T1622 - Debugger Evasion"
          ],
          "references": [
            "Pegasus Attacking SA victim & advocate |  Not interested in Predator",
            "https://www.virustotal.com/gui/url/9bd3f99373b39e31fc935f62744c14e595df92c3f388753b507a395112f2dbda/summary",
            "https://cellebrite.com/en/federal-government/",
            "http://pegasus.diskel.co.uk/",
            "deviceinbox.com",
            "https://www.virustotal.com/gui/collection/29a886e3e9eed3e8185f260116f9b036abf042022e9a9b5b1b311f92be705122/iocs",
            "https://hallrender.com/attorney/brian-sabey",
            "https://hybrid-analysis.com/sample/209db5b7a473df6f2bff9274b96e556ec296237fdb134959f413c6b3b93fff74",
            "https://hybrid-analysis.com/sample/e607e46da2b0d7129c9e783417619ee924be28792ce1323ed5cdfcbeb5c2c2e9/658df78b0dd01fa2970b7a7e",
            "https://hybrid-analysis.com/sample/9c664935c8b82101733515e488e990d3c2db4b2594b0e427d01147e50953906e/658df4ed7644098eee08e1a4",
            "Below are malvertizing links featuring target and alleged assaulter",
            "https://urlscan.io/domain/video-lal.com | Was extremely malicious",
            "https://archive.ph/rhBxZ",
            "https://mypornwap.fun/downloads/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-tgz",
            "https://www.hybrid-analysis.com/sample/eab469685b2890cd50ca8a3705119a1c0a9c273c5951b57794aa8b16e8a42d6c/5f772b611a96402847793b79",
            "https://otx.alienvault.com/browse/global/pulses?q=tag:threats&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=threats",
            "https://otx.alienvault.com/pulse/6570a6c41702fdce6c496a1d",
            "https://otx.alienvault.com/indicator/url/http:%2F%2Fpixelrz.com%2Flists%2Fkeywords%2F%2520dr-jeffrey-reimer-dpt-funds-tsara-brashears%2F",
            "https://www. pornhub .com /video/ search?search=tsara+brashears",
            "wapwon(.)live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
            "https://www(.)tryindiansex(.)com/s/tsara-brashears/",
            "https://m.youtube.com/watch?v=GyuMozsVyYs | Sabey angry over music expression that's never named assaulter",
            "Victim to afraid to bring lawsuit for attack that caused SCI. Endlessly bullied.",
            "https://pornbitter.com/storage/jeffrey-reimer-puts-his-love-on-top-tsara-brashears/",
            "https://iporntv.mobi/tsara-brashears.html?page=4",
            "https://www.toindian.com/s/jeffrey-reimer-dpt-porn/",
            "https://otx.alienvault.com/pulse/655d0f94ad4d7cdc5e3f0a98",
            "Social Engineering",
            "https://otx.alienvault.com/pulse/652214c652025febf66cde33",
            "https://hallrender.com/attorney/brian-sabey",
            "https://timersys.com/wordpress-social-invitations/docs/cron-jobs/",
            "Apple iOS",
            "https://t.me/hermitspyware/24",
            "developer.apple.com",
            "Tulach: 114.114.114.114"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Saudi Arabia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ASCII",
              "display_name": "ASCII",
              "target": null
            },
            {
              "id": "Appleservice",
              "display_name": "Appleservice",
              "target": null
            },
            {
              "id": "Amazon",
              "display_name": "Amazon",
              "target": null
            },
            {
              "id": "Comspec",
              "display_name": "Comspec",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "HallRender",
              "display_name": "HallRender",
              "target": null
            },
            {
              "id": "Pegasus for iOS - S0289",
              "display_name": "Pegasus for iOS - S0289",
              "target": null
            },
            {
              "id": "Prynt",
              "display_name": "Prynt",
              "target": null
            },
            {
              "id": "Roboto",
              "display_name": "Roboto",
              "target": null
            },
            {
              "id": "Sabey Urself - S0386",
              "display_name": "Sabey Urself - S0386",
              "target": null
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1037",
              "name": "Boot or Logon Initialization Scripts",
              "display_name": "T1037 - Boot or Logon Initialization Scripts"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1207",
              "name": "Rogue Domain Controller",
              "display_name": "T1207 - Rogue Domain Controller"
            },
            {
              "id": "T1088",
              "name": "Bypass User Account Control",
              "display_name": "T1088 - Bypass User Account Control"
            },
            {
              "id": "T1467",
              "name": "Rogue Cellular Base Station",
              "display_name": "T1467 - Rogue Cellular Base Station"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 591,
            "FileHash-MD5": 194,
            "FileHash-SHA1": 153,
            "FileHash-SHA256": 801,
            "domain": 230,
            "hostname": 637,
            "CVE": 1,
            "email": 1
          },
          "indicator_count": 2608,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "812 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65831c52eceb4090b5d49d21",
          "name": "Critical (GC)",
          "description": "",
          "modified": "2024-01-19T15:01:02.500000",
          "created": "2023-12-20T16:54:42.626000",
          "tags": [
            "ssl certificate",
            "threat roundup",
            "referrer",
            "historical",
            "historical ssl",
            "colors",
            "pattern match",
            "windir",
            "openurl c",
            "logo",
            "december",
            "default browser",
            "guest system",
            "professional",
            "service pack",
            "click",
            "strings",
            "report",
            "command_and_control",
            "file",
            "ascii text",
            "done adding",
            "catalog file",
            "appdata",
            "united",
            "windows nt",
            "indicator",
            "mitre att",
            "date",
            "unknown",
            "error",
            "general",
            "local",
            "facebook",
            "class",
            "generator",
            "critical",
            "span",
            "gc",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "httponly",
            "secure",
            "dynamic expires",
            "blacklist",
            "site",
            "cisco umbrella",
            "worm",
            "malware-as_a_service"
          ],
          "references": [
            "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
            "https://www.hybrid-analysis.com/sample/f7cb7c256e840ab93e6991462cedf6eac928c12f4102798986e2c5d27d1abc7f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 57,
            "FileHash-SHA1": 59,
            "FileHash-SHA256": 1358,
            "URL": 1430,
            "domain": 245,
            "hostname": 676
          },
          "indicator_count": 3825,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "821 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c1516990d69644fb3d0",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:57.372000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cb4447c8d87ad85fa75",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:24.343000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cbe6bdbe24ecb170b24",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:34.083000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c17e69371b34a573f72",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:59.619000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "screencasts.rexxfield.com",
        "Malware Families: ALF:PUA:Block:IObit ALF:Program:Win32/Webcompanion ALF:Ransom:Win32/Babax Win.Keylogger.Banbra-9936388-0",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication network_cnc_http network_http p2p_cnc writes_to_stdout",
        "https://www.virustotal.com/gui/collection/29a886e3e9eed3e8185f260116f9b036abf042022e9a9b5b1b311f92be705122/iocs",
        "Trojan.Agent.FRYX: http://email.bidayati.com/c/eJwkkc1ygjoYQJ8Gd3TClwTIwgUR0Aq12BbBbu5EfuQnioVQwKe_03v3Z-bMnJOvbUwtS6yKtWEZjNmMULyq1oAMYto2zZhd2IbIGb6UBdiYCqMoC",
        "Alerts: ransomware_dropped_files ransomware_mass_file_delete antivm_vmware_in_instruction",
        "Pegasus Attacking SA victim & advocate |  Not interested in Predator",
        "https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "Brian Sabey offered Brashears a settlement. Begged her to accept it.",
        "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
        "Virus:Win32/Sality.AM FileHash-SHA256 538cd5aba2f96d17324b9063807a061424b921dcd6769afb210687d32276a2da",
        "IDS Detections: Downloader (P2P Zeus dropper UA) Common Upatre Header Structure 2 Upatre Retrieving encoded payload (Common Header Struct)",
        "https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "https://viewdns.info/portscan/?host=ualberta.ca",
        "https://timersys.com/wordpress-social-invitations/docs/cron-jobs/",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.virustotal.com/gui/file/dcd0812ed0b280cee38a3f8a68e5fde900f0a9f832ca53167d38d96f105eb9b9/detection",
        "Malware Hosting IP addresses:  141.193.213.20 | 185.199.108.153| 185.199.110.153 | 185.199.111.153",
        "Alerts: network_icmp modifies_proxy_wpad multiple_useragents injection_resumethread",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4",
        "Victim is willing to have her attorney post entire court proceedings online , on YouTube and more",
        "Crowdsourced Sigma Rules: Suspicious New Service Creation by Nasreddine Bencherchali (Nextron Systems)",
        "False: Brashears didn't expect this coming. Jeffrey Reimer DPT suddenly jumped on top of Brashears and tried to start a family. He didn't ask.",
        "Bayrob: FileHash-MD5 871f1532a8f0f9cf9ec3e82b5da3a120",
        "https://otx.alienvault.com/pulse/6570a6c41702fdce6c496a1d",
        "https://otx.alienvault.com/indicator/file/001546d210a35b7c4c072b6c265f621cf4a9abdd152741d9b58deae2be204355",
        "Matches rule ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://www.hybrid-analysis.com/sample/eab469685b2890cd50ca8a3705119a1c0a9c273c5951b57794aa8b16e8a42d6c/5f772b611a96402847793b79",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "https://hallrender.com/attorney/brian-sabey",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Brian Sabey. Esq filed motion to dismiss after judge dismissed Reimers meritlesscase",
        "Phishing, Botnet PWD:https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing | https://www.sweetheartvideo.com/tsara-brashears/ | www.sweetheartvideo.com",
        "Yara Detections: vad_contains_network_strings information | HackToolWin32Patch CodeOverlap | PWSWin32Phorex CodeOverlap",
        "https://www.virustotal.com/graph/embed/g4022b02acb3b46ddb4b24043845853d9f56a84d80b5849188fee79c90217d4ca?theme=dark",
        "Matches rule PROTOCOL-ICMP PING Windows Matches rule PROTOCOL-ICMP Unusual PING detected Matches rule PROTOCOL-ICMP",
        "IDS Detections: TLS Handshake Failure Yara Detections: Nullsoft_NSIS",
        "Trellis: https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://crt.sh/?q=ualberta.ca&exclude=expired&group=none",
        "https://bgp.he.net/dns/ualberta.ca",
        "Unix.Malware.Generic: Observed DNS Query for Israel Domain (.il) | Alerts: cape_detected_threat",
        "Apple iOS",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "Trellis: Hostname blockpage.bt.com | hdredirect-lb7-5a03e1c2772e1c9c.elb.us-east-1.amazonaws.com | itunes.apple.com | search.app.goo.gl  | www.youtube.com",
        "https://www.criminalip.io/asset/search?query=ualberta.ca",
        "Brian Sabey Speaking for Jeffrey Scott Reimer DPT refused further court proceedings",
        "TrojanDownloader:Win32/Upatre FileHash-SHA256 dbffd83df979087e6a896ddc069cb84e1cdae1cf3dccbebcc7b544778e3d76ae",
        "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 18f62aec151e9f17c55987f80ed1244d9812895018d2bc931df083fb846a52dc",
        "IDS Detections: 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST) ...",
        "https://who.is/whois/ualberta.ca",
        "https://botnet.ngocronglau.xyz > link discovered by an Alienvault user who notified me they found it researching message from am active user.",
        "https://centralops.net/co/",
        "Win.Dropper.LokiBot-9975730-0",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://reverseip.domaintools.com/search/?q=ualberta.ca",
        "Unless tampered with, court records will show Brashears dropped as a patient to be told she'd face legal consequences if she did.",
        "Bayrob: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/iocs",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://hybrid-analysis.com/sample/e607e46da2b0d7129c9e783417619ee924be28792ce1323ed5cdfcbeb5c2c2e9/658df78b0dd01fa2970b7a7e",
        "https://www.virustotal.com/gui/file/06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328/detection",
        "Malware Behavior Catalog: COMSPEC Environment Variable F0007.001 \u2022 Install Additional Program B0023 \u2022 Delete File C0047 \u2022",
        "https://urlscan.io/result/e4ed8a1d-1b23-46cd-a237-a2ad4e974fc3/content/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://dnstwist.it/#7c697f80-c2c3-43a2-85c0-05ed178bb050",
        "https://otx.alienvault.com/indicator/ip/210.211.117.205",
        "QuantumFiber.com a 2nd look",
        "CVE-2007-3896 | CVE-2023-22518 | CVE-2023-4966",
        "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "Matches rule SUSP_Imphash_Mar23_2 from ruleset gen_imphash_detection by Arnim Rupp (https://github.com/ruppde)",
        "IDS Detections: Huawei Remote Command Execution (CVE-2017-17215) Huawei Remote Command Execution - Outbound (CVE-2017-17215) Huawei HG532 RCE Vulnerability (CVE-2017-17215) Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World) 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST",
        "https://www.shodan.io/search?query=ualberta.ca",
        "Scam Aggregators: https://trellis.law/case/8035/2017cv030026-suppressed/reimer-jeffrey-v-brashears-tsara [parked here: ctjsz.com]",
        "Emotet: FileHash-SHA1\t19c14ab0aaab2c1dd922f0baca3cf64056f80acc",
        "https://rexxfield.com/",
        "All - EnterpriseAppsList.csv",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43/680e723df123be6c63004290",
        "https://urlquery.net/report/e9f9c430-fb2f-4166-8bfb-500339fdb9c0",
        "Malvertizing, Phishing, Botnet PWD: https://pin.it/ | https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "http://Object.prototype.hasOwnProperty.call",
        "False: Never served. Had several PI's and background checks",
        "https://viz.greynoise.io/query/AS3359",
        "https://cellebrite.com/en/federal-government/",
        "https://otx.alienvault.com/indicator/url/https://theorg.com/_next/data/Gh7c6NpBHZESb74aisPB8/org/springboard-collaborative.json?companySlug=springboard-collaborative",
        "https://bgpview.io/asn/3359#whois",
        "IDS Detections: Terse HTTP 1.0 Request Possible Nivdort W32/Bayrob Attempted Checkin 403 Forbidden",
        "Alerts: (cisa gov) ransomware_file_modifications script_created_process antisandbox_mouse_hook antivm_generic_disk infostealer_cookies suspicious_command_tools antidebug_guardpages dynamic_function_loading reads_self stealth_window",
        "Trojan:Win32/Zombie.A: FileHash-SHA1: 1fa3519b200cf5078c1c6c7df1cf44cd747c2320",
        "www.hallinjurylaw.com |\tMinneapolis Personal Injury Lawyer Personal Injury Law Experts",
        "Domains Contacted: bettercaught.net electricstrong.net recordtrouble.net electrictrouble.net recordpresident.net",
        "https://viz.greynoise.io/ip/analysis/d90b0bd7-aaa1-4ea6-93c1-92bfd2d8f930",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
        "IDS Detections:  MVPower DVR Shell UCE Mirai  | Variant User-Agent (Outbound) JAWS Webserver Unauthenticated Shell Command Execution",
        "Below are malvertizing links featuring target and alleged assaulter",
        "Alerts: infostealer_cookies infostealer_keylog persistence_ads suspicious_command_tools anomalous_deletefile",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA256 215fbe9cf76ccbdde60eaa66538edeecadb844078b4379e66cacb83c7ac05690",
        "Malware Behavior Catalog: Dynamic Analysis Evasion B0003 \u2022 Create File C0016 \u2022 Create Process C0017 \u2022 Create Thread C0038",
        "Trellis: www.youtube.com/watch?v=GyuMozsVyYs \t\u00bb Survivors video references assault. Does not name or depict Reimers likeness.",
        "https://www.verizon.com/business/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/summary",
        "https://urlscan.io/search/#ualberta.ca",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List",
        "Alerts: dead_host network_icmp nolookup_communication disables_proxy modifies_certificates modifies_proxy_wpad",
        "09.20.25 - https://urlscan.io/search/#page.domain%3Aualberta.ca",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Outbound SMTP Connections by frack113",
        "jpocxaar1---r3---sn-jpocxaa-a03e.gvt1.com",
        "Malware Families: VirTool:Win32/Injector TrojanDownloader:Win32/Upatre Unix   VirTool:Win32/Obfuscator Win.Dropper.LokiBot-9975730-0",
        "Crowdsourced Sigma Rules: Matches rule Creation of an Executable by an Executable by frack113",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://help.competitionsuite.com/article/76-using-the-judge-app-tablets",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://www.merklemap.com/search?query=ualberta.ca&page=0",
        "https://otx.alienvault.com/indicator/file/2b5deac6176124ee1f7d237f070c39b03c964fce9a9fba0aaa1bce102710d2e0",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "https://www.hybrid-analysis.com/sample/cc2438f2ce5688ebea0b6fc1d556d44e0384ba1651dee3c30fc5ed4c595a40b6/6819791dee8ee1fe7b07b5d4",
        "09.10.25 - https://urlscan.io/search/#page.domain%3Awww.ualberta.ca",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-SHA1 ad560bee21bf7aefc1f1a1be2762d852c7301c07",
        "Unix.Malware.Generic-9875933-0  | High Priority Alert: cape_detected_threat",
        "Brian Sabey wanted to appear to win. Sandy demanded Brashears remove every patients negative review about Jeffrey Reimer DPT",
        "Crowdsourced Sigma Rules: Matches rule Suspect Svchost Activity by David Burkett, @signalblur",
        "Query to a *.top domain - Likely Hostile Query for .cc TLD",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "Antivirus Detections Win.Trojan.Sality-1047 ,  Worm:Win32/Ganelp.A IDS Detections W32.Duptwux/Ganelp FTP Username - onthelinux Yara Detections InstallShield2000 Alerts persistence_autorun_tasks cape_detected_threat bypass_firewall suricata_alert dynamic_function_loading dropper injection_rwx IP\u2019s Contacted  209.202.252.54",
        "Malware: 0a6e883228a04a6e8738511a6210914dea1773d88cf57950c83e092f02c7f3bf - Other:Malware-gen\\ [Trj]",
        "Tulach: 114.114.114.114",
        "https://dnsdumpster.com/",
        "https://whois.domaintools.com/ualberta.ca",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader",
        "https://m.youtube.com/watch?v=GyuMozsVyYs | Sabey angry over music expression that's never named assaulter",
        "https://www.google.com/?authuser=0",
        "https://otx.alienvault.com/pulse/652214c652025febf66cde33",
        "a.nel.cloudflare.com / api.w.org",
        "https://tria.ge/240517-t9pc2ahb2t",
        "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-SHA1 48dc18f70b2dfdf554e8247eb9e4a8910e19bd3b",
        "https://hybrid-analysis.com/sample/9c664935c8b82101733515e488e990d3c2db4b2594b0e427d01147e50953906e/658df4ed7644098eee08e1a4",
        "Crowdsourced YARA rules Matches:  rule INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "ELF:Mirai-GH\\ [Trj] 91b62309447ba8db2a456b546d02cee07f1fd1027a0dd23b0ad87bec18b5acee",
        "Unix.Malware.Generic:",
        "https://pornbitter.com/storage/jeffrey-reimer-puts-his-love-on-top-tsara-brashears/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/66b3cdc90a0b888d183249be",
        "https://archive.ph/rhBxZ",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "Alerts: cape_detected_threat cape_extracted_content",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
        "Domains Contacted: electricpresident.net recordcaught.net electriccaught.net streetstrong.net tradestrong.net",
        "Malware: http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel | 103.246.145.111",
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737710&Signature=fbsokraSd7lsYmUfaTEl8Phs2K3hp7AtVmQU9axeEBcYmYbrrYrrfpP5lPEQaE%2Fh3%2BEP9Rn8mD8D1haqQVXCN0VVlxJ4sddjWmyC5USsgBsvUb0%2F72h1WHDS2KXHlteZWE%2Bauckabain9D5kX501AnqFY38s77OIqO6SMOkQ%2BvXiDSSRK%2FZhbfradBnei3ZLHsXGxkoshTyvB0%2BC%2F8SiUzdVsqSjik0Bn2r%2BIlLpDQK90GlZTD0N",
        "https://www.paidhmars.com/",
        "networkservice.exe: Matches rule SERVER-OTHER Spring Data Commons remote code execution attempt",
        "https://www.blackberry.com/etc.clientlibs/bbcom/clientlibs/clientlib-etc-legacy/resources/cylance-web/global/bb-default-thumbnail-social.png",
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737365&Signature=S%2B7RcHYjab1hbKlKwFfvUbDirFPJS1A2TJQ3bVIObMcON4PD9pRDvhMtYMCnEBrYsICi0UJCFW5eUDolL5Jlbngsc587kF36vvuhlkPprbkSOY1jOyDTpe3Qsb6jRFz3xwOfZc9S5QervoLnRKb%2FyGSyZE6ZK6TxzBrOPczPtZ7sLf9NfD6E%2B2gMRXaRjEqVwVITLG7YqCiiNuohFOuNlK3uNHFpIk53viKvBSAIqLtSklH9bHW4q1DX",
        "Matches rule Linux_Trojan_Mirai_6a77af0f from ruleset Linux_Trojan_Mirai by Elastic Security | botnet.ngocronglau.xyz",
        "Trojan.Crypted-6 | infostealer_browser : https://otx.alienvault.com/indicator/file/29971e4a9ce229d79fae4cbdff1b32d2",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
        "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
        "https://viewdns.info/traceroute/?domain=ualberta.ca",
        "Jeffrey Scott Reimer DPT was allegedly arrested 02/14/2022 |  Very unreliable self proclaimed PI's (multiple)",
        "Ransom: CVE-2023-4966",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968 [OG:dorkingbeauty | Cloned: StreaminingEx]",
        "https://otx.alienvault.com/indicator/url/www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process",
        "https://search.odin.io/hosts?query=ualberta.ca",
        "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
        "Alerts: creates_largekey script_created_process antisandbox_mouse_hook antivm_generic_disk dead_connect",
        "Crowdsourced YARA rules Matches: INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "IDS Detections: Observed Suspicious UA (Mozilla/5.0) Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)",
        "Worm:Win32/Ganelp.A: FileHash-SHA1 0eed684aef678aeffb43866bd2c975876e82eeab",
        "AV Detection: ELF:Mirai-GH\\ [Trj]",
        "http://pegasus.diskel.co.uk/",
        "Trellis: secure04-appleid.com | http://secure04-appleid.com | cpcalendars.secure04-appleid.com",
        "Ransom: ransomed.vc",
        "Brian Sabey begged victim to accept tiny settlement. Contingency, 'Brashears may use  settlement to find hacker.'",
        "https://otx.alienvault.com/indicator/domain/bunny.net",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://theorg.com",
        "Trojan:Win32/Zombie.A: FileHash-SHA256: 72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
        "Malware Behavior Catalog: Get File Attributes C0049 \u2022 Set File Attributes C0050 \u2022 Read File C0051 \u2022 Writes File C0052",
        "https://hybrid-analysis.com/sample/ac09d7f6b26675a529a366b47bc09b3fd776576fb099c020f57204ff7b4ea31c",
        "https://intelx.io/?s=ualberta.ca",
        "TrojanSpy:Win32/Nivdort.CW: FileHash-MD5\t9d6de961a498f831acb63c95e7b2ff0c",
        "www.akhaltsikhe.gov.ge [Germany?]",
        "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa",
        "https://otx.alienvault.com/indicator/file/00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "Unix -IDS Detections: Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config Observed",
        "developer.apple.com",
        "https://mypornwap.fun/downloads/search/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears-tgz",
        "Related Tags: https://www.virustotal.com/graph/embed/g17b255d00de64c0faa707968",
        "https://www.virustotal.com/gui/url/9bd3f99373b39e31fc935f62744c14e595df92c3f388753b507a395112f2dbda/summary",
        "Win.Keylogger.Banbra FileHash-SHA256 94517bb37a8ebe48a06a64b20237e287101bc93bbc840bf6e1ab7dfb28a2da5a",
        "https://www.robtex.com/en/dns-lookup/ca/ualberta",
        "Malware Behavior Catalog:  Tree Anti-Behavioral Analysis: C0017 Create Thread  \u2022 C0038 Operating System  \u2022 Debugger Detection B0001",
        "Tulach! It's been a minute - 114.114.114.114",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "Reimer often criticized non English speakers, large women and short Hispanic men according to witness.",
        "https://www(.)tryindiansex(.)com/s/tsara-brashears/",
        "https://web.archive.org/web/20250000000000*/ualberta.ca",
        "[https://cisa gov] https://otx.alienvault.com/indicator/ip/92.123.203.73 \u2022 https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
        "Brashears Review: 'He would benefit from more training' [Very considerate considering the complimentary spinal cord injuries 'plural']",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://www.quantumfiber.com/moving.html?utm_source=Digital&utm_medium=DV360_YouTube&utm_campaign=QuantumFiber_Residential_Prospecting&utm_content=Movers-RES-QF-Movers-ACH-OLV30-50-YouTube-NA&gclid=CjwKCAjwooq3BhB3Eiw",
        "He also spoke frequently about Brashears infamously 'real' large bosom and figure. He decided to touch, grab, grope, assault,injure, beg for more",
        "Brian Sabey had cashiers check delivered to Brashears in person.",
        "https://urlscan.io/domain/video-lal.com | Was extremely malicious",
        "13.107.21.200 Bat.Bing - Trojan:Win32/Qbot | ALF:Ransom:Win32/Babax | Worm:Win32/Mofksys | ALF:Program:Win32/Webcompanion",
        "https://app.netlas.io/domains/stats/?facets=domain&indices=&q=domain%3A%2A.ualberta.ca&size=1100",
        "Malware Behavior Catalog: Defense Evasion OB0006 \u2022 Delayed Execution B0003.003 \u2022 Move File C0063 \u2022 Process Environment Block B0001.019",
        "https://www.filescan.io/uploads/68197948d95f3e34e9615af0/reports/7b5b7977-b6ee-49c0-af35-1ee866e64e4e/ioc",
        "development.digitalphotogallery.com _YandexDropperExtend",
        "Trellis: High Priority Alerts: network_icmp modifies_proxy_wpad packer_polymorphic",
        "Unix.Malware.Generic: Yara Detections: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "CnC IP: https://otx.alienvault.com/indicator/ip/142.202.242.45",
        "Did I mention she prevailed, won, got a check? Tsara Lynn Brashears survivor; won her counter claim. Weak Reimer claim burned like a dying moth.",
        "sex2e.com  | http://qq664.com/seximanhua/22128.html [trellis.law]",
        "Crowdsourced YARA rules Matches: Matches rule IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems",
        "Scanning host: 31.214.178.54 , 37.152.88.54",
        "http://www.qq664.com/seximanhua/22128.html [looks legit to me]",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://otx.alienvault.com/browse/global/pulses?q=tag:threats&include_inactive=0&sort=-modified&page=1&limit=10&indicatorsSearch=threats",
        "https://www.virustotal.com/graph/embed/gbd9dc992da5f49728d22429d5552c000303449923a744f018453892e1abeca74?theme=dark",
        "http://www.philippinesredcat.com/girls-for-sex-in-manila/ [trellis.law]",
        "wallpapers-nature.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "https://otx.alienvault.com/indicator/ip/125.235.4.59",
        "Crowdsourced YARA rules Matches: SUSP_Unsigned_OSPPSVC from ruleset gen_sign_anomalies by Florian Roth (Nextron Systems",
        "https://research.domaintools.com/research/whois-history/search/?q=ualberta.ca",
        "Through research I did notice many references to target I'm researching for. Phishing/Injection attempt? I didn't click on links.",
        "TrojanSpy:Win32/Nivdort.CW:  FileHash-SHA256\t3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
        "https://www.whoxy.com/ualberta.ca",
        "IDS Detections: Suspicious User-Agent containing Loader Observed TLS Handshake Failure",
        "Unix.Malware.Generic: IDS Detections Generic.Go.Bruteforcer CnC Beacon Generic.Go.Bruteforcer Receiving Config",
        "https://www.filescan.io/uploads/67db2f67b93e688233ef36e9/reports/7e4e4377-5eb9-48a7-848d-bfdca4fb244c/ioc",
        "There is NO other physical therapist with as many reviews as Jeffrey Reimer DPT, even non offenders. Reimers clientele is largely non-english speaking.",
        "Falcon-FileVantage.exe | trojan.redcap/python: FileHash-SHA256 06d4c16f64fc377b7dd5d8dff8bc6b11728d4cbbf3dcb42a9b819cc028afc328",
        "IDS Detections: Windows 98 User-Agent Detected - Possible Malware or Non-Updated System Unsupported/Fake Internet Explorer Version MSIE 5.",
        "IDS Detections: Win32/Adware.Ymeta.A CnC Beacon Win32/Adware.Ymeta.A CnC Win32/Adware.Ymeta Variant Activity",
        "https://t.me/hermitspyware/24",
        "Brian Sabey would  be most foolish after it was determined Brashears was 100% disabled. This was cause by Jeffrey Scott Reimer DPT",
        "Brashears would LOVE for the true court proceedings to be read. She feels they were hacked away. DougCo was unable to 'print' records 'glitch'",
        "Antivirus Detections ELF:Mirai-GH\\ [Trj]",
        "https://hybrid-analysis.com/sample/dea64c4ce5cd9b55fb634888e4c6530728e266c8cb6d2bf670a9fe9e3f712c43",
        "miles.ns.cloudflare.com",
        "IDS Detections: Win32.Lexip Checkin Unsupported/Fake FireFox Version 2.",
        "Win.Dropper.LokiBot-9975730-0 FileHash-SHA256 8f65d7817731cf1b7fada1be16d85464383813dd1f0388a933cec2abbeda4ba9",
        "Survivor was told an investigation would begin, she'd be safe among other careless things her MD advised",
        "CS Sigma: Matches rule Python Initiated Connection by frack113",
        "https://otx.alienvault.com/indicator/ip/143.244.50.212",
        "https://pulsedive.com/ioc/ualberta.ca",
        "http://us.1.powerfront.com/thehealthylivingshow/scripts/redir.asp?link=https://www.sexbestgals.info/cougar-porn/ [trellis.law]",
        "https://tools.totaleconomicimpact.com/go/apple/TEI/docs/TEI-of-Mac-in-Enterprise.pdf | 79appleway.com | technoapple.com",
        "wallet.mewards.bing.com | https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net | wallpapers-nature.com",
        "ACTIVE Emails: IS2OSecurity@hq.dhs.gov \u2022 CISA.GOV Status \u2022 schoolsafety.gov \u2022 power2prevent.gov \u2022 is2osecurity@hq.dhs.gov",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/summary",
        "Michael Roberts - murder suspect, victim, hacker, PI",
        "https://hybrid-analysis.com/sample/209db5b7a473df6f2bff9274b96e556ec296237fdb134959f413c6b3b93fff74",
        "Trellis: 3.223.115.185 In cloud provider range: provider=AWS\t  IPv4 34.240.160.162 In cloud provider range: provider=AWS",
        "Was anyone else notified? I'm not sure why I was.",
        "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
        "https://otx.alienvault.com/indicator/domain/asp.net \u2022 https://otx.alienvault.com/indicator/hostname/ts1.mm.bing.net",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/graph",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://viz.greynoise.io/analysis/5692e934-322f-48b9-bd9b-556e653ff5b6",
        "https://viewdns.info/iphistory/?domain=ualberta.ca",
        "trojan.shellrunner/emailworm: FileHash-SHA256 f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67",
        "trojan.cosmu/xpiro - 960879004e1059a9e7eaca7b95f45ab9baf8f5b905e2714f1c65f92244396758",
        "deviceinbox.com",
        "http://www.rvrb.me/fan_reach/pt?eid=A429942_17490857_19605431_lnk1018&url=http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewAl",
        "Worm:Win32/Ganelp.A: FileHash-MD5 b5e26ac3b7518b77631ab7bcefae10fe",
        "https://iporntv.mobi/tsara-brashears.html?page=4",
        "Crowdsourced YARA rules Matches: IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems)",
        "False: This case was filed in Douglas County Superior Courts with Jeffrey K Holmes presiding. | Who is he?",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://hybrid-analysis.com/sample/3b036b4b2b1d24e19238c6af7bbfaba465cf54cb2f9aab048002deddeafb7f43",
        "09.10.25 - https://viz.greynoise.io/ip/analysis/df2c8c37-f8f2-4398-b709-7c716b03b697",
        "https://pulsedive.com/indicator/?indicator=ualberta.ca",
        "https://www.urlvoid.com/dns-records-lookup/",
        "https://whois.easycounter.com/ualberta.ca",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://www.filescan.io/uploads/68b608d639a6221faa7935aa/reports/dd218cea-f81d-43ed-97fe-dd8c5aec52a3/ioc",
        "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=ualberta.ca",
        "https://hybrid-analysis.com/sample/b31067b40534bc4a9d68ac2f13f6090956d171d23c3d3f7a8c92a8745aed4db3",
        "cu-payment-porch.pdv-3.ap-southeast-2.production.jet-external.com | qa.proxy.cognito.tigomoney.io | https://trackon.fr/track/clique",
        "https://otx.alienvault.com/pulse/655d0f94ad4d7cdc5e3f0a98",
        "94.130.71.173 [scanning host]",
        "https://otx.alienvault.com/indicator/file/02b19639ad1efa59e77f45d130447c05bd2466e26a657cb9cc6ac2e8b30a0026",
        "Malware Families: Win.Dropper.LokiBot-9975730-0 #LowFiEnableDTContinueAfterUnpacking #LowFiMalf_gen Worm:Win32/Mofksys",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "apple-carry-relay.cloudflare.com | apple-dns.net | emails.redvue.com | https://arduboy.com/bad-apple-demo-is-good | 67.199.248.12",
        "Aspnet collect: https://otx.alienvault.com/otxapi/indicators/file/screenshot/000444cc67b97f45f11e1fdf89ad8f5127c87aa858fe151fa9c4975276f53b42",
        "Trellis:TrojanDownloader:Win32/Upatre.A  | Yara Detections Upack_all_versions",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "IDS Detections Master IP CAM 01 Hardcoded Password for Root Account (CVE-2018-5723) Juniper ScreenOS telnet Backdoor Default Password Attempt SUSPICIOUS Path to BusyBox Possible Linux.Mirai Login Attempt (meinsm) Actiontec C1000A backdoor account M2",
        "Security Contact Email: 212d0c197dca818es@hq.dhs.gov \u2022ACTIVE Domain Name: DHS.GOV",
        "A series of reviews detailing Jeffrey Reimer DPT egregious behavior proved not left by Brashears except 2 with comments -4",
        "PDF:UrlMal-inf\\ [Trj] FileHash-SHA256 30d8d75f9457b13b8e4802a6f5b2a6379616f5f2ddd0b5db18b503628a429be7",
        "https://tria.ge/240521-q4s79agb25/static1",
        "Crowdsourced Sigma Rules: Matches rule Suspicious Svchost Process by Florian Roth (Nextron Systems)",
        "Emotet: FileHash-MD5 bafae95c36402dfc1ea5fa04523e4e81",
        "Bayrob: 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69 ef55e2c918f9678e97037d5505b0c8a3.virus",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "ALF:JASYP:TrojanDownloader:Win32/Quireap!atmn: FileHash-MD5 da9b9e892ced7ec90841d813f6e42339",
        "Unix -Yara: is__elf ,  UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  ElfUPX ,  elf_empty_sections",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check External IP Lookup www.trackip.net Possible",
        "148.163.152.21 AS 22843 (PROOFPOINT-ASN-US-EAST) US | www.robtex.com | www.spf-record.com |",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "f.search schema.org  t.final",
        "Brashears would gladly go to court as stated in court documents to then judge who wished to be briefed by Brashears. Thwarted by Sabey.",
        "https://app.threat.zone/submission/c70698bf-881e-491a-a582-eee634b4bf73/url-analysis-report",
        "[dhs gov] https://otx.alienvault.com/indicator/domain/dhs.gov \u2022 https://otx.alienvault.com/indicator/url/https:%2F%2Fwww.cisa.gov%2Fcybersecurity-advisories%2Fics-advisories.xml",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
        "Unix.Mirai Botnet: https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "Brashears documented on corr record she wanted to proceed with case",
        "Yara Detections invalid_trailer_structure ,  multiple_versions",
        "Health Grades erased 20+ positive reviews that originated from Reimers email address.",
        "Worm:Win32/Ganelp.A: FileHash-SHA256 00001054e41d89822267a38856e76eafc2c2e2f20c3f17a392e417f8b87e4ce1",
        "https://www.hybrid-analysis.com/sample/f7cb7c256e840ab93e6991462cedf6eac928c12f4102798986e2c5d27d1abc7f",
        "Bayrob: FileHash-SHA256 3744b06ebb5465c1b3601abc9899e0448c3bb53e81ad6a3101780ab94931ba69",
        "Unix.Malware.Generic-9875933-0 | FileHash-SHA256 be1c1ee886185dff2b29ab84649484e3f01a9dfe303213ff9ce3f652aa98b2b9",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
        "wallpapers-nature.com",
        "Case: Defamation of character based on truthful reviews left on HealthGrades.",
        "https://centralops.net/co/DomainDossier.aspx",
        "Judge Shay Whittaker dismissed Reimers 'malicious' prosecution claom",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://www.virustotal.com/gui/file/f9527077fe3699a17a45276e3b15d65014b5c1d2d10c09f476a21b90fbd0bf67/detection",
        "Emotet: FileHash-SHA256 db9d59b0f192c91f8ecf939c415b3252b13b0fb052d4a66ceefb80dfb43d6e8a |",
        "http://image.nationwide-service.co.uk/lib/fe9515737163077971/m/1/spacer_ApplePay.gif bum?id=326459173&s=143441 | mails.redvue.com",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "AppRegistrationList.csv",
        "Malware Behavior Catalog: Operating System OC0008  \u2022 Environment Variable C0034 \u2022 Self Deletion F0007 \u2022  :  Tree Anti-Behavioral Analysis",
        "wapwon(.)live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language",
        "Most of not all  positive Jeffrey Reimer DPT reviews are false.  Reimer wasn't practicing when 'amazing' trat,ent alleged",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "Social Engineering",
        "http://ci-www.threatcrowd.org/domain.php?domain=ualberta.ca",
        "Victim to afraid to bring lawsuit for attack that caused SCI. Endlessly bullied.",
        "https://www.toindian.com/s/jeffrey-reimer-dpt-porn/",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "FormBook: a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "Trellis: http://blockpage.bt.com/pcstaticpage/blocked.html?list=BT |  https://search.app.goo.gl/?ofl",
        "Yara Detections: Delphi",
        "https://www.virustotal.com/gui/collection/081aaa3e4cc9594cebbd39781c156d337527737e7123481e44ca9de1b39852ee/iocs",
        "IDS Detections: Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World)",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian - is this a must?",
        "Yara Detections: Ursnif_201904 ,  aPLib ,  PECompact_2xx ,  pecompact2 ,  PECompact2xxBitSumTechnologies ,  PECompactV2XBitsumTechnologies ,  PECompactv2xx",
        "Malware Behavior Catalog: System Information Discovery E1082 \u2022 File and Directory Discovery E1083 \u2022 Execution OB0009 \u2022  File System OC0001",
        "https://hybrid-analysis.com/sample/dea64c4ce5cd9b55fb634888e4c6530728e266c8cb6d2bf670a9fe9e3f712c43/67db93032dc368d2d80c3df1",
        "https://www. pornhub .com /video/ search?search=tsara+brashears",
        "Matches rule ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst",
        "Malware Behavior Catalog:  Tree Anti-Behavioral: Environment Variable C0034 \u2022 Anti-Behavioral Analysis OB0001 \u2022 Process OC0003",
        "What's going on here judiciary? Karen - cisa.gov?  e.final",
        "Jeffrey Scott Reimer PT , DPT. assaulters defense: 'I had to be of the top/front of Brashears, She consented!'",
        "https://otx.alienvault.com/indicator/url/http:%2F%2Fpixelrz.com%2Flists%2Fkeywords%2F%2520dr-jeffrey-reimer-dpt-funds-tsara-brashears%2F",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
        "Yara: TrojanDropperWin32Ropest | CodeOverlap TrojanWin32Gatsorm | CodeOverlap TrojanWinNTConficker | CodeOverlap Alerts: WormWin32Pykspa",
        "[cisa gov] https://otx.alienvault.com/indicator/domain/cisa.gov \u2022 [hq.dhs.gov] https://otx.alienvault.com/indicator/hostname/hq.dhs.gov",
        "https://otx.alienvault.com/indicator/file/72bd98a9157afcd3ae38b60a7cf3ae4f23d6bb069a7aa7be7080b6967a6cf0cc",
        "Reimers case V Brashears in 2017 after Denver Police Major Crimes located Reimer",
        "https://prnbae.com/191693/at-37-ellie-discovers-the-unique-sensations-of-double-vaginal-sex/ [trellis.law]",
        "thevisafirm.com | Immigration Lawyers Capital Immigration Lawyers Green Card Lawyer [ London, DC] malicious",
        "http://images.contact.acams.org/",
        "telejoint.net",
        "Malware Families: ALF:Trojan:Win32/FormBook AWS PDF:UrlMal-inf\\ [Trj] Trojan:Win32/Qbot Unix.Malware.Generic-9875933-0",
        "Trojan:Win32/Zombie.A: FileHash-MD5: 36b71d23ca7553fb9db0730e56e6bf77"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "Parking Crew",
            "dosdean@ualberta[.]ca // ciso@ualberta[.]ca",
            "Blind Eagle"
          ],
          "malware_families": [
            "Pdf:urlmal-inf\\ [trj]",
            "Alf:pua:block:iobit",
            "Worm:win32/ganelp.a",
            "Trojan:win32/zombie.a",
            "Prynt",
            "Installbrain",
            "Win-trojan/malpacked5.gen",
            "Alf:jasyp:trojandownloader:win32/quireap!atmn",
            "Virtool:msil/cryptinject.cf!mtb",
            "Alf:heraklezeval:softwarebundler:win32/prepscram",
            "Pegasus for ios - s0289",
            "Trojan.bayrob/lazy",
            "Trojan:win32/qbot",
            "Hacktool",
            "Bayrob",
            "#lowfienabledtcontinueafterunpacking",
            "Alf:heraklezeval:trojan:win32/zombie",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "W32/pidgeon-a",
            "Android/ave.mirai.fszhh",
            "Redline stealer",
            "Win.dropper.autoit-6688751-0",
            "Unix.trojan.mirai-9441505-0",
            "Worm:win32/pykspa.c",
            "Hallrender",
            "Appleservice",
            "Atros3.ldj",
            "Win.packer.pkr_ce1a-9980177-0",
            "Variant.zusy.151902",
            "Worm:win32/sfone",
            "Trojan.mirai/fedr",
            "Trojandownloader:win32/upatre.a",
            "Trojan:win32/zbot.sibg3!mtb",
            "#lowfimalf_gen",
            "Win.dropper.bulz-9910065-0",
            "Alf:trojan:win32/formbook",
            "Other:malware-gen\\ [trj]",
            "Trojan.mirai/fszhh",
            "Ghost rat",
            "Nanocore rat",
            "Virus.ramnit/nimnul",
            "Worm:win32/mofksys",
            "Win.malware.trojanx-9862538-0",
            "Virtool:win32/injector",
            "Trojanspy:win32/gucotut.a",
            "Tofsee",
            "Ddos:linux/mirai",
            "Alfper:installcapital",
            "Trojandownloader:win32/upatre",
            "Trojan.agent.fryx",
            "A variant of win32/flystudio.packed.ad potentially unwanted",
            "Comspec",
            "Backdoor:win32/wabot.a",
            "Win.packed.kkrunchy-7049457-1",
            "Elf:mirai-gh\\ [trj]",
            "Backdoor:win32/tofsee.t",
            "Amazon",
            "Trojan.redcap/python",
            "Trojanspy:win32/nivdort.cw",
            "Aws",
            "Win32:trojan-gen",
            "Nids",
            "Sabey urself - s0386",
            "Ransom:win32/g and crab!rfn",
            "Unix",
            "Win32:renos-ky\\ [trj]",
            "Trojandropper:win32",
            "Alf:e5.spikeaex.rhh_mcv",
            "Ascii",
            "Trojan:win32/qbot.r!mtb",
            "Win.worm.pykspa-1",
            "Win32:malware-gen",
            "Alf:heraklezeval:trojan:bat/musecador",
            "Maltiverse",
            "Worm:win32/fesber.a",
            "Formbook",
            "Tulach",
            "Mal_tofsee",
            "Trojanclicker",
            "Win.dropper.lokibot-9975730-0",
            "Ransom",
            "Apollolocker",
            "Sova",
            "Trojanspy:win32/bradesco",
            "Roboto",
            "Win32:pwsx-gen\\ [trj]",
            "Win.keylogger.banbra-9936388-0",
            "Webtoolbar",
            "Unix.malware.generic-9875933-0",
            "Alf:ransom:win32/babax",
            "Alf:program:win32/webcompanion",
            "Beach research",
            "Virtool:win32/obfuscator",
            "Malware",
            "Gc",
            "Generic",
            "Win32:acecrypter-b [cryp]",
            "Ransom:win32/wannacrypt.a!rsm",
            "Win.malware.downloadguide-6803841-0",
            "Worm:win32/sfone.a",
            "Cobalt strike",
            "P2p zeus - s0016",
            "Win.dropper.dridex-9986041-0",
            "Flyagent l",
            "Win.malware.bbabdcdc-7358312-0",
            "#lowfi:hstr:trojanspy:win32/xtrat",
            "Trojan.shellrunner/emailworm",
            "Mirai",
            "Alf:heraklezeval:trojanclicker:js/faceliker",
            "Suppobox",
            "Installcore",
            "Agent tesla",
            "Ransom.stopcryptpmf.",
            "Emotet",
            "Occamy",
            "#lowfi:fop:virtool:win32/injector",
            "Lolkek"
          ],
          "industries": [
            "Finance",
            "Chemical",
            "Energy",
            "Research",
            "Education",
            "Healthcare",
            "Civilian society",
            "Medicine",
            "Civilians",
            "Government",
            "Immigration",
            "Agriculture",
            "Nutritional",
            "Telecommunications",
            "Medical",
            "Media",
            "Health",
            "Technology"
          ],
          "unique_indicators": 233916
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/licdn.com",
    "whois": "http://whois.domaintools.com/licdn.com",
    "domain": "licdn.com",
    "hostname": "snap.licdn.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69a12a81af4358973fbdf1a8",
      "name": "Example 2: Belasco Chain Byproduct of Certificate Hosted Malware (See Prior Thread #2 Entrust.com",
      "description": "CAcert bypass",
      "modified": "2026-04-19T07:42:53.546000",
      "created": "2026-02-27T05:24:16.997000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 20,
        "FileHash-SHA256": 112,
        "FileHash-MD5": 8,
        "URL": 69,
        "hostname": 17,
        "FileHash-SHA1": 6,
        "CVE": 6,
        "YARA": 5
      },
      "indicator_count": 243,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "9 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "699c3b796fcaed878ca94c5c",
      "name": "https://m.vzw.com/wIvzrd8",
      "description": "the wizard",
      "modified": "2026-04-18T05:30:18.690000",
      "created": "2026-02-23T11:35:21.673000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1818,
        "hostname": 575,
        "URL": 200,
        "FileHash-SHA1": 450,
        "CIDR": 11,
        "domain": 887,
        "email": 7,
        "FileHash-MD5": 402,
        "CVE": 21
      },
      "indicator_count": 4371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b6044b1389957c1d2afb58",
      "name": "Pulses in Question",
      "description": "Following.",
      "modified": "2026-04-14T01:10:24.056000",
      "created": "2026-03-15T00:58:51.761000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 56,
        "FileHash-SHA1": 56,
        "FileHash-SHA256": 93,
        "URL": 122,
        "hostname": 150,
        "email": 1,
        "domain": 37
      },
      "indicator_count": 515,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b650d954218108114d88e3",
      "name": "Files Corpus Redirected to these PDFKIT.net",
      "description": "PDFKIT.NET DMV version \"\" see old posts for details. Recommendation,  PDFkit.net DMV versions should be aggregated with data to rule out anything like ability to connect to Mac ids, or general safety. Docusign states that to fall within a secure Docusign protocol documents are not modified after creation. Please check old pdfs for post modification violating forgery, cryptography, electronic claims act integrity violations.",
      "modified": "2026-04-14T00:14:29.475000",
      "created": "2026-03-15T06:25:29.875000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 6,
        "hostname": 12,
        "URL": 15,
        "FileHash-SHA256": 3
      },
      "indicator_count": 36,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "699ffe2a0a48bdf23d11efb4",
      "name": "Cardconnect Ecosystem",
      "description": "The cardconnect.com infrastructure reveals a fragmented and high-risk network topology characterized by an atypical shift from Fastly edge delivery to Radware-Ukraine (AS30779) routing. While core transaction processing remains anchored within Fiserv (AS11121/AS39992) and status monitoring is partitioned to AWS, the persistent resolution of root and www traffic to Ukrainian IP space (176.100.165.28) creates a significant geolocation anomaly for a US financial entity. This volatility, coupled with orphaned NXDOMAIN records and inconsistent CNAME nesting (aliasing vendor-specific subdomains like idexx and frazer to centralized b2c/fts endpoints), suggests a non-unified deployment strategy that complicates the domain\u2019s security perimeter and increases its exposure to DNS-based interception.",
      "modified": "2026-04-13T23:46:24.779000",
      "created": "2026-02-26T08:02:50.501000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 301,
        "FileHash-SHA256": 198,
        "hostname": 1359,
        "URL": 229,
        "email": 8,
        "FileHash-SHA1": 49,
        "CIDR": 4,
        "FileHash-MD5": 11,
        "CVE": 2
      },
      "indicator_count": 2161,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 50,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d79c38e0a059039b475ebe",
      "name": "CAPE Sandbox",
      "description": "<Here is a full list of annotations and links to the research published in the journal of the Open Science.. \u00c2\u00a31.5m (3.3m euros) in its first year.>Email today from them on my line. Very wild things happening here. trying to close my line",
      "modified": "2026-04-09T12:55:23.059000",
      "created": "2026-04-09T12:31:52.495000",
      "tags": [
        "html document",
        "unicode text",
        "utf8 text",
        "crlf",
        "lf line",
        "site",
        "meta",
        "verizon",
        "wireless",
        "internet",
        "phone services",
        "official",
        "shop verizon",
        "lte network",
        "get fios",
        "title",
        "code",
        "error",
        "utc na",
        "utc google",
        "tag manager",
        "gtmw2vn2cq",
        "utc dc9849921",
        "utc dc685973",
        "utc g12r1dx1lx7",
        "utc aw647962234",
        "utc aw2761768",
        "utc aw685973",
        "verizon business",
        "verizon for business",
        "verizon business account",
        "verizon business phone",
        "verizon wireless for business",
        "verizon business service",
        "verizon business plan",
        "business internet services",
        "learn",
        "gartner",
        "contact",
        "find",
        "discover",
        "support",
        "close log",
        "shop",
        "upgrade",
        "small",
        "voice",
        "chat",
        "mitre attack",
        "network info",
        "program",
        "html page",
        "t1055 process",
        "overview",
        "processes extra",
        "overview zenbox",
        "verdict",
        "guest system",
        "phishing",
        "next",
        "ver2",
        "msclkidn",
        "utc amazon",
        "analytics na",
        "utc bing",
        "vids1",
        "vids0",
        "gdlname"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737365&Signature=S%2B7RcHYjab1hbKlKwFfvUbDirFPJS1A2TJQ3bVIObMcON4PD9pRDvhMtYMCnEBrYsICi0UJCFW5eUDolL5Jlbngsc587kF36vvuhlkPprbkSOY1jOyDTpe3Qsb6jRFz3xwOfZc9S5QervoLnRKb%2FyGSyZE6ZK6TxzBrOPczPtZ7sLf9NfD6E%2B2gMRXaRjEqVwVITLG7YqCiiNuohFOuNlK3uNHFpIk53viKvBSAIqLtSklH9bHW4q1DX",
        "https://www.verizon.com/business/",
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737710&Signature=fbsokraSd7lsYmUfaTEl8Phs2K3hp7AtVmQU9axeEBcYmYbrrYrrfpP5lPEQaE%2Fh3%2BEP9Rn8mD8D1haqQVXCN0VVlxJ4sddjWmyC5USsgBsvUb0%2F72h1WHDS2KXHlteZWE%2Bauckabain9D5kX501AnqFY38s77OIqO6SMOkQ%2BvXiDSSRK%2FZhbfradBnei3ZLHsXGxkoshTyvB0%2BC%2F8SiUzdVsqSjik0Bn2r%2BIlLpDQK90GlZTD0N"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 772,
        "hostname": 706,
        "domain": 875,
        "FileHash-SHA256": 2348,
        "FileHash-MD5": 2237,
        "FileHash-SHA1": 2260,
        "IPv4": 442,
        "CVE": 1,
        "email": 9
      },
      "indicator_count": 9650,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "10 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d79c38622d6235b8c04603",
      "name": "CAPE Sandbox",
      "description": "<Here is a full list of annotations and links to the research published in the journal of the Open Science.. \u00c2\u00a31.5m (3.3m euros) in its first year.>Email today from them on my line. Very wild things happening here. trying to close my line",
      "modified": "2026-04-09T12:35:40.120000",
      "created": "2026-04-09T12:31:52.780000",
      "tags": [
        "html document",
        "unicode text",
        "utf8 text",
        "crlf",
        "lf line",
        "site",
        "meta",
        "verizon",
        "wireless",
        "internet",
        "phone services",
        "official",
        "shop verizon",
        "lte network",
        "get fios",
        "title",
        "code",
        "error",
        "utc na",
        "utc google",
        "tag manager",
        "gtmw2vn2cq",
        "utc dc9849921",
        "utc dc685973",
        "utc g12r1dx1lx7",
        "utc aw647962234",
        "utc aw2761768",
        "utc aw685973",
        "verizon business",
        "verizon for business",
        "verizon business account",
        "verizon business phone",
        "verizon wireless for business",
        "verizon business service",
        "verizon business plan",
        "business internet services",
        "learn",
        "gartner",
        "contact",
        "find",
        "discover",
        "support",
        "close log",
        "shop",
        "upgrade",
        "small",
        "voice",
        "chat",
        "mitre attack",
        "network info",
        "program",
        "html page",
        "t1055 process",
        "overview",
        "processes extra",
        "overview zenbox",
        "verdict",
        "guest system",
        "phishing",
        "next",
        "ver2",
        "msclkidn",
        "utc amazon",
        "analytics na",
        "utc bing",
        "vids1",
        "vids0",
        "gdlname"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737365&Signature=S%2B7RcHYjab1hbKlKwFfvUbDirFPJS1A2TJQ3bVIObMcON4PD9pRDvhMtYMCnEBrYsICi0UJCFW5eUDolL5Jlbngsc587kF36vvuhlkPprbkSOY1jOyDTpe3Qsb6jRFz3xwOfZc9S5QervoLnRKb%2FyGSyZE6ZK6TxzBrOPczPtZ7sLf9NfD6E%2B2gMRXaRjEqVwVITLG7YqCiiNuohFOuNlK3uNHFpIk53viKvBSAIqLtSklH9bHW4q1DX",
        "https://www.verizon.com/business/",
        "https://vtbehaviour.commondatastorage.googleapis.com/edb4c21d60daa44b3429e7ba9bfa342759ebef23c136c934f74aef145453ce19_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775737710&Signature=fbsokraSd7lsYmUfaTEl8Phs2K3hp7AtVmQU9axeEBcYmYbrrYrrfpP5lPEQaE%2Fh3%2BEP9Rn8mD8D1haqQVXCN0VVlxJ4sddjWmyC5USsgBsvUb0%2F72h1WHDS2KXHlteZWE%2Bauckabain9D5kX501AnqFY38s77OIqO6SMOkQ%2BvXiDSSRK%2FZhbfradBnei3ZLHsXGxkoshTyvB0%2BC%2F8SiUzdVsqSjik0Bn2r%2BIlLpDQK90GlZTD0N"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 196,
        "hostname": 128,
        "domain": 4,
        "FileHash-SHA256": 90,
        "FileHash-MD5": 6,
        "FileHash-SHA1": 1,
        "IPv4": 90,
        "CVE": 1
      },
      "indicator_count": 516,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "10 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf2bee5c7200ce4af4593b",
      "name": "Reconnaissance | Network Attack CREATED 9 MONTHS AGO MODIFIED 8 MONTHS AGO by Q.Vashti   credit",
      "description": "",
      "modified": "2026-04-03T02:59:00.747000",
      "created": "2026-04-03T02:54:38.204000",
      "tags": [
        "united",
        "unknown aaaa",
        "status",
        "search",
        "servers",
        "ip address",
        "domain",
        "creation date",
        "emails",
        "date",
        "passive dns",
        "urls",
        "registrar",
        "hostname add",
        "pulse submit",
        "url analysis",
        "files",
        "files ip",
        "united kingdom",
        "unknown ns",
        "entries",
        "domain add",
        "utc na",
        "utc google",
        "tag manager",
        "gb3ys36jk1z",
        "utc gtm5829vrt",
        "utc gtmk5dxr7",
        "utc linkedin",
        "insight tag",
        "secure",
        "samesitenone",
        "path",
        "expiresthu",
        "pragma",
        "expires 1",
        "secchuaarch",
        "secchuamodel",
        "sameorigin",
        "connection",
        "sha256",
        "submitted",
        "focus ip",
        "appdetex",
        "thumbprint",
        "extraction",
        "data upload",
        "sc data",
        "type",
        "extr",
        "include review",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "window memory",
        "extra window",
        "pattern match",
        "blue shield",
        "file",
        "colorado",
        "runtime process",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "program",
        "service",
        "span",
        "footer",
        "body",
        "find",
        "meta",
        "back",
        "mental",
        "download",
        "main",
        "iframe",
        "tips",
        "hybrid",
        "general",
        "local",
        "format",
        "click",
        "strings",
        "cookie"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6874a4e3316a973129ded267",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "email": 3,
        "hostname": 533,
        "FileHash-SHA256": 254,
        "URL": 2159,
        "FileHash-MD5": 30,
        "FileHash-SHA1": 46
      },
      "indicator_count": 3307,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "16 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf2bee5726541dfad53a2b",
      "name": "Reconnaissance | Network Attack CREATED 9 MONTHS AGO MODIFIED 8 MONTHS AGO by Q.Vashti   credit",
      "description": "",
      "modified": "2026-04-03T02:54:38.075000",
      "created": "2026-04-03T02:54:38.075000",
      "tags": [
        "united",
        "unknown aaaa",
        "status",
        "search",
        "servers",
        "ip address",
        "domain",
        "creation date",
        "emails",
        "date",
        "passive dns",
        "urls",
        "registrar",
        "hostname add",
        "pulse submit",
        "url analysis",
        "files",
        "files ip",
        "united kingdom",
        "unknown ns",
        "entries",
        "domain add",
        "utc na",
        "utc google",
        "tag manager",
        "gb3ys36jk1z",
        "utc gtm5829vrt",
        "utc gtmk5dxr7",
        "utc linkedin",
        "insight tag",
        "secure",
        "samesitenone",
        "path",
        "expiresthu",
        "pragma",
        "expires 1",
        "secchuaarch",
        "secchuamodel",
        "sameorigin",
        "connection",
        "sha256",
        "submitted",
        "focus ip",
        "appdetex",
        "thumbprint",
        "extraction",
        "data upload",
        "sc data",
        "type",
        "extr",
        "include review",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "javascript",
        "window memory",
        "extra window",
        "pattern match",
        "blue shield",
        "file",
        "colorado",
        "runtime process",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "program",
        "service",
        "span",
        "footer",
        "body",
        "find",
        "meta",
        "back",
        "mental",
        "download",
        "main",
        "iframe",
        "tips",
        "hybrid",
        "general",
        "local",
        "format",
        "click",
        "strings",
        "cookie"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "6874a4e3316a973129ded267",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "email": 3,
        "hostname": 527,
        "FileHash-SHA256": 254,
        "URL": 2157,
        "FileHash-MD5": 30,
        "FileHash-SHA1": 46
      },
      "indicator_count": 3299,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "16 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ccd2f7984fad6feebb4ca4",
      "name": "VirusTotal report\n                    for index.html",
      "description": "The full text of the full report-to-gws, which was published on 1 April 2026, has been published online by the Csp website, following a request from the BBC>pretext .",
      "modified": "2026-04-01T08:44:36.825000",
      "created": "2026-04-01T08:10:31.621000",
      "tags": [
        "self",
        "downlink rtt",
        "html document",
        "ascii text",
        "crlf line",
        "windows",
        "linux",
        "build web",
        "html",
        "javascript",
        "https",
        "acceptencoding",
        "cookie",
        "dynamic",
        "authorization",
        "contentmd5",
        "wp engine",
        "xmsedgeref ref",
        "bl2edge1520 ref",
        "expires sun",
        "gmt date",
        "gmt xcache",
        "tcphit",
        "gmt etag",
        "b8glwd",
        "afeap",
        "bmxagc",
        "e5bfse",
        "bgs6mb",
        "bjwmce",
        "ciztgb",
        "kqhykb",
        "cxxawb",
        "fevhcf",
        "code",
        "server",
        "registrar abuse",
        "admin country",
        "expiration date",
        "registry domain",
        "registrar iana",
        "creation date",
        "admin city",
        "redmond tech",
        "samesitelax",
        "path",
        "httponly",
        "secure",
        "priorityhigh",
        "gmt contenttype",
        "contentlength",
        "connection",
        "cfray",
        "accept",
        "anycast",
        "wifi display",
        "android",
        "hdtv",
        "anycast og",
        "anything",
        "big screen",
        "mobileoptimized",
        "try shopify",
        "platform",
        "businesses",
        "shopify fb",
        "shopify og",
        "snapchat",
        "chat",
        "snaps",
        "a snap",
        "utc google",
        "adobe dynamic",
        "tag management",
        "amazon",
        "utc amazon",
        "utc facebook",
        "connect na",
        "analytics na",
        "tag manager",
        "gdlname",
        "miss",
        "drupal",
        "miss xtimer",
        "ve9 xcache",
        "miss date",
        "gmt link",
        "build",
        "home og",
        "cloudfront",
        "iad6",
        "kb body",
        "sha256",
        "aspen",
        "aspen one",
        "return",
        "transformed og",
        "aioseo",
        "site kit",
        "google",
        "file type",
        "name file",
        "html internet",
        "unicode text",
        "utf8 text"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1014",
          "name": "Rootkit",
          "display_name": "T1014 - Rootkit"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1485",
          "name": "Data Destruction",
          "display_name": "T1485 - Data Destruction"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1542",
          "name": "Pre-OS Boot",
          "display_name": "T1542 - Pre-OS Boot"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 238,
        "URL": 367,
        "domain": 80,
        "hostname": 155,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 105,
        "email": 5,
        "IPv4": 40,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 1109,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://snap.licdn.com/li.lms-analytics/insight.min.js",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://snap.licdn.com/li.lms-analytics/insight.min.js",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776619556.2378924
}